1,525 research outputs found

    Intelligent spectrum management techniques for wireless cognitive radio networks

    Get PDF
    PhD ThesisThis thesis addresses many of the unique spectrum management chal- lenges in CR networks for the rst time. These challenges have a vital e ect on the network performance and are particularly di cult to solve due to the unique characteristics of CR networks. Speci cally, this thesis proposes and investigates three intelligent spectrum management tech- niques for CR networks. The issues investigated in this thesis have a fundamental impact on the establishment, functionality and security of CR networks. First, an intelligent primary receiver-aware message exchange protocol for CR ad hoc networks is proposed. It considers the problem of alleviat- ing the interference collision risk to primary user communication, explic- itly to protect primary receivers that are not detected during spectrum sensing. The proposed protocol achieves a higher measure of safeguard- ing. A practical scenario is considered where no global network topology is known and no common control channel is assumed to exist. Second, a novel CR broadcast protocol (CRBP) to reliably disseminate the broadcast messages to all or most of the possible CR nodes in the network is proposed. The CRBP formulates the broadcast problem as a bipartite-graph problem. Thus, CRBP achieves a signi cant successful delivery ratio by connecting di erent local topologies, which is a unique feature in CR ad hoc networks. Finally, a new defence strategy to defend against spectrum sensing data falsi cation attacks in CR networks is proposed. In order to identify malicious users, the proposed scheme performs multiple veri cations of sensory data with the assistance of trusted nodes.Higher Committee For Education Devel- opment in Iraq (HCED-Iraq

    Cognitive Radio Systems

    Get PDF
    Cognitive radio is a hot research area for future wireless communications in the recent years. In order to increase the spectrum utilization, cognitive radio makes it possible for unlicensed users to access the spectrum unoccupied by licensed users. Cognitive radio let the equipments more intelligent to communicate with each other in a spectrum-aware manner and provide a new approach for the co-existence of multiple wireless systems. The goal of this book is to provide highlights of the current research topics in the field of cognitive radio systems. The book consists of 17 chapters, addressing various problems in cognitive radio systems

    Contributions to the security of cognitive radio networks

    Get PDF
    The increasing emergence of wireless applications along with the static spectrum allocation followed by regulatory bodies has led to a high inefficiency in spectrum usage, and the lack of spectrum for new services. In this context, Cognitive Radio (CR) technology has been proposed as a possible solution to reuse the spectrum being underutilized by licensed services. CRs are intelligent devices capable of sensing the medium and identifying those portions of the spectrum being unused. Based on their current perception of the environment and on that learned from past experiences, they can optimally tune themselves with regard to parameters such as frequency, coding and modulation, among others. Due to such properties, Cognitive Radio Networks (CRNs) can act as secondary users of the spectrum left unused by their legal owners or primary users, under the requirement of not interfering primary communications. The successful deployment of these networks relies on the proper design of mechanisms in order to efficiently detect spectrum holes, adapt to changing environment conditions and manage the available spectrum. Furthermore, the need for addressing security issues is evidenced by two facts. First, as for any other type of wireless network, the air is used as communications medium and can easily be accessed by attackers. On the other hand, the particular attributes of CRNs offer new opportunities to malicious users, ranging from providing wrong information on the radio environment to disrupting the cognitive mechanisms, which could severely undermine the operation of these networks. In this Ph.D thesis we have approached the challenge of securing Cognitive Radio Networks. Because CR technology is still evolving, to achieve this goal involves not only providing countermeasures for existing attacks but also to identify new potential threats and evaluate their impact on CRNs performance. The main contributions of this thesis can be summarized as follows. First, a critical study on the State of the Art in this area is presented. A qualitative analysis of those threats to CRNs already identified in the literature is provided, and the efficacy of existing countermeasures is discussed. Based on this work, a set of guidelines are designed in order to design a detection system for the main threats to CRNs. Besides, a high level description of the components of this system is provided, being it the second contribution of this thesis. The third contribution is the proposal of a new cross-layer attack to the Transmission Control Protocol (TCP) in CRNs. An analytical model of the impact of this attack on the throughput of TCP connections is derived, and a set of countermeasures in order to detect and mitigate the effect of such attack are proposed. One of the main threats to CRNs is the Primary User Emulation (PUE) attack. This attack prevents CRNs from using available portions of the spectrum and can even lead to a Denial of Service (DoS). In the fourth contribution of this the method is proposed in order to deal with such attack. The method relies on a set of time measures provided by the members of the network and allows estimating the position of an emitter. This estimation is then used to determine the legitimacy of a given transmission and detect PUE attacks. Cooperative methods are prone to be disrupted by malicious nodes reporting false data. This problem is addressed, in the context of cooperative location, in the fifth and last contribution of this thesis. A method based on Least Median Squares (LMS) fitting is proposed in order to detect forged measures and make the location process robust to them. The efficiency and accuracy of the proposed methodologies are demonstrated by means of simulation

