Next Article in Journal
Sensitivity of High-Scale SUSY in Low Energy Hadronic FCNC
Next Article in Special Issue
Development of Patient Status-Based Dynamic Access System for Medical Information Systems
Previous Article in Journal
Harmonic Maps and Biharmonic Maps
Previous Article in Special Issue
Online Social Snapshots of a Generic Facebook Session Based on Digital Insight Data for a Secure Future IT Environment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Cooperative Spectrum Sensing via a Novel User-Classification Scheme in Cognitive Radios for Future Communication Technologies

Department of Electrical/Electronics and Computer Engineering, University of Ulsan, 93-Daehak-ro, Nam-gu, Ulsan 680-749, Korea
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
These authors contributed equally to this work.
Symmetry 2015, 7(2), 675-688; https://doi.org/10.3390/sym7020675
Submission received: 24 March 2015 / Accepted: 11 May 2015 / Published: 14 May 2015
(This article belongs to the Special Issue Advanced Symmetry Modelling and Services in Future IT Environments)

Abstract

: Future communication networks would be required to deliver data on a far greater scale than is known to us today, thus mandating the maximal utilization of the available radio spectrum using cognitive radios. In this paper, we have proposed a novel cooperative spectrum sensing approach for cognitive radios. In cooperative spectrum sensing, the fusion center relies on reports of the cognitive users to make a global decision. The global decision is obtained by assigning weights to the reports received from cognitive users. Computation of such weights requires prior information of the probability of detection and the probability of false alarms, which are not readily available in real scenarios. Further, the cognitive users are divided into reliable and unreliable categories based on their weighted energy by using some empirical threshold. In this paper, we propose a method to classify the cognitive users into reliable, neutral and unreliable categories without using any pre-defined or empirically-obtained threshold. Moreover, the computation of weights does not require the detection, or false alarm probabilities, or an estimate of these probabilities. Reliable cognitive users are assigned the highest weights; neutral cognitive users are assigned medium weights (less than the reliable and higher than the unreliable cognitive users’ weights); and unreliable users are assigned the least weights. We show the performance improvement of our proposed method through simulations by comparing it with the conventional cooperative spectrum sensing scheme through different metrics, like receiver operating characteristic (ROC) curve and mean square error. For clarity, we also show the effect of malicious users on detection probability and false alarm probability individually through simulations.

1. Introduction

Information and communication technologies have experienced phenomenal growth in the past fifteen years. This growth has spawned tools and services that have redefined how we communicate and interact with each other. Billions of users share petabytes of data in the form of pictures and videos through social networking sites and services, like Facebook, Twitter, WhatsApp, YouTube and numerous others. The scale of multimedia content that today’s communication technologies have to cater for can be gauged from the fact that on YouTube alone, 300 h of video is uploaded every minute, which is equivalent to 49 years of multimedia content every day [1]. We are practically living in the era of “Big Data”. The future, with the proliferation of the Internet of Things (IoT) and ubiquitous computing, will see an even greater surge in the generation, sharing and processing of data. The scale of data that future networks have to handle would pose diverse challenges, like security, privacy, radio spectrum scarcity, etc. Future communication networks would undoubtedly require the most efficient use and maximal utilization of the radio spectrum, which would be the predominant medium for most of the data communication.

The solution to the inherent problems of spectrum scarcity and spectrum under-utilization came in the shape of cognitive radio. Cognitive radio is a promising technology, which overcomes the spectrum scarcity and spectrum under-utilization by allowing the non-licensed users to use the licensed spectrum when it is not used by the licensed users [2,3]. Due to the less privileged status of the non-licensed or cognitive users, they are bound to leave the licensed spectrum instantly when the privileged or primary user (PU) needs the spectrum. This necessitates the cognitive user (CU) to have accurate and timely information of the spectrum’s utilization by the PU. This makes spectrum sensing one of the most important feature of the cognitive radios to protect the PU [46].

