78 research outputs found

    Studentized Extreme Eigenvalue Based Double Threshold Spectrum Sensing Under Noise Uncertainty

    Get PDF
    The eigenvalue based spectrum sensing is a low-cost spectrum sensing method that detects the presence of the licensed user signal in desired frequency. Traditional single-threshold eigenvalue sensing methods, which are widely used in the literature, can exhibit inadequate performance under low SNR and noise uncertainty. Therefore, in this study an eigenvalue-based spectrum sensing method is proposed using a double threshold with the studentized extreme eigenvalue distribution function. The results that threshold values obtained for the proposed method were simulated in Rayleigh fading channels. The results were compared with traditional methods and they were observed to be more accurate

    Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

    Full text link
    The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). In the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we analyze the spear and shield relation between Byzantine attack and defense from three aspects: the vulnerability of CSS to attack, the obstacles in CSS to defense, and the games between attack and defense. Then, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Next, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we highlight the unsolved research challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral

    Reinforcement learning-based trust and reputation model for spectrum leasing in cognitive radio networks

    Get PDF
    Cognitive Radio (CR), which is the next generation wireless communication system, enables unlicensed users or Secondary Users (SUs) to exploit underutilized spectrum (called white spaces) owned by the licensed users or Primary Users(PUs) so that bandwidth availability improves at the SUs, which helps to improve the overall spectrum utilization. Collaboration, which has been adopted in various schemes such distributed channel sensing and channel access, is an intrinsic characteristic of CR to improve network performance. However, the requirement to collaborate has inevitably open doors to various forms of attacks by malicious SUs, and this can be addressed using Trust and Reputation Management (TRM). Generally speaking, TRM detects malicious SUs including honest SUs that turn malicious. To achieve a more efficient detection, we advocate the use of Reinforcement Learning (RL), which is known to be flexible and adaptable to the changes in operating environment in order to achieve optimal network performance. Its ability to learn and re-learn throughout the duration of its existence provides intelligence to the proposed TRM model, and so the focus on RL-based TRM model in this paper. Our preliminary results show that the detection performance of RLbased TRM model has an improvement of 15% over the traditional TRM in a centralized cognitive radio network. The investigation in the paper serves as an important foundation for future work in this research field

    A Trust-Based Relay Selection Approach to the Multi-Hop Network Formation Problem in Cognitive Radio Networks

    Get PDF
    One of the major challenges for today’s wireless communications is to meet the growing demand for supporting an increasing diversity of wireless applications with limited spectrum resource. In cooperative communications and networking, users share resources and collaborate in a distributed approach, similar to entities of active social groups in self organizational communities. Users’ information may be shared by the user and also by the cooperative users, in distributed transmission. Cooperative communications and networking is a fairly new communication paradigm that promises significant capacity and multiplexing gain increase in wireless networks. This research will provide a cooperative relay selection framework that exploits the similarity of cognitive radio networks to social networks. It offers a multi-hop, reputation-based power control game for routing. In this dissertation, a social network model provides a humanistic approach to predicting relay selection and network analysis in cognitive radio networks

    A Reinforcement Learning-based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks

    Get PDF
    Cognitive radio enables secondary users (SUs) to explore and exploit the underutilized licensed channels (or white spaces) owned by the primary users. To improve the network scalability, the SUs are organized into clusters. This article proposes a novel artificial intelligence based trust model approach that uses reinforcement learning (RL) to improve traditional budget-based cluster size adjustment schemes. The RL-based trust model enables the clusterhead to observe and learn about the behaviors of its SU member nodes, and revoke the membership of malicious SUs in order to ameliorate the effects of intelligent and collaborative attacks, while adjusting the cluster size dynamically according to the availability of white spaces. The malicious SUs launch attacks on clusterheads causing the cluster size to become inappropriately sized while learning to remain undetected. In any attack and defense scenario, both the attackers and the clusterhead adopt RL approaches. Simulation results have shown that the single-agent RL (SARL) attackers have caused the cluster size to reduce significantly; while the SARL clusterhead has slightly helped increase its cluster size, and this motivates a rule-based approach to efficiently counterattack. Multi-agent RL attacks have shown to be less effective in an operating environment that is dynamic
    corecore