• Title, Summary, Keyword: erroneous spectrum sensing

Search Result 3, Processing Time 0.026 seconds

A Proactive Dynamic Spectrum Access Method against both Erroneous Spectrum Sensing and Asynchronous Inter-Channel Spectrum Sensing

  • Gu, Junrong;Jang, Sung-Jeen;Kim, Jae-Moung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.361-378
    • /
    • 2012
  • Most of the current frequency hopping (FH) based dynamic spectrum access (DSA) methods concern a reactive channel access scheme with synchronous inter-channel spectrum sensing, i.e., FH is reactively triggered by the primary user (PU)'s return reported by spectrum sensing, and the PU channel to be switched to is assumed precisely just sensed or ready to be sensed, as if the inter-channel spectrum sensing moments are synchronous. However, the inter-channel spectrum sensing moments are more likely to be asynchronous, which risks PU suffering more interference. Moreover, the spectrum sensing is usually erroneous, which renders the problem more complex. To address this problem, we propose a proactive FH based DSA method against both erroneous spectrum sensing and asynchronous inter-channel spectrum sensing (moments). We term it as proactive DSA. The optimal FH sequence is obtained by dynamic programming. The complexity is also analyzed. Finally, the simulation results confirm the effectiveness of the proposed method.

Secure Cooperative Sensing Scheme for Cognitive Radio Networks (인지 라디오 네트워크를 위한 안전한 협력 센싱 기법)

  • Kim, Taewoon;Choi, Wooyeol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.8
    • /
    • pp.877-889
    • /
    • 2016
  • In this paper, we introduce the basic components of the Cognitive Radio Networks along with possible threats. Specifically, we investigate the SSDF (Spectrum Sensing Data Falsification) attack which is one of the easiest attack to carry out. Despite its simplicity, the SSDF attack needs careful attention in order to build a secure system that resists to it. The proposed scheme utilizes the Anomaly Detection technique to identify malicious users as well as their sensing reports. The simulation results shows that the proposed scheme can effectively detect erroneous sensing reports and thus result in correct detection of the active primary users.

Improving Voice-Service Support in Cognitive Radio Networks

  • Homayounzadeh, Alireza;Mahdavi, Mehdi
    • ETRI Journal
    • /
    • v.38 no.3
    • /
    • pp.444-454
    • /
    • 2016
  • Voice service is very demanding in cognitive radio networks (CRNs). The available spectrum in a CRN for CR users varies owing to the presence of licensed users. On the other hand, voice packets are delay sensitive and can tolerate a limited amount of delay. This makes the support of voice traffic in a CRN a complicated task that can be achieved by devising necessary considerations regarding the various network functionalities. In this paper, the support of secondary voice users in a CRN is investigated. First, a novel packet scheduling scheme that can provide the required quality of service (QoS) to voice users is proposed. The proposed scheme utilizes the maximum packet transmission rate for secondary voice users by assigning each secondary user the channel with the best level of quality. Furthermore, an analytical framework developed for a performance analysis of the system, is described in which the effect of erroneous spectrum sensing on the performance of secondary voice users is also taken into account. The QoS parameters of secondary voice users, which were obtained analytically, are also detailed. The analytical results were verified through the simulation, and will provide helpful insight in supporting voice services in a CRN.