The sensing performance and reliability of a single CU highly deteriorates in an environment where the channel suffers from destructive effects, such as fading and shadowing or when the hidden terminal problem occurs. Therefore, cooperative spectrum sensing was proposed to overcome the channel destructive effects, to avoid the hidden terminal problem and to improve spectrum sensing performance [7,8]. In cooperative spectrum sensing, the location diversity of multiple CUs is exploited by their cooperation, which helps to detect even a weak primary signal and consequently improves the detection performance of the cognitive radio network, decreases interference to the PU caused by misdetection and increases the protection of the PU. The individual reports generated by CUs are forwarded to a central decision entity, usually called the fusion center (FC). The size of an individual CU’s report may be one bit (in the case of a hard decision), l bits (1 < l < m, in the case of a quantized decision) [9,10] or m bits (in the case of a soft decision). The fusion center computes the global decision by using weighted sum of the CUs’ reports.

However, the advantages of the cooperation are also accompanied by certain challenges. For example, the cooperation incurs potential security vulnerabilities. The security vulnerabilities can be exploited by different types of attacks that can be launched in a cognitive radio network, for example primary user emulation (PUE) attack, jamming disruption attack and spectrum sensing data falsification (SSDF) or Byzantine attack [11]. In this work, we consider the SSDF attack in which the malicious users send wrong sensing reports to the fusion center either to degrade the sensing performance of the network or to achieve their selfish greedy objectives.

The presence of the malicious user(s) in a cooperative environment severely degrades the sensing performance of the cognitive radio network [12]. A variety of approaches have been proposed in the literature [1315] to restrict malicious users in different applications. In [15], the authors proposed an encrypted identification tag for the authentication of CUs and a reliability test for the detection of unreliable and malicious users. In [16], the authors proposed a distributed and lightweight method for the detection of intrusion in wireless sensor networks based on traffic monitoring and fuzzy inference system. Authentication-based security approaches are discussed in [1719]. In [20], a cryptographic technique, like blind signature and electronic coin, is used to achieve mobility, reliability, anonymity and flexibility in a mobile wireless network. The weight-based cooperative spectrum sensing methods [2123], where the weight coefficients of the CUs are computed using the Bayesian criterion or maximum likelihood ratio test, provide optimal detection performance. However, such methods, for the computation of weight coefficients, require prior knowledge of the PU’s steady-state probability, detection probability and false alarm probability or an estimate of these probabilities. Unfortunately, the prior unavailability of these probabilities in real scenarios makes such methods less practical. In [22], the authors use an empirical threshold to classify the CUs into reliable and unreliable categories.

In this work, we propose a simple method that classifies the CUs into reliable, neutral and unreliable categories with no need for any pre-defined or empirical threshold. Each category is assigned a different weight. The computation of weights for different CUs in a particular category is carried out similar to the technique presented in our previous work [15]. The reliable CUs get the highest weights, whereas the unreliable CUs are assigned the lowest weights. The weights of the neutral CUs lay in between the reliable and unreliable CUs’ weights. For the computation and assignment of weights to different CUs, our proposed approach does not require the detection and false alarm probabilities. The weight coefficients are computed and updated by the current observation of the CUs.

The rest of this paper is outlined as follows. The system model is described in Section 2. In Section 3, the proposed CU classification and weight computation are presented. Simulations results and a discussion are presented in Section 4. Finally, the paper is concluded in Section 5.

2. System Model

We consider a cognitive radio network as shown in Figure 1 that consists of N CUs, of which l CUs may experience fading or the shadowing effect and M (M << N) CUs are malicious users (MU). We assume three types of malicious users: always present (AP), always absent (AA) and always different (AD). In the first two types, malicious users always send a high or low signal, respectively, regardless of the actual status of the PU, whereas in the last type, the malicious user always sends an opposite signal of PU status. We assume an error-free common control channel between CU and FC. We use the soft fusion rule, where each CU reports its observation to the fusion center in m bits.

