667 research outputs found
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Spectrum Sensing and Security Challenges and Solutions: Contemporary Affirmation of the Recent Literature
Cognitive radio (CR) has been recently proposed as a promising technology to improve spectrum utilization by enabling secondary access to unused licensed bands. A prerequisite to this secondary access is having no interference to the primary system. This requirement makes spectrum sensing a key function in cognitive radio systems. Among common spectrum sensing techniques, energy detection is an engaging method due to its simplicity and efficiency. However, the major disadvantage of energy detection is the hidden node problem, in which the sensing node cannot distinguish between an idle and a deeply faded or shadowed band. Cooperative spectrum sensing (CSS) which uses a distributed detection model has been considered to overcome that problem. On other dimension of this cooperative spectrum sensing, this is vulnerable to sensing data falsification attacks due to the distributed nature of cooperative spectrum sensing. As the goal of a sensing data falsification attack is to cause an incorrect decision on the presence/absence of a PU signal, malicious or compromised SUs may intentionally distort the measured RSSs and share them with other SUs. Then, the effect of erroneous sensing results propagates to the entire CRN. This type of attacks can be easily launched since the openness of programmable software defined radio (SDR) devices makes it easy for (malicious or compromised) SUs to access low layer protocol stacks, such as PHY and MAC. However, detecting such attacks is challenging due to the lack of coordination between PUs and SUs, and unpredictability in wireless channel signal propagation, thus calling for efficient mechanisms to protect CRNs. Here in this paper we attempt to perform contemporary affirmation of the recent literature of benchmarking strategies that enable the trusted and secure cooperative spectrum sensing among Cognitive Radios
Energy Efficient Cooperative Communication
This dissertation studies several problems centered around developing a better understanding of the energy efficiency of cooperative wireless communication systems. Cooperative communication is a technique where two or more nodes in a wireless network pool their antenna resources to form a virtual antenna array . Over the last decade, researchers have shown that many of the benefits of real antenna arrays, e.g. spatial diversity, increased range, and/or decreased transmission energy, can be achieved by nodes using cooperative transmission. This dissertation extends the current body of knowledge by providing a comprehensive study of the energy efficiency of two-source cooperative transmission under differing assumptions about channel state knowledge, cooperative protocol, and node selfishness. The first part of this dissertation analyzes the effect of channel state information on the optimum energy allocation and energy efficiency of a simple cooperative transmission protocol called orthogonal amplify-and-forward (OAF). The source nodes are required to achieve a quality-of service (QoS) constraint, e.g. signal to noise ratio or outage probability, at the destination. Since a QoS constraint does not specify a unique transmit energy allocation when the nodes use OAF cooperative transmission, minimum total energy strategies are provided for both short-term and long-term QoS constraints. For independent Rayleigh fading channels, full knowledge of the channel state at both of the sources and at the destination is shown to significantly improve the energy efficiency of OAF cooperative transmission as well as direct (non-cooperative) transmission. The results also demonstrate how channel state knowledge affects the minimum total energy allocation strategy. Under identical channel state knowledge assumptions, the results demonstrate that OAF cooperative transmission tends to have better energy efficiency than direct transmission over a wide range of channel conditions. The second part of this dissertation focuses on the development of an opportunistic hybrid cooperative transmission protocol that achieves increased energy efficiency by not only optimizing the resource allocation but also by selecting the most energy efficient cooperative transmission protocol from a set of available protocols according to the current channel state. The protocols considered in the development of the hybrid cooperative transmission protocol include compress-and-forward (CF), estimate-and-forward (EF), non-orthogonal amplify-and-forward (NAF), and decode-and-forward (DF). Instantaneous capacity results are analyzed under the assumption of full channel state knowledge at both of the sources and the destination node. Numerical results are presented showing that the delay limited capacity and outage probability of the hybrid cooperative transmission protocol are superior to that of any single protocol and are also close to the cut-set bound over a wide range of channel conditions. The final part of this dissertation focuses on the issue of node selfishness in cooperative transmission. It is common to assume in networks with a central authority, e.g. military networks, that nodes will always be willing to offer help to other nodes when requested to do so. This assumption may not be valid in ad hoc networks operating without a central authority. This section of the dissertation considers the effect selfish behavior on the energy efficiency of cooperative communication systems. Using tools from non-cooperative game theory, a two-player relaying game is formulated and analyzed in non-fading and fading channel scenarios. In non-fading channels, it is shown that a cooperative equilibrium can exist between two self-interested sources given that the end of the cooperative interaction is uncertain, that the sources can achieve mutual benefit through cooperation, and that the sources are sufficiently patient in the sense that they value future payoffs. In fading channels, a cooperative conditional trigger strategy is proposed and shown to be an equilibrium of the two-player game. Sources following this strategy are shown to achieve an energy efficiency very close to that of a centrally-controlled system when they are sufficiently patient. The results in this section show that cooperation can often be established between two purely self-interested sources without the development of extrinsic incentive mechanisms like virtual currency
Spatial Throughput Maximization of Wireless Powered Communication Networks
Wireless charging is a promising way to power wireless nodes' transmissions.
