Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks
© WenkaiWang et al. 2010
Received: 14 May 2009
Accepted: 1 October 2009
Published: 22 November 2009
Cognitive radio is a revolutionary paradigm to migrate the spectrum scarcity problem in wireless networks. In cognitive radio networks, collaborative spectrum sensing is considered as an effective method to improve the performance of primary user detection. For current collaborative spectrum sensing schemes, secondary users are usually assumed to report their sensing information honestly. However, compromised nodes can send false sensing information to mislead the system. In this paper, we study the detection of untrustworthy secondary users in cognitive radio networks. We first analyze the case when there is only one compromised node in collaborative spectrum sensing schemes. Then we investigate the scenario that there are multiple compromised nodes. Defense schemes are proposed to detect malicious nodes according to their reporting histories. We calculate the suspicious level of all nodes based on their reports. The reports from nodes with high suspicious levels will be excluded in decision-making. Compared with existing defense methods, the proposed scheme can effectively differentiate malicious nodes and honest nodes. As a result, it can significantly improve the performance of collaborative sensing. For example, when there are 10 secondary users, with the primary user detection rate being equal to 0.99, one malicious user can make the false alarm rate increase to 72%. The proposed scheme can reduce it to 5%. Two malicious users can make increase to 85% and the proposed scheme reduces it to 8%.
Nowadays the available wireless spectrum becomes more and more scarce due to increasing spectrum demand for new wireless applications. It is obvious that current static frequency allocation policy cannot meet the needs of emerging applications. Cognitive radio networks [1–3], which have been widely studied recently, are considered as a promising technology to migrate the spectrum shortage problem. In cognitive radio networks, secondary users are allowed to opportunistically access spectrums which have already been allocated to primary users, given that they do not cause harmful interference to the operation of primary users. In order to access available spectrums, secondary users have to detect the vacant spectrum resources by themselves without changing the operations of primary users. Existing detection schemes include matched filter, energy detection, cyclostationary detection, and wavelet detection [2–6]. Among these schemes, energy detection is commonly adopted because it does not require a priori information of primary users.
It is known that wireless channels are subject to fading and shadowing. When secondary users experience multipath fading or happen to be shadowed, they may fail to detect the existence of primary signal. As a result, it will cause interference to primary users if they try to access this occupied spectrum. To cope with this problem, collaborative spectrum sensing [7–12] is proposed. It combines sensing results of multiple secondary users to improve the probability of primary user detection. There are many works that address the cooperative spectrum sensing schemes and challenges. The performance of hard-decision combining scheme and soft-decision combining scheme is investigated in [7, 8]. In these schemes, all secondary users send sensing reports to a common decision center. Cooperative sensing can also be done in a distributed way, where secondary users collect reports from their neighbors and make the decision individually [13–15]. Optimized cooperative sensing is studied in [16, 17]. When the channel that forwards sensing observations experiences fading, the sensing performance degrades significantly. This issue is investigated in [18, 19]. Furthermore, energy efficiency in collaborative spectrum sensing is addressed in .
There are some works that address the security issues of cognitive radio networks. Primary user emulation attack is analyzed in [21, 22]. In this attack, malicious users transmit fake signals which have similar feature of primary signal. In this way attacker can mislead legitimate secondary users to believe that primary user is present. The defense scheme in  is to identify malicious user by estimating location information and observing received signal strength (RSS). In , it uses signal classification algorithms to distinguish primary signal and secondary signal. Primary user emulation attack is an outsider attack, targeting both collaborative and noncollaborative spectrum sensing. Another type of attack is insider attack that targets collaborative spectrum sensing. In current collaborative sensing schemes, secondary users are often assumed to report their sensing information honestly. However, it is quite possible that wireless devices are compromised by malicious parties. Compromised nodes can send false sensing information to mislead the system. A natural defense scheme  is to change the decision rule. The revised rule is, when there are malicious nodes, the decision result is on only if there are at least nodes reporting on. However, this defense scheme has three disadvantages. First, the scheme does not specify how to estimate the number of malicious users, which is difficult to measure in practice. Second, the scheme will not work in soft-decision case, in which secondary users report sensed energy level instead of binary hard decisions. Third, the scheme has very high false alarm rate when there are multiple attackers. This will be shown by the simulation results in Section 4. The problem of dishonest users in distributed spectrum sensing is discussed in . The defense scheme in this work requires secondary users to collect sensing reports from their neighbors when confirmative decision cannot be made. The scheme is also only applied to hard-decision reporting case. Finally, current security issues in cognitive radio networks, including attacks and corresponding defense schemes, are concluded in .
In this paper, we develop defense solutions against one or multiple malicious secondary users in soft-decision reporting collaborative spectrum sensing. We first analyze the single malicious user case. The suspicious level of each node is estimated by their reporting histories. When the suspicious level of a node goes beyond certain threshold, it will be considered as malicious and its report will be excluded in decision-making. Then, we extend this defense method to handle multiple attackers by using an "onion-peeling approach." The idea is to detect malicious users in a batch-by-batch way. The nodes are classified into two sets, honest set and malicious set. Initially all users are assumed to be honest. When one node is detected to be malicious according to its accumulated suspicious level, it will be moved into malicious set. The way to calculate suspicious level will be updated when the malicious node set is updated. This procedure continues until no new malicious node can be found.