Detection of the primary signal by the CU is a binary hypothesis testing problem. The signal received by the i-th CU is given as:

{ x i ( n ) = u ( n ) , H 0 x i ( n ) = h i ( n ) s ( n ) + u ( n ) , H 1
where H0 and H1 correspond to the hypotheses of the absence and presence of the PU signal, respectively, s(n) represents the primary signal received at the CU, hi(n) represents the channel gain and u(n) is the additive white Gaussian noise (AWGN) with zero-mean and σ u 2-variance. We assume that s(n) and u(n) are completely independent. Without loss of generality, the variance of noise is assumed to be the same at every CU.

The local observation of the i-th CU is denoted by Yi and is obtained using the energy detection technique [24] given as:

Y i = j = 1 S | x i ( j ) | 2
where S is the number of samples measured in sensing period (τ). Yi can be approximated as a Gaussian random variable for larger S (e.g., S > 200), under both hypotheses H0 and H1 with means μ0, μ1 and variances σ 0 2, σ 1 2, respectively [25] as follows:
{ H 0 : μ 0 = S σ u 2 , σ 0 2 = 2 S σ u 4 H 1 : μ 1 = S ( γ i + 1 ) σ u 2 , σ 1 2 = 2 S ( 2 γ i + 1 ) σ u 4
where γi is the signal-to-noise ratio (SNR) of the primary signal at the i-th CU. In the conventional cooperative spectrum sensing (CCSS), each CU performs local sensing in the sensing period and forwards its observation Yi in the reporting period, as shown in Figure 2, to the FC, where reports from all CUs are combined to obtain Z, to make a global decision (H0 and H1) as below:
Z = 1 N i = 1 N Y i
{ Z λ , H 1 Z < λ , H 0
where λ is the global threshold. The detection performance of the CR network is measured by the probability of detection (Pd) and probability of false alarm (Pf). The probability of detection is an indicator of interference to the PU. A high value of detection probability means minimum interference to the PU and high protection of the quality of service (QoS) of the PU. On the other hand, the probability of false alarm is an indicator of the spectrum utilization. A high value of false alarm probability means less spectrum utilization. For more protection of the PU and improved utilization of the spectrum, a high value of the detection probability and a low value of the false alarm probability are required. The detection and false alarm probabilities of the i-th CU are given, respectively, as:
P d , i = Pr ( Y i > λ | H 1 ) = Q ( λ i S σ u 2 ( γ i + 1 ) σ u 2 2 S ( 2 γ i + 1 ) )
P f , i = Pr ( Y i > λ | H 0 ) = Q ( λ i S σ u 2 σ u 2 2 S )
where Q(.) is a monotonically-decreasing function defined as Q ( x ) = 1 2 π x exp ( t 2 2 ) d t.

Since the fusion center receives local observations from the CUs, the local decision of the CUs is computed at the fusion center by applying the same energy threshold. The local decision of the i-th CU is denoted by DL,i and is given as below:

D L , i = { H 1 ; Y i λ H 0 ; Y i < λ

The energy threshold λ is assumed to be same for local and global decisions. In order to minimize the influence and bias of the i-th CU on global decision and weight assignments, the local decision and local observation of the i-th CU is skipped. The global decision computed by excluding the i-th CU observation/local decision is called partial global decision and is denoted by DG,i. Weighted observation of the CUs excluding the i-th CU is given as:

Z i = j = 1 , j i N w j ( k 1 ) × Y j
where wj(k − 1) is the weight coefficient assigned to the j-th CU in the previous slot. The weight coefficient, or simply weight, computation for all CUs is explained in Section 3.2. The partial global decision is computed using the following expression:
D G , i = { H ^ 1 ; Z i > λ H ^ 0 ; Z i < λ
where H ^ q , q = { 0 , 1 } is the global decision without considering the i-th CU. This results in N number of partial global decisions. The final global decision is obtained by applying the majority rule on the partial global decisions as below:
D G = { H 1 ; C ( H ^ 1 ) > C ( H ^ 0 ) H 0 ; C ( H ^ 1 ) C ( H ^ 0 )
where C ( H ^ q ) , q = { 0 , 1 } shows the number or count of H ^ q. The accuracy of the global decision is assumed to be more than that of the partial global decisions and is assumed to be an exact approximation of the PU’s real status.