This paper considers new dual-function access points (APs) which are able to
support the energy/information transmission to/from wireless nodes. We focus on
a large-scale wireless powered communication network (WPCN), and use stochastic
geometry to analyze the wireless nodes' performance tradeoff between energy
harvesting and information transmission. We study two cases with battery-free
and battery-deployed wireless nodes. For both cases, we consider a
harvest-then-transmit protocol by partitioning each time frame into a downlink
(DL) phase for energy transfer, and an uplink (UL) phase for information
transfer. By jointly optimizing frame partition between the two phases and the
wireless nodes' transmit power, we maximize the wireless nodes' spatial
throughput subject to a successful information transmission probability
constraint. For the battery-free case, we show that the wireless nodes prefer
to choose small transmit power to obtain large transmission opportunity. For
the battery-deployed case, we first study an ideal infinite-capacity battery
scenario for wireless nodes, and show that the optimal charging design is not
unique, due to the sufficient energy stored in the battery. We then extend to
the practical finite-capacity battery scenario. Although the exact performance
is difficult to be obtained analytically, it is shown to be upper and lower
bounded by those in the infinite-capacity battery scenario and the battery-free
case, respectively. Finally, we provide numerical results to corroborate our
study.Comment: 15 double-column pages, 8 figures, to appear in IEEE JSAC in February
2015, special issue on wireless communications powered by energy harvesting
and wireless energy transfe
Securing Cognitive Radio Networks using blockchains
Due to the increase in industrial applications of Internet of Things (IoT), number of internet connected devices have been increased accordingly. This has resulted in big challenges in terms of accessibility, scalability, connectivity and adaptability. IoT is capable of creating connections between devices on wireless medium but the utilization of scarce spectrum in efficient manner for the establishment of these connections is the biggest concern. To accommodate spectrum allocation problem different radio technologies are being utilized. One of the most efficient technique being used is cognitive radio, which dynamically allocate the unlicensed spectrum for IoT applications. Spectrum sensing being the fundamental component of Cognitive Radio Network (CRN) is threatened by security attacks. Process of spectrum sensing is disturbed by the malicious user (MU) which attacks the primary signal detection and affects the accuracy of sensing outcome. The presence of such MU in system, sending false sensing data can degrade the performance of cognitive radios. Therefore, in this article a blockchain based method is proposed for the MU detection in network. By using this method an MU can easily be discriminated from a reliable user through cryptographic keys. The efficiency of the proposed mechanism is analyzed through proper simulations using MATLAB. Consequently, this mechanism can be deployed for the validation of participating users in the process of spectrum sensing in CRN for IoTs.publishe
Spectrum sensing and occupancy prediction for cognitive machine-to-machine wireless networks
A thesis submitted to the University of Bedfordshire, in partial
fulfil ment of the requirements for the degree of Doctor of Philosophy (PhD)The rapid growth of the Internet of Things (IoT) introduces an additional challenge to the existing spectrum under-utilisation problem as large scale deployments of thousands devices are expected to require wireless connectivity. Dynamic Spectrum
Access (DSA) has been proposed as a means of improving the spectrum utilisation of wireless systems. Based on the Cognitive Radio (CR) paradigm, DSA enables unlicensed spectrum users to sense their spectral environment and adapt their operational parameters to opportunistically access any temporally unoccupied bands without causing interference to the primary spectrum users. In the same context, CR inspired Machine-to-Machine (M2M) communications have recently been proposed as a potential solution to the spectrum utilisation problem, which has been driven by the ever increasing number of interconnected devices. M2M communications introduce new challenges for CR in terms of operational environments and design requirements. With spectrum sensing being the key function for CR, this
thesis investigates the performance of spectrum sensing and proposes novel sensing approaches and models to address the sensing problem for cognitive M2M deployments.
In this thesis, the behaviour of Energy Detection (ED) spectrum sensing for cognitive M2M nodes is modelled using the two-wave with dffi use power fading model. This channel model can describe a variety of realistic fading conditions including
worse than Rayleigh scenarios that are expected to occur within the operational environments of cognitive M2M communication systems. The results suggest that ED based spectrum sensing fails to meet the sensing requirements over worse than Rayleigh conditions and consequently requires the signal-to-noise ratio (SNR) to be increased by up to 137%. However, by employing appropriate diversity and node
cooperation techniques, the sensing performance can be improved by up to 11.5dB in terms of the required SNR. These results are particularly useful in analysing the eff ects of severe fading in cognitive M2M systems and thus they can be used
to design effi cient CR transceivers and to quantify the trade-o s between detection performance and energy e fficiency.
