Performance improvements of reputation-based cooperative spectrum sensing

F. Benedetto, A. Tedeschi, G. Giunta, P. Coronas
{"title":"Performance improvements of reputation-based cooperative spectrum sensing","authors":"F. Benedetto, A. Tedeschi, G. Giunta, P. Coronas","doi":"10.1109/PIMRC.2016.7794630","DOIUrl":null,"url":null,"abstract":"Cognitive radio is establishing itself as the most promising technology in tackling the problem of spectrum scarcity. It allows secondary users to opportunistically access and re-use the spectrum resources under-utilized by licensed or primary users. Spectrum sensing (either cooperative or non-cooperative modes) is exploited to identify those unused (free) frequency bands. This new technology has been proved to be vulnerable to an increasing number of attacks, such as Byzantine attacks. Here, we propose a novel reputation-based cooperative spectrum sensing method that first detects, and then rejects any malicious secondary user, thus improving the system performances. We evaluate the error probabilities (detection vs. false alarms) of the system, as well as the number of both correctly identified attackers and discarded honest users. Finally, we compare our method to a recently published reputation-based method (either blind or non-blind). As shown by the simulation results, the proposed method outperforms the conventional approach, confirming its robustness in detecting different types of Byzantine attacks.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PIMRC.2016.7794630","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

Cognitive radio is establishing itself as the most promising technology in tackling the problem of spectrum scarcity. It allows secondary users to opportunistically access and re-use the spectrum resources under-utilized by licensed or primary users. Spectrum sensing (either cooperative or non-cooperative modes) is exploited to identify those unused (free) frequency bands. This new technology has been proved to be vulnerable to an increasing number of attacks, such as Byzantine attacks. Here, we propose a novel reputation-based cooperative spectrum sensing method that first detects, and then rejects any malicious secondary user, thus improving the system performances. We evaluate the error probabilities (detection vs. false alarms) of the system, as well as the number of both correctly identified attackers and discarded honest users. Finally, we compare our method to a recently published reputation-based method (either blind or non-blind). As shown by the simulation results, the proposed method outperforms the conventional approach, confirming its robustness in detecting different types of Byzantine attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于声誉的协同频谱感知性能改进
认知无线电正在成为解决频谱稀缺问题的最有前途的技术。它允许二级用户机会性地访问和重用未被授权用户或主用户充分利用的频谱资源。利用频谱感知(合作或非合作模式)来识别未使用的(空闲)频段。这种新技术已被证明容易受到越来越多的攻击,例如拜占庭攻击。在此,我们提出了一种新的基于信誉的协同频谱感知方法,该方法首先检测并拒绝任何恶意的二次用户,从而提高了系统的性能。我们评估系统的错误概率(检测与假警报),以及正确识别的攻击者和丢弃的诚实用户的数量。最后,我们将我们的方法与最近发表的基于声誉的方法(盲法或非盲法)进行比较。仿真结果表明,该方法优于传统方法,对检测不同类型的拜占庭攻击具有鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Optimized transmission and resource allocation strategies for ultra-reliable communications Social comparison based relaying in device-to-device networks Single-rate and multi-rate multi-service systems for next generation and beyond communications Ultra-reliable communication in a factory environment for 5G wireless networks: Link level and deployment study Secrecy capacity analysis for α-μ/κ-μ and κ-μ/α-μ fading scenarios
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1