For simulation, we calculate the global probability of detection and the global probability of false alarms as follows:

P D = n ( D G = = 1 & & H = = 1 ) n ( D G = = 1 & & H = = 1 ) + n ( D G = = 0 & & H = = 1 )
P F = n ( D G = = 1 & & H = = 0 ) n ( D G = = 1 & & H = = 0 ) + n ( D G = = 0 & & H = = 0 )

In the above equation, H shows the real status of the PU and is a stream of ones and zeros, where one represents the presence of the PU and zero represents the absence of the PU. The n ( ( . ) & & ( . ) ) represents the number of times that the condition in the subscript is satisfied.

3. Classification of the Cognitive Users and Weight Coefficients’ Computation

The fusion center classifies the CUs into three categories, i.e., reliable, neutral and unreliable, and assigns weights to each category as described in the subsections to follow.

3.1. Classification of the Cognitive Users

The CUs are classified into reliable, neutral and unreliable categories on the basis of local decisions, partial global decisions and global decisions, i.e., DL,i, DG,i and DG, as below.

3.1.1. Reliable Cognitive Users

If the local decision of a CU is similar to the global decision, but is different from the partial global decision, this means that the CU is highly reliable and influential. This implies that the absence of such a CU produces a result that is different from the accurate result (global decision). Such CUs are classified as reliable users, and the CUs in this category are assigned the highest weight coefficients, as shown in Figure 3. The weight coefficient of each CU in this category is computed in Section 3.2.

The mathematical expression for reliable CUs can be expressed as below.

U r , i = arg i N { ( ( D L , i = = D G ) & & ( D G , i D G ) ) = = 1 }

The set of reliable CUs and their observations (energy) are denoted by Ur and Er, respectively, and are given by the following expressions.

U r = { U r , i : The value of i that satisfy Equation 12 }
E r = { Y i : The value of i that satisfy Equation 12 }

Let N + be the total number of reliable CUs, i.e., the size of Ur or Er.

3.1.2. Neutral Cognitive Users

If the local decision of a CU and partial global decision are equal to the global decision, then the CU is classified as a neutral user. The same partial global decision and global decision implies that the presence or absence of the CU has no impact on the decision and shows a neutral behavior in decision making. The weights assigned to neutral CUs will be less than the reliable CUs, but greater than the unreliable CUs. The mathematical expression for the neutral CUs is given as:

U n , j = arg j N { ( ( D L , j = = D G ) & & ( D G , j = = D G ) ) = = 1 }

The set of neutral CUs and their observations (energy) are denoted by Un and En, respectively, and are given by:

U n = { U n , j : The value of j that satisfy Equation 15 }
E n = { Y j : The value of j that satisfy Equation 15 }

Let N o be the total number of neutral CUs, i.e., a size of Un or En.

3.1.3. Unreliable Cognitive Users

If the local decision of a CU is different from the global decision, the CU is classified as an unreliable CU. The unreliable users are assigned the least weight coefficients. The mathematical expression for the unreliable CUs is given as:

U u , k = arg k N { ( D L , k D G ) }

The set of unreliable CUs and their observations are denoted by Uu and Eu, respectively, and are given as below:

U u = { U u , k : The value of k that satisfy Equation 18 }
E u = { Y k : The value of k that satisfy Equation 18 }

Let N be the total number of unreliable CUs, i.e., the size of Uu or Eu. The total number of CUs is the summation of reliable, neutral and unreliable CUs, as given by the following equation:

N = N + + N o + N

3.2. Weight Updating and Assignment

Depending on the type of CUs, different weights are assigned to them, as shown in Figure 3. The highest weights are assigned to the reliable CUs, whereas the lowest weights are assigned to the unreliable CUs. Neutral CUs are assigned weights that are less than the weights of the reliable CUs and greater than the weights of the unreliable CUs.

