547 research outputs found

    Voting rule optimisation for double threshold energy detector-based cognitive radio networks

    Get PDF
    The method by which individual decisions are combined in cooperative cognitive radio networks is crucial to minimising the overall probabilities of false alarm and missed detection. In this paper, general expressions for these probabilities are derived for a double threshold energy detector-based network, and an analytical solution for the optimal value of voting rule is found so that the overall probability of error is minimised. Simulation results show that there are significant advantages to the use of double threshold energy detector-based networks as opposed to their single threshold-based counterparts; additional simulations verify that the analytical solution is optimal

    Implementation issues for optimized hard decision energy detector-based cooperative spectrum sensing

    Get PDF
    Recent studies in cooperative energy detection have focused on the optimization of the threshold value and fusion center voting rule in an effort to minimize the sensing error probability. However, such studies operate under the assumption that the signal to noise ratio is equal at every node, which is rarely the case in practice. In this paper, generalized formulas for the optimal threshold value and optimal fusion center voting rule are derived for hard decision energy detector-based spectrum sensing networks where the signal to noise ratio is distinct at each node. It is shown that the implementation of this solution requires more data to be transmitted than the optimal soft decision scheme, which is known to have superior performance

    Fast and accurate approximations for the analysis of energy detection in Nakagami-m channels

    Get PDF
    Previous research has identified several exact methods for the evaluation of the probability of detection for energy detectors operating on Nakagami-m faded channels. However, these methods rely on discrete summations of complicated functions, and so can take a prohibitively long time to evaluate. In this paper, three approximation for the probability of detection in Nakagami-m faded channels, having distinct regions of applicability, are derived. All have closed forms, and enable the fast and accurate computation of key performance metrics

    On the convergence of the chi square and noncentral chi square distributions to the normal distribution

    Get PDF
    A simple and novel asymptotic bound for the maximum error resulting from the use of the central limit theorem to approximate the distribution of chi square and noncentral chi square random variables is derived. The bound enables the quick calculation of the number of degrees of freedom required to ensure a given approximation error, and is significantly tighter than bounds derived using the Berry-Esseen theorem. An application to widely-used approximations for the decision probabilities of energy detectors is also provided

    Performance limits of cooperative energy detection in fading environments

    Get PDF
    In this paper, the performance of energy detector-based spectrum sensor networks is examined under the constraints of the IEEE 802.22 draft specification. Additive white Gaussian noise (AWGN) channels are first considered, and a closed form solution for sample complexity is derived for networks of any size. Rayleigh, Nakagami and Rice fading channel models are also examined, with numerical results demonstrating the effect of these models on the required sample complexity for varying numbers of cooperating nodes. Based on these results, the relationship between the sample complexity for AWGN, Rayleigh and Nakagami channels is examined. Through data fitting, an approximate model is derived, allowing the sample complexity for Rayleigh and Nakagami channels to be computed easily. The model is shown to be accurate across a range of practical values

    Analyzing using software defined radios as wireless sensor network inspection and testing devices: An Internet of Things penetration testing perspective

    Get PDF
    Wireless sensor network (WSN) research and development is producing viable solutions for various innovative applications, including critical areas such as the Internet of Things (IoT), which is becoming a significant feature of modern technology. WSNs form an integral component of the IoT infrastructure by, frequently, implementing the communication links between sensors and the access point or central coordinator. This design and use in IoT applications intensifies the incentive to attack WSNs as sensitive data is available and transmitted in wireless links, which inherently contain security vulnerabilities, especially from external malicious interference. To ensure satisfactory performance, safety and privacy, communication links and WSN devices must be secure. Hence, penetration testing to identify security vulnerabilities and responses to external intrusions is a prerequisite to forming secure connections and an overall secure network. Derived from a prior study, this paper explores the benefits of using software-defined radios (SDRs) for WSN/IoT data analysis and penetration testing by concentrating on implementing various intrusions using signal processing block based software like Simulink or GNU Radio. A comparison with traditional WSN packet sniffing/debugging tools is provided and the main security vulnerabilities of existing WSNs are surveyed by adopting the ZigBee protocol. An extension to WSN security analysis and testing is established by utilizing low-cost SDRs and specifying the ease of implementing various analysis techniques even when certain equipment, such as anechoic chambers, are unavailable. Stemming from previous simulations, the benefits of obtaining the in-phase and quadrature-phase samples, both with and without external interference, is also discussed

    Developing low-cost testbeds for enhancing security techniques in wireless sensor network protocols

    Get PDF
    Wireless sensor network (WSN) applications have expanded considerably over the past decade or so and now, solutions exit for various innovative applications. These wireless networks adopt commercial off the shelf devices and standardized protocols, which inherently creates security challenges. These challenges are ever changing as malicious interference and intrusion techniques evolve and dynamic efficient hardware becomes increasingly accessible. This paper presents the development of multiple low-cost hardware and software platforms designed so security enhancements and modifications to WSN protocol architecture and packet structure can be designed and tested. Each testbed has been built satisfying the requirements of being available as unmodified commercial off the shelf (COTS) components and based on open source software. The testbeds provide versatility through operating on various operating systems including Windows and Linux, are reproducible and can be deployed in a way which replicates real world WSNs. Each distinct system provides remote access, real time and off line data analysis, specific control of each network node and the ability to upload data from the WSN. This paper describes in-detail the individual pieces of suitable hardware for WSN protocol and packet structure design and illustrates the system architecture required to form testbeds which can experimentally validate modifications to a WSN protocol. Additionally, a baseline is defined and encapsulates the ZigBee standard. Example results of the distinct testbeds in operation are provided along with the specific open source software being used
    • …
    corecore