Detection performance and mitigation techniques in CR networks
Pervasive wireless communications rely enormously on spectrum utilization; the increase in demand for new wireless services and their application has led to spectrum scarcity. Spectrum limitations can be resolved by cognitive radio (CR) which is a technology that allows secondary users (SUs) to use...
Main Author: | |
---|---|
Other Authors: | |
Published: |
University of Hull
2017
|
Subjects: | |
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.733015 |
id |
ndltd-bl.uk-oai-ethos.bl.uk-733015 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-bl.uk-oai-ethos.bl.uk-7330152018-06-12T03:15:56ZDetection performance and mitigation techniques in CR networksAmmar, MahmodRiley, N. G. ; Paulson, Kevin S.2017Pervasive wireless communications rely enormously on spectrum utilization; the increase in demand for new wireless services and their application has led to spectrum scarcity. Spectrum limitations can be resolved by cognitive radio (CR) which is a technology that allows secondary users (SUs) to use the spectrum when it is not occupied by primary users (PUs). In this thesis, the security issues that decrease CR performance are discussed; there are two major threats i.e. primary user emulation attack (PUEA) and spectrum sensing data falsification attack (SSDF). Firstly, the CR network (CRN) is simulated whereby PUs and SUs are presented in the system with the presence of multiple malicious users that are randomly located within a circle of radius (R). The simulation results, based on an analytical model, show that the false alarm probability is significantly affected by the network radius Rand malicious users' number, and it is proved that there is a range of R over which the PUEAs are most successful. Secondly, a transmitter verification scheme (direct scheme) and indirect trust scheme that considers the users' history are presented; the results proved that if the signal to noise ratio (SNR) is raised, correspondingly the t:rnstworthiness of the PU is considerably increased. Based on these two schemes, the trnstworthiness of the PU is much higher than that of the malicious user and because the indirect scheme considers the historical behaviour of the user, it improves the user's trustworthiness. Finally, cooperative spectrum sensing (CSS) approaches are proposed, namely, a trust based approach, a punishment based approach and a dedicated punishment based approach. It is proved that these proposed CSS approaches outperform the traditional majority scheme despite a high number of malicious users. In addition, the dedicated punishment approaches which punish only the malicious users outperform the other approaches.EngineeringUniversity of Hullhttp://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.733015http://hydra.hull.ac.uk/resources/hull:16081Electronic Thesis or Dissertation |
collection |
NDLTD |
sources |
NDLTD |
topic |
Engineering |
spellingShingle |
Engineering Ammar, Mahmod Detection performance and mitigation techniques in CR networks |
description |
Pervasive wireless communications rely enormously on spectrum utilization; the increase in demand for new wireless services and their application has led to spectrum scarcity. Spectrum limitations can be resolved by cognitive radio (CR) which is a technology that allows secondary users (SUs) to use the spectrum when it is not occupied by primary users (PUs). In this thesis, the security issues that decrease CR performance are discussed; there are two major threats i.e. primary user emulation attack (PUEA) and spectrum sensing data falsification attack (SSDF). Firstly, the CR network (CRN) is simulated whereby PUs and SUs are presented in the system with the presence of multiple malicious users that are randomly located within a circle of radius (R). The simulation results, based on an analytical model, show that the false alarm probability is significantly affected by the network radius Rand malicious users' number, and it is proved that there is a range of R over which the PUEAs are most successful. Secondly, a transmitter verification scheme (direct scheme) and indirect trust scheme that considers the users' history are presented; the results proved that if the signal to noise ratio (SNR) is raised, correspondingly the t:rnstworthiness of the PU is considerably increased. Based on these two schemes, the trnstworthiness of the PU is much higher than that of the malicious user and because the indirect scheme considers the historical behaviour of the user, it improves the user's trustworthiness. Finally, cooperative spectrum sensing (CSS) approaches are proposed, namely, a trust based approach, a punishment based approach and a dedicated punishment based approach. It is proved that these proposed CSS approaches outperform the traditional majority scheme despite a high number of malicious users. In addition, the dedicated punishment approaches which punish only the malicious users outperform the other approaches. |
author2 |
Riley, N. G. ; Paulson, Kevin S. |
author_facet |
Riley, N. G. ; Paulson, Kevin S. Ammar, Mahmod |
author |
Ammar, Mahmod |
author_sort |
Ammar, Mahmod |
title |
Detection performance and mitigation techniques in CR networks |
title_short |
Detection performance and mitigation techniques in CR networks |
title_full |
Detection performance and mitigation techniques in CR networks |
title_fullStr |
Detection performance and mitigation techniques in CR networks |
title_full_unstemmed |
Detection performance and mitigation techniques in CR networks |
title_sort |
detection performance and mitigation techniques in cr networks |
publisher |
University of Hull |
publishDate |
2017 |
url |
http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.733015 |
work_keys_str_mv |
AT ammarmahmod detectionperformanceandmitigationtechniquesincrnetworks |
_version_ |
1718694053284937728 |