To compute the weight coefficients for the CUs, observations of the reliable, neutral and unreliable CUs (elements of Er, En and Eu) are sorted in ascending or descending order depending on the global decision, as follows:

U r = { Y N + + N o + N s > Y N + + N o + N 1 s > , ... , > Y N o + N + 1 s , H 1 Y N + + N o + N s < Y N + + N o + N 1 s < , ... , < Y N o + N + 1 s , H 0
U n = { Y N o + N s > Y N o + N 1 s > , ... , > Y N + 1 s , H 1 Y N o + N s < Y N o + N 1 s < , ... , < Y N + 1 s , H 0
U u = { Y N s > Y N 1 s > , ... , > Y 1 s , H 1 Y N s < Y N 1 s < , ... , < Y 1 s , H 0
where Y J S represents the energy of the CU at the J-th index in the ordered set of energies. Note that Y N S is the highest energy and Y 1 S is the lowest energy in case of H1 and vice versa in the case of H0. The normalized weight coefficients of reliable CUs are computed by Equations (25) and (26).
r i = arg J = N o + N + 1 , ... , N + + N o + N ( Y J s = Y i | Y i E r , i U r )
w i = r i N ( N + 1 2 )

The normalized weight coefficients of neutral CUs are given by Equations (27) and (28).

r j = arg J = N + 1 , ... , N o + N ( Y J s = Y j | Y j E n , j U n )
w j = r j N ( N + 1 2 )

The normalized weight coefficients of unreliable CUs are given by Equations (29) and (30).

r k = arg J = 1 , 2 , ... , N ( Y J s = Y k | Y k E u , k U u )
w k = r k N ( N + 1 2 )

From the Equations (25)(30), the weights of reliable, neutral and unreliable CUs are related as w k < w j < w i. Note that the maximum weight assigned to a neutral CU is less than the minimum weight of reliable CUs, and similarly, the maximum weight assigned to an unreliable CU is less than the minimum weight of neutral CUs. This relationship is shown, mathematically, below:

max ( w k ) < min ( w j ) max ( w j ) < min ( w i )
where k U u , j U n , and i U r.

4. Simulation Results and Discussion

The performance effectiveness of our proposed approach is shown through simulations in this section. We compare our proposed approach with the conventional cooperative spectrum sensing scheme. Simulation parameters are summarized in Table 1. We observe the ROC, probability of detection, probability of false alarms and mean square error of our proposed approach and conventional CSS. The minimum detection probability and maximum false alarm probability of the system are set to 0.8 and 0.25, respectively.

Figure 4 shows the performance comparison of our proposed scheme and the conventional CSS scheme in terms of the ROC under the effect of zero, one and two malicious users (AD type). It is clear from the figure that as the number of malicious users increases, the detection performance of both schemes decreases. When there is no malicious user among the CUs, the gap between the performance curve of our proposed approach and the conventional CSS is minimum. In this case, our approach performs slightly better than conventional CSS. By introducing malicious users (i.e., one or two), the gap between our proposed and conventional CSS is increased due to the more severe effect by MUs on conventional CSS. Our proposed approach minimizes the effect of MUs by judiciously categorizing the CUs into reliable, neutral and unreliable categories and assigning them weights accordingly. The effect of malicious users is suppressed by assigning low weights to them, which makes our proposed approach more robust and efficient.

