Cognitive Radio Networks Based on Users' Reputation Scheme

Authors

  • Mahmoud A. Ammar Department of Computer Engineering, University of Zawia, Zawia, Libya
  • Salahedin A. Rehan Department of Electrical and Electronic Engineering, University of Zawia, Zawia, Libya

DOI:

https://doi.org/10.54172/mjsc.v36i2.35

Keywords:

Cognitive Radio CR, Users’ Trust, Primary User, Primary User Emulation Attack (PUEA), Cooperative Spectrum Sensing

Abstract

Cognitive Radio (CR) can be defined as a technology that allows users to change the transmission parameters as required to increase the spectrum efficiency. Because of this mechanism, some threats emerge. Two major threats are found in CR. The first is the Primary User Emulation Attack (PUEA), where the attacker is able to transmit at a forbidden time slot effectively, emulating the signals of the primary user. This makes all the system users believe that the spectrum is occupied by a good primary user.  The second threat is known as the spectrum sensing data falsification attack (SSDF). In this case, the attackers send false observation information, intentionally or unintentionally, to the fusion center (FC), causing it to make the wrong decision. In this study, the scheme presented  was based on a users' reputation for secure spectrum access in cognitive radio networks. Each Secondary User (SU) performs local sensing and then forwards the sensing results to the main fusion center FC. The FC makes the final decision about the presence of the primary user based on the proposed approach. The schemes substantially reduce the effect of cognitive users with low reputation values while improving the impact of cognitive users with the high reputation values on the final decision. It has been verified that the proposed approach can improve the sensing performance under the impact of a different number of reliable and unreliable users in a CR network. Results based on simulation show that the proposed scheme outperforms the traditional majority scheme despite a high number of malicious users.

Downloads

Download data is not yet available.

References

Cabric, D., Mishra, S. M., & Brodersen, R. W. (2004). Implementation issues in spectrum sensing for cognitive radios. Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004., DOI: https://doi.org/10.1109/ACSSC.2004.1399240

Cabrić, D., Mishra, S. M., Willkomm, D., Brodersen, R., & Wolisz, A. (2005). A cognitive radio approach for usage of virtual unlicensed spectrum. 14th IST mobile and wireless communications summit,

Dutta, S., & Arora, K. (2018). Review On Cognitive Radio.

Pawelczak, P., Janssen, G. J., & Prasad, R. V. (2006). WLC10-4: Performance measures of dynamic spectrum access networks. IEEE Globecom 2006, DOI: https://doi.org/10.1109/GLOCOM.2006.671

Tkachenko, A., Cabric, D., & Brodersen, R. (2006). Experimental study of spectrum sensing based on energy detection and network cooperation. Proc. 1st Int. Workshop on Technol. and Policy of Spectrum Sensing TAPAS 2006,

Yadav, P., Chatterjee, S., & Bhattacharya, P. P. (2012). A survey on dynamic spectrum access techniques in cognitive radio. International Journal of Next-Generation Networks, 4(4), 27. DOI: https://doi.org/10.5121/ijngn.2012.4403

Yucek, T., & Arslan, H. (2009). A survey of spectrum sensing algorithms for cognitive radio applications. IEEE communications surveys & tutorials, 11(1), 116-130. DOI: https://doi.org/10.1109/SURV.2009.090109

Zhao, Q. (2007). Sadler, BM: A survey of dynamic spectrum access. IEEE Signal Process. Mag, 24(3), 79-89. DOI: https://doi.org/10.1109/MSP.2007.361604

Downloads

Published

2021-06-30

How to Cite

Ammar, M. A., & Rehan, S. A. (2021). Cognitive Radio Networks Based on Users’ Reputation Scheme. Al-Mukhtar Journal of Sciences, 36(2), 129–134. https://doi.org/10.54172/mjsc.v36i2.35

Issue

Section

Research Articles

Categories