Due to the fact that the conventional spectrum sensing algorithm is susceptible to noise, an adaptive double-threshold energy detection algorithm for a cognitive radio is proposed. Based on double-threshold energy det...Due to the fact that the conventional spectrum sensing algorithm is susceptible to noise, an adaptive double-threshold energy detection algorithm for a cognitive radio is proposed. Based on double-threshold energy detection, the algorithm can adaptively switch between one-round sensing and two-round sensing by comparing the observations with the pre-fixed thresholds. Mathematical expressions for the probability of detection, the probability of false alarm, and the sensing time are derived. The relationships including signal to noise ratio (SNR) vs. the probability of detection and SNR vs. the sensing time are plotted using Monte Carlo simulation and the algorithm is verified in a real cognitive system based on GNU Radio and universal software radio peripheral (USRP). Simulation and experimental results show that, compared with the existing spectrum sensing method, the proposed algorithm can achieve a higher probability of detection within a reasonable sensing time.展开更多
Cognitive Radio (CR) can use the fre- quency band allocated to a Primary User (PU) on the premise that it will prevent significant of avoiding causing great interference to the PU. In this paper, we consider a wid...Cognitive Radio (CR) can use the fre- quency band allocated to a Primary User (PU) on the premise that it will prevent significant of avoiding causing great interference to the PU. In this paper, we consider a wideband CR system where the Secondary User (SU) mini- raises its interference to the PU by jointly al- locating the optimal sensing threshold and sub- carrier power. A multi-parameter optimization problem is formulated to obtain the joint opt- imal allocation by alternating direction opti- mization, which minimises the total interfer- ence to the PU over all of the subcarriers sub- ject to the constraints on the throughput, Bit Error Rate (BER) and maximal total power of the SU, the subcarrier rate and interference power of the PU, and the false alarm and mis- detection probabilities of each subcarrier. The simulation results show that the proposed joint allocation algorithm can achieve the desired mitigation on the interference to the PU at the different subcarrier gains.展开更多
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili...In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.展开更多
In this paper, we propose the blind space-time high rate multi-user detector for synchronous uplink multi-rate Direct Sequence Code Division Multiple Access (DS-CDMA) systems with antenna array at the base station. ...In this paper, we propose the blind space-time high rate multi-user detector for synchronous uplink multi-rate Direct Sequence Code Division Multiple Access (DS-CDMA) systems with antenna array at the base station. By employing antenna array at the base stations, the spatial dimension is used efficiently to suppress co-channel interference and increase the capacity for multi-rate CDMA system. After low rate physical users in the system are modeled as corresponding high rate virtual users, we construct the space-time signature vectors of virtual users. And subspace projection algorithm is employed to estimate space-time signature vectors blindly. Then a soft-decision high rate lnultiuser detector is proposed based on the estimated signature vectors, which avoids estimating the ambiguous complex factors which are necessary in traditional blind detector. Numerical simulation results evaluate the performance in terms of Bit Error Rate (BER) for the proposed scheme. Simultaneously, it demonstrates that the system capability increases two times when using twoelement antenna array.展开更多
The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, ...The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, a wireless node can distinguish if there is a selfish behavior in the wireless network. The detection efficiency is validated using a Qualnet simulator. An IEEE 802.11 wireless ad hoc network with 20 senders and 20 receivers spreading out randomly in a given area is evaluated. The well-behaved senders use minimum contention window size of 32 and maximum con- tention window size of I 024, and the selfish nodes are assumed not to use the binary exponential strategy for which the contention window sizes are both fixed as 16. The transmission radius of all nodes is 250 m. Two scenarios are investigated: a single-hop network with nodes spreading out in 100 m^100 m, and all the nodes are in the range of each other; and a multi-hop network with nodes spreading out in 1 000 m~ 1 000 m. The node can monitor the backoff time from all the other nodes and run the detection algorithms over those samples. It is noted that the threshold can significantly affect the detection time and the detection accuracy. For a given threshold of 0.3 s, the false alarm rates and the missed alarm rates are less than 5%. The detection delay is less than 1.0 s. The simulation results show that the algorithm has short detection time and high detection accuracy.展开更多
基金The National Science and Technology Major Project (No. 2010ZX03006-002-01)the National Natural Science Foundation of China(No. 60972026 )the Cultivation Fund of the Key Scientific and Technical Innovation Project, Ministry of Education of China (No. 708046)
文摘Due to the fact that the conventional spectrum sensing algorithm is susceptible to noise, an adaptive double-threshold energy detection algorithm for a cognitive radio is proposed. Based on double-threshold energy detection, the algorithm can adaptively switch between one-round sensing and two-round sensing by comparing the observations with the pre-fixed thresholds. Mathematical expressions for the probability of detection, the probability of false alarm, and the sensing time are derived. The relationships including signal to noise ratio (SNR) vs. the probability of detection and SNR vs. the sensing time are plotted using Monte Carlo simulation and the algorithm is verified in a real cognitive system based on GNU Radio and universal software radio peripheral (USRP). Simulation and experimental results show that, compared with the existing spectrum sensing method, the proposed algorithm can achieve a higher probability of detection within a reasonable sensing time.