Figure 5 shows a comparison of the detection probability of our proposed scheme with the conventional CSS in the presence of no and three malicious users (one of each type), respectively. It is evident from the figure that the detection probability of conventional CSS drops to an unacceptable level (below 0.8) in the presence of malicious users, whereas the detection probability of our proposed approach maintains a stable and acceptable level (above 0.8) as the number of iterations increases after experiencing a slight initial degradation. The decreased detection probability occurs due to the presence of AF and AD types of malicious users on which conventional CSS has no control, whereas our proposed approach restricts them by properly placing in the unreliable category and assigning low weight coefficients.

Figure 6 shows a comparison of the false alarm probability of our proposed approach with the conventional CSS in the presence of no and three malicious users (one of each type). It can be observed from the figure that when there are no malicious users, both schemes show similar false alarm probabilities, but when malicious users are introduced into the network, then our proposed scheme outperforms the conventional CSS scheme in terms of false alarm probability. The increased false alarm probability is due to the presence of AP and AD types of malicious users, which cannot be curtailed by conventional CSS, while our proposed approach restrains them by assigning low weight coefficients.

In Figure 7, we compare the mean square error (MSE) of our proposed approach with that of the conventional CSS. The mean squared error has statistical equivalence to the probability of error in detection. The probability of error can be described in terms of the global misdetection probability and the global false-alarm probability as follows:

P ( e ) = P m * P ( H 1 ) + P f * P ( H 0 )
where Pm, PF are the global misdetection probability and the global false-alarm probability, respectively. In this paper, the MSE is obtained using the following equation.
M S E l = 1 l j = 1 l | H j D G , j | 2
where H j = { 0 ( PU absent ) , 1 ( PU present ) } represents the actual status of the PU and D G , j = { 0 ( PU absent ) , 1 ( PU present ) } represents the global decision of our proposed approach at the j-th iteration. When Hj = 1 and DG,j = 0, related to Pm * P(H1), or when Hj = 0 and DG,j = 1, related to PF * P(H0), an error occurs.

It can be observed from the figure that when the network is free of malicious users, both schemes show almost similar mean square error, but when malicious users are introduced into the network, then the error of conventional CSS becomes significantly greater than that of our proposed approach. The increased value of error in conventional CSS occurs due to high misdetection and high false alarm probabilities.

5. Conclusions

The unavailability of prior information of the detection and false alarm probabilities makes the schemes, which are based on these probabilities, less practical. In this paper, we proposed a simple, but efficient classification method that classifies the CUs into reliable, neutral and unreliable categories without requiring any empirical or pre-defined threshold for such classification. Malicious users are restricted by assigning the lowest weight, and the trustworthy CUs are encouraged by assigning higher weights accordingly. Weights are computed by the actual observation of the CUs, rather than detection and false alarm probabilities. The effectiveness of the proposed method of CUs’ classification and weight assignment has been demonstrated through simulations.

Acknowledgments

This work was supported by the National Research Foundation (NRF) of Korea funded by the MEST (Nos. NRF-2012R1A1A2038831 and NRF-2013R1A2A2A05004535).

