Performance Metrics in Cognitive Radio Networks
DOI:
https://doi.org/10.54172/mjsc.v36i1.21Keywords:
Cognitive Radio (CR), Probability Density Function (PDF), Primary User Emulation Attack (PUEA)Abstract
In Cognitive Radio Networks (CRN), the main aim is to allow the secondary users (SUs) to identify the empty bands and use them to transmit or receive data opportunistically. Primary users (PUs) have the priority to use a channel, while the secondary users must vacant this channel once a primary user requests it. An attack known in cognitive radio networks as a Primary User Emulation Attack (PUEA) aims to prevent the SU from using the empty bands. In this paper, an analytical and experimental approach is presented to mitigate the PUEA. This approach is based on obtaining the Probability Density Functions (PDFs) of the received powers at the secondary users from malicious nodes and also from the primary transmitter in the cognitive network. Then, these obtained PDFs are used in Neyman-Pearson composite hypothesis test to measure the performance metrics (probability of false alarm and miss detection in the network). The results proved that the performance metrics were greatly influenced by the network area, where the secondary user is located, and the threshold value λ used in the decision rule. Also, there are boundaries for the λ choices that cannot be overtaken.
Downloads
References
Akyildiz, I. F., Lee, W.-Y., Vuran, M. C., & Mohanty, S. (2006). NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer networks, 50(13), 2127-2159. DOI: https://doi.org/10.1016/j.comnet.2006.05.001
Bhattacharjeea, S. (2013). In cognitive radio networks. The International Journal for the Computer and Telecommunications, 01(36) 1387-1398 . DOI: https://doi.org/10.1016/j.comcom.2013.06.003
Buddhikot, M. M., & Ryan, K. (2005). Spectrum management in coordinated dynamic spectrum access based cellular networks. First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005., DOI: https://doi.org/10.1109/DYSPAN.2005.1542646
Cabric, D., Mishra, S. M., & Brodersen, R. W. (2004). Implementation issues in spectrum sensing for cognitive radios. Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004., DOI: https://doi.org/10.1109/ACSSC.2004.1399240
Chen, R., & Park, J.-M. (2006). Ensuring trustworthy spectrum sensing in cognitive radio networks. 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, DOI: https://doi.org/10.1109/SDR.2006.4286333
Federal Communications Commission FCC. (2003). NPRM - Facilitating Opportunities for Flexible, Efficient, and Reliable Spectrum Use Employing Cognitive Radio Technologies. FCC, 03-322.
Jakimoski, G., & Subbalakshmi, K. (2008). Denial-of-service attacks on dynamic spectrum access networks. ICC Workshops-2008 IEEE International Conference on Communications Workshops, DOI: https://doi.org/10.1109/ICCW.2008.105
Jin, Z., Anand, S., & Subbalakshmi, K. (2009). Detecting primary user emulation attacks in dynamic spectrum access networks. 2009 IEEE International Conference on Communications, DOI: https://doi.org/10.1109/ICC.2009.5198911
Mathur, C. N., & Subbalakshmi, K. (2007). Security issues in cognitive radio networks. Cognitive Networks, 25, 272-290 DOI: https://doi.org/10.1002/9780470515143.ch11
Downloads
Published
How to Cite
License
Copyright (c) 2021 Mahmoud Ali Ammar
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright of the articles Published by Almukhtar Journal of Science (MJSc) is retained by the author(s), who grant MJSc a license to publish the article. Authors also grant any third party the right to use the article freely as long as its integrity is maintained and its original authors and cite MJSc as original publisher. Also they accept the article remains published by MJSc website (except in occasion of a retraction of the article).