基金supported by the National Natural Science Foundation of China under Grant No. 61201143the Scientific Research Foundation for Introduced Talent of Nanjing University of Aeronautics and Astronautics under Grant No. 56YAH13029
文摘Cognitive Radio (CR) can use the fre- quency band allocated to a Primary User (PU) on the premise that it will prevent significant of avoiding causing great interference to the PU. In this paper, we consider a wideband CR system where the Secondary User (SU) mini- raises its interference to the PU by jointly al- locating the optimal sensing threshold and sub- carrier power. A multi-parameter optimization problem is formulated to obtain the joint opt- imal allocation by alternating direction opti- mization, which minimises the total interfer- ence to the PU over all of the subcarriers sub- ject to the constraints on the throughput, Bit Error Rate (BER) and maximal total power of the SU, the subcarrier rate and interference power of the PU, and the false alarm and mis- detection probabilities of each subcarrier. The simulation results show that the proposed joint allocation algorithm can achieve the desired mitigation on the interference to the PU at the different subcarrier gains.
基金supported in part by the National Natural Science Foundation of China(61227801,61121001,61201152,and 61421061)the Program for New Century Excellent Talents in University(NCET-01-0259)the Fundamental Research Funds for the Central Universities(2013RC0106)
文摘In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.
基金Partially supported by the National Natural Science Foundation of China (No.60572046 & No.60502022) and the Research Fund for Doctoral Program of Higher Education of China (No.20020698024 & No.20030698027).
文摘In this paper, we propose the blind space-time high rate multi-user detector for synchronous uplink multi-rate Direct Sequence Code Division Multiple Access (DS-CDMA) systems with antenna array at the base station. By employing antenna array at the base stations, the spatial dimension is used efficiently to suppress co-channel interference and increase the capacity for multi-rate CDMA system. After low rate physical users in the system are modeled as corresponding high rate virtual users, we construct the space-time signature vectors of virtual users. And subspace projection algorithm is employed to estimate space-time signature vectors blindly. Then a soft-decision high rate lnultiuser detector is proposed based on the estimated signature vectors, which avoids estimating the ambiguous complex factors which are necessary in traditional blind detector. Numerical simulation results evaluate the performance in terms of Bit Error Rate (BER) for the proposed scheme. Simultaneously, it demonstrates that the system capability increases two times when using twoelement antenna array.
基金Supported by National Natural Science Foundation of China (No. 60702038)National High Technology Research and Development Program of China ("863"Program, No. 2007AA01Z220)Cultivation Fund of Innovation Project,Ministry of Education of China (No. 708024)
文摘The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, a wireless node can distinguish if there is a selfish behavior in the wireless network. The detection efficiency is validated using a Qualnet simulator. An IEEE 802.11 wireless ad hoc network with 20 senders and 20 receivers spreading out randomly in a given area is evaluated. The well-behaved senders use minimum contention window size of 32 and maximum con- tention window size of I 024, and the selfish nodes are assumed not to use the binary exponential strategy for which the contention window sizes are both fixed as 16. The transmission radius of all nodes is 250 m. Two scenarios are investigated: a single-hop network with nodes spreading out in 100 m^100 m, and all the nodes are in the range of each other; and a multi-hop network with nodes spreading out in 1 000 m~ 1 000 m. The node can monitor the backoff time from all the other nodes and run the detection algorithms over those samples. It is noted that the threshold can significantly affect the detection time and the detection accuracy. For a given threshold of 0.3 s, the false alarm rates and the missed alarm rates are less than 5%. The detection delay is less than 1.0 s. The simulation results show that the algorithm has short detection time and high detection accuracy.