Author Contributions

Both authors contributed substantively in order to materialize the concept of this work. The first author conceived of the idea of this work and designed the experiments. The second author supervised the research and helped with the experiments along with the analysis of the data. The article was written by the first author and revised and critically reviewed by the second author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. YouTube Product Statistics, Available online: http://www.youtube.com/yt/press/statistics.html (accessed on 22 March 2015).
  2. Mitola, J.; Maguire, G.Q., Jr. Cognitive radio: Making software radios more personal. IEEE Pers. Commun. 1999, 6, 13–18. [Google Scholar]
  3. Haykin, S. Cognitive radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 2005, 23, 201–220. [Google Scholar]
  4. Habiba, U.; Islam, M.I.; Amin, M.R. Performance evaluation of the VoIP services of the cognitive radio system, based on DTMC. J. Inf. Process. Syst. 2014, 10, 119–131. [Google Scholar]
  5. Tasnina, A.T.; Akhter, S.; Islam, M.I.; Amin, M.R. Spectrum sensing and data transmission in a cognitive relay network considering spatial false alarms. J. Inf. Process. Syst. 2014, 10, 459–470. [Google Scholar]
  6. Khan, R.T.; Islam, M.I.; Amin, M.R. Traffic analysis of a cognitive radio network based on the concept of medium access probability. J. Inf. Process. Syst. 2014, 10, 602–617. [Google Scholar]
  7. Ghasemi, A.; Sousa, E.S. Collaborative spectrum sensing for opportunistic access in fading environments, Proceedings of 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Baltimore, MD, USA, 8–11 November 2005; pp. 131–136.
  8. Mishra, S.M.; Sahai, A.; Brodersen, R.W. Cooperative sensing among cognitive radios, Proceedings of IEEE International Conference on Communications (ICC’06), Istanbul, Turkey, 11–15 June 2006; pp. 1658–1663.
  9. Shah, H.A.; Usman, M.; Koo, I. Bioinformatics-Inspired Quantized Hard Combination-Based Abnormality Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks. IEEE Sens. J 2014, 15, 2324–2334. [Google Scholar]
  10. Ma, J.; Zhao, G.; Li, Y. Soft combination and detection for cooperative spectrum sensing in cognitive radio networks. IEEE Trans. Wirel. Commun. 2008, 7, 4502–4507. [Google Scholar]
  11. Bhattacharjee, S.; Sengupta, S.; Chatterjee, M. Vulnerabilities in cognitive radio networks: A survey. Comput. Commun. 2013, 36, 1387–1398. [Google Scholar]
  12. Zeng, K.; Tang, Y. Impact of Misbehaviors in Cooperative Spectrum Sensing for Cognitive Radio Networks, Proceedings of 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Wuhan, China, 23–25 September 2011; pp. 1–4.
  13. Vu-Van, H.; Koo, I. A sequential cooperative spectrum sensing scheme based on cognitive user reputation. IEEE Trans. Consum. Electron. 2012, 58, 1147–1152. [Google Scholar]
  14. Kaligineedi, P.; Khabbazian, M.; Bhargava, V.K. Malicious user detection in a cognitive radio cooperative sensing system. IEEE Trans. Wirel. Commun. 2010, 9, 2488–2497. [Google Scholar]
  15. Usman, M.; Koo, I. Secure cooperative spectrum sensing for the cognitive radio network using non-uniform reliability. Sci. World J. 2014, 1–10. [Google Scholar]
  16. Ponomarchuk, Y.; Seo, D.-W. Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks. J. Converg. 2010, 1, 35–41. [Google Scholar]
  17. Singh, R.; Singh, P.; Duhan, M. An effective implementation of security based algorithmic approach in mobile ad hoc networks. Hum.-Centric Comput. Inf. Sci. 2014, 4, 1–14. [Google Scholar]
  18. Gnanaraj, J.W.K.; Ezra, K.; Rajsingh, E.B. Smart card based time efficient authentication scheme for global grid computing. Hum.-Centric Comput. Inf. Sci. 2013, 3, 1–14. [Google Scholar]
  19. Chung, Y.; Choi, S.; Won, D. Lightweight anonymous authentication scheme with unlinkability in global mobility networks. J. Converg. 2013, 4, 23–29. [Google Scholar]
  20. Peng, K. A secure network for mobile wireless service. J. Inf. Process. Syst. 2013, 9, 247–258. [Google Scholar]
