Performance Metrics in Cognitive Radio Networks

Authors

  • Mahmoud Ali Ammar Department of Computer Engineering, University of Zawia, Zawia, Libya

DOI:

https://doi.org/10.54172/mjsc.v36i1.21

Keywords:

Cognitive Radio (CR), Probability Density Function (PDF), Primary User Emulation Attack (PUEA)

Abstract

In Cognitive Radio Networks (CRN), the main aim is to allow the secondary users (SUs) to identify the empty bands and use them to transmit or receive data opportunistically. Primary users (PUs) have the priority to use a channel, while the secondary users must vacant this channel once a primary user requests it. An attack known in cognitive radio networks as a Primary User Emulation Attack (PUEA) aims to prevent the SU from using the empty bands. In this paper, an analytical and experimental approach is presented to mitigate the PUEA. This approach is based on obtaining the Probability Density Functions (PDFs) of the received powers at the secondary users from malicious nodes and also from the primary transmitter in the cognitive network. Then, these obtained PDFs are used in Neyman-Pearson composite hypothesis test to measure the performance metrics (probability of false alarm and miss detection in the network). The results proved that the performance metrics were greatly influenced by the network area, where the secondary user is located, and the threshold value λ used in the decision rule. Also, there are boundaries for the λ choices that cannot be overtaken.

Downloads

Download data is not yet available.

References

Akyildiz, I. F., Lee, W.-Y., Vuran, M. C., & Mohanty, S. (2006). NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer networks, 50(13), 2127-2159. DOI: https://doi.org/10.1016/j.comnet.2006.05.001

Bhattacharjeea, S. (2013). In cognitive radio networks. The International Journal for the Computer and Telecommunications, 01(36) 1387-1398 . DOI: https://doi.org/10.1016/j.comcom.2013.06.003

Buddhikot, M. M., & Ryan, K. (2005). Spectrum management in coordinated dynamic spectrum access based cellular networks. First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005., DOI: https://doi.org/10.1109/DYSPAN.2005.1542646

Cabric, D., Mishra, S. M., & Brodersen, R. W. (2004). Implementation issues in spectrum sensing for cognitive radios. Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004., DOI: https://doi.org/10.1109/ACSSC.2004.1399240

Chen, R., & Park, J.-M. (2006). Ensuring trustworthy spectrum sensing in cognitive radio networks. 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, DOI: https://doi.org/10.1109/SDR.2006.4286333

Federal Communications Commission FCC. (2003). NPRM - Facilitating Opportunities for Flexible, Efficient, and Reliable Spectrum Use Employing Cognitive Radio Technologies. FCC, 03-322.

Jakimoski, G., & Subbalakshmi, K. (2008). Denial-of-service attacks on dynamic spectrum access networks. ICC Workshops-2008 IEEE International Conference on Communications Workshops, DOI: https://doi.org/10.1109/ICCW.2008.105

Jin, Z., Anand, S., & Subbalakshmi, K. (2009). Detecting primary user emulation attacks in dynamic spectrum access networks. 2009 IEEE International Conference on Communications, DOI: https://doi.org/10.1109/ICC.2009.5198911

Mathur, C. N., & Subbalakshmi, K. (2007). Security issues in cognitive radio networks. Cognitive Networks, 25, 272-290 DOI: https://doi.org/10.1002/9780470515143.ch11

Downloads

Published

2021-03-31

How to Cite

Ammar, M. A. (2021). Performance Metrics in Cognitive Radio Networks. Al-Mukhtar Journal of Sciences, 36(1), 73–79. https://doi.org/10.54172/mjsc.v36i1.21

Issue

Section

Research Articles

Categories