{"title":"A trust-value based cooperative spectrum sensing algorithm for mobile secondary users","authors":"Xinyu Wang, Min Jia, Qing Guo, Xuemai Gu","doi":"10.1109/ICCW.2015.7247414","DOIUrl":null,"url":null,"abstract":"Cognitive radio is able to effectively increase spectral utilization. However, cooperative spectrum sensing gives malicious users chances to interfere with its decision processes. If a mobile secondary user's energy detection results become unreliable, conventional trust-value based cooperative spectrum sensing algorithms, which are used to resist malicious attacks, cannot distinguish whether it's caused by a reliable user moving into a deep-fading area or it attacking maliciously. This is the main reason why the detection performances of conventional algorithms are terribly bad when secondary users are mobile. This paper proposes a trust-value based cooperative spectrum sensing algorithm aiming at mobile secondary users. We divide the whole region into cells according to different areas' actual channel conditions so that the detected results of users in any one of cells are very close to each other but those in different cells are quite different. Our proposed approach removes malicious users independently in each cell based upon their trust values. And larger weighting coefficients are given to cells with better channel conditions. Then this paper analyzes the effects of the average velocity of secondary users on the detection performance. Simulation results show that when secondary users are mobile, the detection performance of our algorithm is much better than that of conventional trust-value based cooperative spectrum sensing algorithms proposed for static secondary users and is better than that of a trusted collaborative spectrum sensing for mobile cognitive radio networks based upon location reliability and malicious intention which also takes location channel differences into considerations.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"30 1","pages":"1635-1639"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Communication Workshop (ICCW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCW.2015.7247414","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Cognitive radio is able to effectively increase spectral utilization. However, cooperative spectrum sensing gives malicious users chances to interfere with its decision processes. If a mobile secondary user's energy detection results become unreliable, conventional trust-value based cooperative spectrum sensing algorithms, which are used to resist malicious attacks, cannot distinguish whether it's caused by a reliable user moving into a deep-fading area or it attacking maliciously. This is the main reason why the detection performances of conventional algorithms are terribly bad when secondary users are mobile. This paper proposes a trust-value based cooperative spectrum sensing algorithm aiming at mobile secondary users. We divide the whole region into cells according to different areas' actual channel conditions so that the detected results of users in any one of cells are very close to each other but those in different cells are quite different. Our proposed approach removes malicious users independently in each cell based upon their trust values. And larger weighting coefficients are given to cells with better channel conditions. Then this paper analyzes the effects of the average velocity of secondary users on the detection performance. Simulation results show that when secondary users are mobile, the detection performance of our algorithm is much better than that of conventional trust-value based cooperative spectrum sensing algorithms proposed for static secondary users and is better than that of a trusted collaborative spectrum sensing for mobile cognitive radio networks based upon location reliability and malicious intention which also takes location channel differences into considerations.