  21. Chair, Z.; Varshney, P. Optimal data fusion in multiple sensor detection systems. IEEE Trans. Aerosp. Electron. Syst. 1986, 22, 98–101. [Google Scholar]
  22. Ansari, N.; Chen, J.G.; Zhang, Y.Z. Adaptive decision fusion for unequiprobable sources. IEE Proc. Radar Sonar Navig. 1997, 144, 105–111. [Google Scholar]
  23. Chen, L.; Wang, J.; Li, S. An adaptive cooperative spectrum sensing scheme based on the optimal data fusion rule, Proceedings of 4th International Symposium on Wireless Communication Systems (ISWCS), Trondheim, Norway, 17–19 October 2007; pp. 582–586.
  24. Urkowitz, H. Energy detection of unknown deterministic signals. Proc. IEEE 1967, 55, 523–531. [Google Scholar]
  25. Zhao, T.; Zhao, Y. A new cooperative detection technique with malicious user suppression, Proceedings of IEEE International Conference on Communications (ICC), Dresden, Germany, 14–18 June 2009; pp. 1–5.
Figure 1. The considered cognitive radio network. PU, primary user; CU, cognitive user; FC, fusion center; MU, malicious user.
Figure 1. The considered cognitive radio network. PU, primary user; CU, cognitive user; FC, fusion center; MU, malicious user.
Symmetry 07 00675f1 1024
Figure 2. Slot structure of the cognitive user’s operation.
Figure 2. Slot structure of the cognitive user’s operation.
Symmetry 07 00675f2 1024
Figure 3. Relationship of the weights of the reliable, neutral and unreliable cognitive users.
Figure 3. Relationship of the weights of the reliable, neutral and unreliable cognitive users.
Symmetry 07 00675f3 1024
Figure 4. Performance comparison of the proposed method with conventional cooperative spectrum sensing in the presence of no, one and two malicious users.
Figure 4. Performance comparison of the proposed method with conventional cooperative spectrum sensing in the presence of no, one and two malicious users.
Symmetry 07 00675f4 1024
Figure 5. Effect of the malicious users on the detection probability of the proposed method and conventional cooperative spectrum sensing.
Figure 5. Effect of the malicious users on the detection probability of the proposed method and conventional cooperative spectrum sensing.
Symmetry 07 00675f5 1024
Figure 6. Effect of the malicious users on false alarm probability of the proposed method and conventional cooperative spectrum sensing.
Figure 6. Effect of the malicious users on false alarm probability of the proposed method and conventional cooperative spectrum sensing.
Symmetry 07 00675f6 1024
Figure 7. Mean square error of the proposed method and conventional cooperative spectrum sensing scheme in the presence of malicious user. P(H0) = P(H1) = 0.5.
Figure 7. Mean square error of the proposed method and conventional cooperative spectrum sensing scheme in the presence of malicious user. P(H0) = P(H1) = 0.5.
Symmetry 07 00675f7 1024
Table 1. Simulation parameters.
Table 1. Simulation parameters.
DescriptionSymbolValue
Number of iterationsl1000
Number of SUsN15
PU busy probabilityP(H1)0.5
Sensing durationτ1 ms
Sampling frequencyfs300 KHz
Number of samplesS600
Signal-to-noise ratioγ[−25 dB, −11 dB] with 1 dB decrement
Number of malicious usersM[0,1,2,3]

Share and Cite

MDPI and ACS Style

Usman, M.; Insoo, K. Secure Cooperative Spectrum Sensing via a Novel User-Classification Scheme in Cognitive Radios for Future Communication Technologies. Symmetry 2015, 7, 675-688. https://doi.org/10.3390/sym7020675

AMA Style

Usman M, Insoo K. Secure Cooperative Spectrum Sensing via a Novel User-Classification Scheme in Cognitive Radios for Future Communication Technologies. Symmetry. 2015; 7(2):675-688. https://doi.org/10.3390/sym7020675

Chicago/Turabian Style

Usman, Muhammad, and Koo Insoo. 2015. "Secure Cooperative Spectrum Sensing via a Novel User-Classification Scheme in Cognitive Radios for Future Communication Technologies" Symmetry 7, no. 2: 675-688. https://doi.org/10.3390/sym7020675

Article Metrics

Back to TopTop