A novel predictive spectrum sensing scheme that exploits historical data of past sensing events to predict channel occupancy is proposed and analysed. This approach allows CR terminals to sense only the channels that are predicted to be
unoccupied rather than the whole band of interest. Based on this approach, a spectrum occupancy predictor is developed and experimentally validated. The proposed scheme achieves a prediction accuracy of up to 93% which in turn can lead to up to
84% reduction of the spectrum sensing cost. Furthermore, a novel probabilistic model for describing the channel availability
in both the vertical and horizontal polarisations is developed. The proposed model is validated based on a measurement campaign for operational scenarios where CR terminals may change their polarisation during their operation. A Gaussian approximation is used to model the empirical channel availability data with more than 95% confi dence bounds. The proposed model can be used as a means of improving
spectrum sensing performance by using statistical knowledge on the primary users occupancy pattern
SPECTRUM SENSING AND COOPERATION IN COGNITIVE-OFDM BASED WIRELESS COMMUNICATIONS NETWORKS
The world has witnessed the development of many wireless systems and
applications. In addition to the large number of existing devices, such development of
new and advanced wireless systems increases rapidly the demand for more radio
spectrum. The radio spectrum is a limited natural resource; however, it has been
observed that it is not efficiently utilized. Consequently, different dynamic spectrum
access techniques have been proposed as solutions for such an inefficient use of the
spectrum. Cognitive Radio (CR) is a promising intelligent technology that can identify
the unoccupied portions of spectrum and opportunistically uses those portions with
satisfyingly high capacity and low interference to the primary users (i.e., licensed users).
The CR can be distinguished from the classical radio systems mainly by its awareness
about its surrounding radio frequency environment. The spectrum sensing task is the
main key for such awareness. Due to many advantages, Orthogonal Frequency Division
Multiplexing system (OFDM) has been proposed as a potential candidate for the CR‟s
physical layer. Additionally, the Fast Fourier Transform (FFT) in an OFDM receiver
supports the performance of a wide band spectrum analysis. Multitaper spectrum
estimation method (MTM) is a non-coherent promising spectrum sensing technique. It
tolerates problems related to bad biasing and large variance of power estimates.
This thesis focuses, generally, on the local, multi antenna based, and global
cooperative spectrum sensing techniques at physical layer in OFDM-based CR systems.
It starts with an investigation on the performance of using MTM and MTM with
singular value decomposition in CR networks using simulation. The Optimal MTM
parameters are then found. The optimal MTM based detector theoretical formulae are
derived. Different optimal and suboptimal multi antenna based spectrum sensing
techniques are proposed to improve the local spectrum sensing performance. Finally, a
new concept of cooperative spectrum sensing is introduced, and new strategies are
proposed to optimize the hard cooperative spectrum sensing in CR networks.
The MTM performance is controlled by the half time bandwidth product and
number of tapers. In this thesis, such parameters have been optimized using Monte
Carlo simulation. The binary hypothesis test, here, is developed to ensure that the effect
of choosing optimum MTM parameters is based upon performance evaluation. The
results show how these optimal parameters give the highest performance with minimum
complexity when MTM is used locally at CR.
The optimal MTM based detector has been derived using Neyman-Pearson
criterion. That includes probabilities of detection, false alarm and misses detection
approximate derivations in different wireless environments. The threshold and number
of sensed samples controlling is based on this theoretical work.
In order to improve the local spectrum sensing performance at each CR, in the CR
network, multi antenna spectrum sensing techniques are proposed using MTM and
MTM with singular value decomposition in this thesis. The statistical theoretical
formulae of the proposed techniques are derived including the different probabilities.
ii
The proposed techniques include optimal, that requires prior information about the
primary user signal, and two suboptimal multi antenna spectrum sensing techniques
having similar performances with different computation complexity; these do not need
prior information about the primary user signalling. The work here includes derivations
for the periodogram multi antenna case.
Finally, in hard cooperative spectrum sensing, the cooperation optimization is
necessary to improve the overall performance, and/or minimize the number of data to be
sent to the main CR-base station. In this thesis, a new optimization method based on
optimizing the number of locally sensed samples at each CR is proposed with two
different strategies. Furthermore, the different factors that affect the hard cooperative
spectrum sensing optimization are investigated and analysed and a new cooperation
scheme in spectrum sensing, the master node, is proposed.Ministry of Interior-Kingdom of Saudi Arabi
Secure key design approaches using entropy harvesting in wireless sensor network: A survey
Physical layer based security design in wireless sensor networks have gained much importance since the past decade. The various constraints associated with such networks coupled with other factors such as their deployment mainly in remote areas, nature of communication etc. are responsible for development of research works where the focus is secured key generation, extraction, and sharing. Keeping the importance of such works in mind, this survey is undertaken that provides a vivid description of the different mechanisms adopted for securely generating the key as well its randomness extraction and also sharing. This survey work not only concentrates on the more common methods, like received signal strength based but also goes on to describe other uncommon strategies such as accelerometer based. We first discuss the three fundamental steps viz. randomness extraction, key generation and sharing and their importance in physical layer based security design. We then review existing secure key generation, extraction, and sharing mechanisms and also discuss their pros and cons. In addition, we present a comprehensive comparative study of the recent advancements in secure key generation, sharing, and randomness extraction approaches on the basis of adversary, secret bit generation rate, energy efficiency etc. Finally, the survey wraps up with some promising future research directions in this area
- …