599 research outputs found

    Voting rule optimisation for double threshold energy detector-based cognitive radio networks

    Get PDF
    The method by which individual decisions are combined in cooperative cognitive radio networks is crucial to minimising the overall probabilities of false alarm and missed detection. In this paper, general expressions for these probabilities are derived for a double threshold energy detector-based network, and an analytical solution for the optimal value of voting rule is found so that the overall probability of error is minimised. Simulation results show that there are significant advantages to the use of double threshold energy detector-based networks as opposed to their single threshold-based counterparts; additional simulations verify that the analytical solution is optimal

    Implementation issues for optimized hard decision energy detector-based cooperative spectrum sensing

    Get PDF
    Recent studies in cooperative energy detection have focused on the optimization of the threshold value and fusion center voting rule in an effort to minimize the sensing error probability. However, such studies operate under the assumption that the signal to noise ratio is equal at every node, which is rarely the case in practice. In this paper, generalized formulas for the optimal threshold value and optimal fusion center voting rule are derived for hard decision energy detector-based spectrum sensing networks where the signal to noise ratio is distinct at each node. It is shown that the implementation of this solution requires more data to be transmitted than the optimal soft decision scheme, which is known to have superior performance

    Fast and accurate approximations for the analysis of energy detection in Nakagami-m channels

    Get PDF
    Previous research has identified several exact methods for the evaluation of the probability of detection for energy detectors operating on Nakagami-m faded channels. However, these methods rely on discrete summations of complicated functions, and so can take a prohibitively long time to evaluate. In this paper, three approximation for the probability of detection in Nakagami-m faded channels, having distinct regions of applicability, are derived. All have closed forms, and enable the fast and accurate computation of key performance metrics

    On the convergence of the chi square and noncentral chi square distributions to the normal distribution

    Get PDF
    A simple and novel asymptotic bound for the maximum error resulting from the use of the central limit theorem to approximate the distribution of chi square and noncentral chi square random variables is derived. The bound enables the quick calculation of the number of degrees of freedom required to ensure a given approximation error, and is significantly tighter than bounds derived using the Berry-Esseen theorem. An application to widely-used approximations for the decision probabilities of energy detectors is also provided

    Performance limits of cooperative energy detection in fading environments

    Get PDF
    In this paper, the performance of energy detector-based spectrum sensor networks is examined under the constraints of the IEEE 802.22 draft specification. Additive white Gaussian noise (AWGN) channels are first considered, and a closed form solution for sample complexity is derived for networks of any size. Rayleigh, Nakagami and Rice fading channel models are also examined, with numerical results demonstrating the effect of these models on the required sample complexity for varying numbers of cooperating nodes. Based on these results, the relationship between the sample complexity for AWGN, Rayleigh and Nakagami channels is examined. Through data fitting, an approximate model is derived, allowing the sample complexity for Rayleigh and Nakagami channels to be computed easily. The model is shown to be accurate across a range of practical values

    Analyzing using software defined radios as wireless sensor network inspection and testing devices: An Internet of Things penetration testing perspective

    Get PDF
    Wireless sensor network (WSN) research and development is producing viable solutions for various innovative applications, including critical areas such as the Internet of Things (IoT), which is becoming a significant feature of modern technology. WSNs form an integral component of the IoT infrastructure by, frequently, implementing the communication links between sensors and the access point or central coordinator. This design and use in IoT applications intensifies the incentive to attack WSNs as sensitive data is available and transmitted in wireless links, which inherently contain security vulnerabilities, especially from external malicious interference. To ensure satisfactory performance, safety and privacy, communication links and WSN devices must be secure. Hence, penetration testing to identify security vulnerabilities and responses to external intrusions is a prerequisite to forming secure connections and an overall secure network. Derived from a prior study, this paper explores the benefits of using software-defined radios (SDRs) for WSN/IoT data analysis and penetration testing by concentrating on implementing various intrusions using signal processing block based software like Simulink or GNU Radio. A comparison with traditional WSN packet sniffing/debugging tools is provided and the main security vulnerabilities of existing WSNs are surveyed by adopting the ZigBee protocol. An extension to WSN security analysis and testing is established by utilizing low-cost SDRs and specifying the ease of implementing various analysis techniques even when certain equipment, such as anechoic chambers, are unavailable. Stemming from previous simulations, the benefits of obtaining the in-phase and quadrature-phase samples, both with and without external interference, is also discussed

    Identifying distinct features based on received samples for interference detection in wireless sensor network edge devices

    Get PDF
    Wireless Sensor Network (WSN) technologies have developed considerably over the past decade or so and, now, feasible solutions exist for various applications, both critical and otherwise. Often these solutions are achieved by using commercial off the shelf components combined with standardized open-access protocols. As deployments diverge into safety-critical areas, attack incentives intensify, leading to persistent malicious intrusion challenges, which are ever-changing as interference techniques evolve and dynamic hardware becomes increasingly accessible. Unique WSN security vulnerabilities, a fluctuating radio frequency (RF) spectrum and physical environment and spectrum co-existence escalate the problem. Thus, securing WSNs is a critical and demanding requirement, heightened by the burden of protecting sensitive transmitted information. This paper, by utilizing ZigBee and Monte Carlo simulations, aims to develop an initial framework for interference detection in WSNs. Initially, bit error location analysis motivates a feature-based detection strategy, relating to both subtle and crude forms of interference. The work expands to analyze Matlab simulated error-free and erroneous transmissions to investigate whether feature useful differences exist. A feature set, including the measured probability density function of, and statistics on, the in-phase and quadrature-phase samples is demonstrated and initially validated/feasibility tested using a designed support vector machine
    corecore