    Detection performance and mitigation techniques in CR networks

    Get PDF
    Pervasive wireless communications rely enormously on spectrum utilization; the increase in demand for new wireless services and their application has led to spectrum scarcity. Spectrum limitations can be resolved by cognitive radio (CR) which is a technology that allows secondary users (SUs) to use the spectrum when it is not occupied by primary users (PUs). In this thesis, the security issues that decrease CR performance are discussed; there are two major threats i.e. primary user emulation attack (PUEA) and spectrum sensing data falsification attack (SSDF). Firstly, the CR network (CRN) is simulated whereby PUs and SUs are presented in the system with the presence of multiple malicious users that are randomly located within a circle of radius (R). The simulation results, based on an analytical model, show that the false alarm probability is significantly affected by the network radius Rand malicious users' number, and it is proved that there is a range of R over which the PUEAs are most successful. Secondly, a transmitter verification scheme (direct scheme) and indirect trust scheme that considers the users' history are presented; the results proved that if the signal to noise ratio (SNR) is raised, correspondingly the t:rnstworthiness of the PU is considerably increased. Based on these two schemes, the trnstworthiness of the PU is much higher than that of the malicious user and because the indirect scheme considers the historical behaviour of the user, it improves the user's trustworthiness.Finally, cooperative spectrum sensing (CSS) approaches are proposed, namely, a trust based approach, a punishment based approach and a dedicated punishment based approach. It is proved that these proposed CSS approaches outperform the traditional majority scheme despite a high number of malicious users. In addition, the dedicated punishment approaches which punish only the malicious users outperform the other approaches

    Intelligent Approaches for Energy-Efficient Resource Allocation in the Cognitive Radio Network

    Get PDF
    The cognitive radio (CR) is evolved as the promising technology to alleviate the spectrum scarcity issues by allowing the secondary users (SUs) to use the licensed band in an opportunistic manner. Various challenges need to be addressed before the successful deployment of CR technology. This thesis work presents intelligent resource allocation techniques for improving energy efficiency (EE) of low battery powered CR nodes where resources refer to certain important parameters that directly or indirectly affect EE. As far as the primary user (PU) is concerned, the SUs are allowed to transmit on the licensed band until their transmission power would not cause any interference to the primary network. Also, the SUs must use the licensed band efficiently during the PU’s absence. Therefore, the two key factors such as protection to the primary network and throughput above the threshold are important from the PU’s and SUs’ perspective, respectively. In deployment of CR, malicious users may be more active to prevent the CR users from accessing the spectrum or cause unnecessary interference to the both primary and secondary transmission. Considering these aspects, this thesis focuses on developing novel approaches for energy-efficient resource allocation under the constraints of interference to the PR, minimum achievable data rate and maximum transmission power by optimizing the resource parameters such as sensing time and the secondary transmission power with suitably selecting SUs. Two different domains considered in this thesis are the soft decision fusion (SDF)-based cooperative spectrum sensing CR network (CRN) models without and with the primary user emulation attack (PUEA). An efficient iterative algorithm called iterative Dinkelbach method (IDM) is proposed to maximize EE with suitable SUs in the absence of the attacker. In the proposed approaches, different constraints are evaluated considering the negative impact of the PUE attacker on the secondary transmission while maximizing EE with the PUE attacker. The optimization problem associated with the non-convex constraints is solved by our proposed iterative resource allocation algorithms (novel iterative resource allocation (NIRA) and novel adaptive resource allocation (NARA)) with suitable selection of SUs for jointly optimizing the sensing time and power allocation. In the CR enhanced vehicular ad hoc network (CR-VANET), the time varying channel responses with the vehicular movement are considered without and with the attacker. In the absence of the PUE attacker, an interference-aware power allocation scheme based on normalized least mean square (NLMS) algorithm is proposed to maximize EE considering the dynamic constraints. In the presence of the attacker, the optimization problem associated with the non-convex and time-varying constraints is solved by an efficient approach based on genetic algorithm (GA). Further, an investigation is attempted to apply the CR technology in industrial, scientific and medical (ISM) band through spectrum occupancy prediction, sub-band selection and optimal power allocation to the CR users using the real time indoor measurement data. Efficacies of the proposed approaches are verified through extensive simulation studies in the MATLAB environment and by comparing with the existing literature. Further, the impacts of different network parameters on the system performance are analyzed in detail. The proposed approaches will be highly helpful in designing energy-efficient CRN model with low complexity for future CR deployment
    corecore