5 research outputs found

    PRIMARY USER AUTHENTICATION IN COGNITIVE RADIO NETWORKS: A SURVEY

    Get PDF
    ABSTRACT: For effective usage of radio frequency spectrum, cognitive radio networks have been proposed, allowing the secondary users to occupy the spectrum whenever the primary user is not using it. To avoid interference with the primary user secondary user should constantly check the usage of the spectrum. But achieving a faithful monitoring is not so easy. Hence Primary user Emulation (PUE) attack comes into existence. To counter this attack primary user's signal can be authenticated in the physical layer itself. In this paper, we provide various approaches (dealt in different papers) for authenticating primary users' signals that conforms FCC's requirement

    A Message Passing Approach for Decision Fusion in Adversarial Multi-Sensor Networks

    Full text link
    We consider a simple, yet widely studied, set-up in which a Fusion Center (FC) is asked to make a binary decision about a sequence of system states by relying on the possibly corrupted decisions provided by byzantine nodes, i.e. nodes which deliberately alter the result of the local decision to induce an error at the fusion center. When independent states are considered, the optimum fusion rule over a batch of observations has already been derived, however its complexity prevents its use in conjunction with large observation windows. In this paper, we propose a near-optimal algorithm based on message passing that greatly reduces the computational burden of the optimum fusion rule. In addition, the proposed algorithm retains very good performance also in the case of dependent system states. By first focusing on the case of small observation windows, we use numerical simulations to show that the proposed scheme introduces a negligible increase of the decision error probability compared to the optimum fusion rule. We then analyse the performance of the new scheme when the FC make its decision by relying on long observation windows. We do so by considering both the case of independent and Markovian system states and show that the obtained performance are superior to those obtained with prior suboptimal schemes. As an additional result, we confirm the previous finding that, in some cases, it is preferable for the byzantine nodes to minimise the mutual information between the sequence system states and the reports submitted to the FC, rather than always flipping the local decision

    Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers

    Get PDF
    In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols.ARC Discovery Projects Grant DP15010390

    Some MIMO applications in cognitive radio networks

    Get PDF
    In the last decade, the wireless communication technology has witnessed a rapid development, which led to a rapid growth in wireless applications and services. However, the radio spectrum resources scarcity resulting from using the traditional methods of fixed spectrum resources allocation has potential constraints on this wireless services rapid growth. Consequently, cognitive radio has been emerged as a possible solution for alleviating this spectrum scarcity problem by employing dynamic resource allocation strategies in order to utilize the available spectrum in a more efficient way so that finding opportunities for new wireless application services could be achieved. In cognitive radio networks, the radio spectrum resources utilization is improved by allowing unlicensed users, known as secondary users, to share the spectrum with licensed users, known as primary users, as long as this sharing do not induce harmful interference on the primary users, which completely entitled to utilize the spectrum. Motivated by MIMO techniques that have been used in practical systems as a means for high data rate transmission and a source for spatial diversity, and by its ease implementation with OFDM, different issues in multi-user MIMO (MU-MIMO) in both the uplink and downlink in the context of cognitive radio are studied in this thesis. More specifically, in the first thrust of this thesis, the spectrum spatial holes which could exist in an uplink MU-MIMO cell as a result of the possible free spatial dimensions resulted from the sparse activity of the primary users is studied; a modified sensing algorithm for these spectrum spatial holes that exploit both the block structure of the OFDM signals and the correlation of their activity states along time are proposed. The second thrust is concerned with cognitive radio relaying in the physical layer where the cognitive radio base station (CBS) relays the PU signal while transmitting its own signals to its SUs. We define secondary users with different priorities (different quality of service requirements); the different levels of priority for SUs are achieved by a newly proposed simple linear scheme based on zero forcing called Hierarchal Priority Zero Forcing scheme HPZF
    corecore