Extensive simulations are conducted. We simulate the collaborative sensing scheme without defense, the straightforward defense scheme in , and the proposed scheme with different parameter settings. We observe that even a single malicious node can significantly degrade the performance of spectrum sensing when no defense scheme is employed. And multiple malicious nodes can make the performance even much worse. Compared with existing defense methods, the proposed scheme can effectively differentiate honest nodes from malicious nodes and significantly improve the performance of collaborative spectrum sensing. For example, when there are 10 secondary users, with the primary user detection rate being equal to 0.99, one malicious user can make the false alarm rate ( ) increase to 72%. While a simple defense scheme can reduce to 13%, the proposed scheme reduces it to 5%. Two malicious users can make increase to 85%, the simple defense scheme can reduce to 23%, the proposed scheme reduces it to 8%. We study the scenario that malicious nodes dynamically change their attack behavior. Results show that the scheme can effectively capture the dynamic change of nodes. For example, if a node behaves well for a long time and suddenly turns bad, the proposed scheme rapidly increases the suspicious level of this node. If it only behaves badly for a few times, the proposed scheme allows slow recovery of its suspicious level.
The rest of paper is organized as follows. Section 2 describes the system model. Attack models and the proposed scheme are presented in Section 3. In Section 4, simulation results are demonstrated. Conclusion is drawn in Section 5.
2. System Model
Studies show that collaborative spectrum sensing can significantly improve the performance of primary user detection [7, 8]. While most collaborative spectrum sensing schemes assume that secondary users are trustworthy, it is possible that attackers compromise cognitive radio nodes and make them send false sensing information. In this section, we describe the scenario of collaborative spectrum sensing and present two attack models.
2.1. Collaborative Spectrum Sensing
where is the sensed energy level at the th secondary user, is the signal transmitted by the primary user, is the additive white Gaussian noise (AWGN), and is the channel gain from the primary transmitter to the th secondary user.
From (2), we can see that under the probability depends on only. Under , depends on and . Recall that is the received SNR of secondary user , which can be estimated according to path loss model and location information.
2.2. Attack Model
The compromised secondary users can report false sensing information to the decision center. According to the way they send false sensing reports, attackers can be classified into two categories: selfish users and malicious users. The selfish users report yes or high energy level when their sensed energy level is low. In this way they intentionally cause false alarm such that they can use the available spectrum and prevent others from using it. The malicious users report no or low signal level when their sensed energy is high. They will reduce the detection rate, which yields more interference to the primary user. When the primary user is not detected, the secondary users may transmit in the occupied spectrum and interfere with the transmission of the primary user. In this paper, we investigate two attack models, False Alarm (FA) Attack and False Alarm & Miss Detection (FAMD) Attack, as presented in [26, 27].
In energy spectrum sensing, secondary users send reports to decision center in each round. Let denote the observation of node about the existence of the primary user at time slot . The attacks are modeled by three parameters: the attack threshold ( ), attack strength ( ), and attack probability ( ). The two attack models are the following.
(i) False Alarm (FA) Attack: for time slot , if sensed energy is higher than , it will not attack in this round, and just report ; otherwise it will attack with probability by reporting . This type of attack intends to cause false alarm.
(ii) False Alarm & Miss Detection (FAMD) Attack: for time slot , attacker will attack with probability . If it does not choose to attack this round, it will just report ; otherwise it will compare with . If is higher than , the attacker reports ; Otherwise, it reports . This type of attack causes both false alarm and miss detection.
3. Secure Collaborative Sensing
In this paper, we adopt the centralized collaborative sensing scheme in which cognitive radio nodes report to a common decision center. Among these cognitive radio nodes, one or more secondary users might be compromised by attackers. We first study the case when only one secondary node is malicious. By calculating the suspicious level, we propose a scheme to detect malicious user according to their report histories. Then we extend the scheme to handle multiple attackers. As we will discuss later, malicious users can change their attack parameters to avoid being detected, so the optimal attack strategy is also analyzed.
3.1. Single Malicious User Detection
Note that calculation in (13) is based on the fact that the sensed energy level follows centralized distribution under and noncentralized distribution under . The distribution is stated in (2), in which the channel gain should be estimated based on (i) the distance between the primary transmitter and secondary users and (ii) the path loss model. We assume that the primary transmitter (TV tower, etc.) is stationary and the position of secondary users can be estimated by existing positioning algorithms [28–32]. Of course, the estimated distance may not be accurate. In Section 4.5, the impact of distance estimation error on the proposed scheme will be investigated.
In (14)–(16), and are the priori probabilities of whether the primary user is present or not, which can be obtained through a two-state Markov chain channel model . The observation probabilities, , , and other similar terms can be calculated by (13). , , and similar terms, are detection probabilities or false alarm probabilities, which can be evaluated under specific path loss model [7, 8]. Therefore, we can calculate the value of in (11) as long as , , , , , and are known or can be estimated. In this derivation, we assume that the common receiver has the knowledge of the attacker's policy. This assumption allows us to obtain the performance upper bound of the proposed scheme and reveal insights of the attack/defense strategies. In practice, the knowledge about the attacker's policy can be obtained by analyzing previous attacking behaviors. For example, if attackers were detected previously, one can analyze the reports from these attackers and identify their attack behavior and parameters. Investigation on the unknown attack strategies will be investigated in the future work.
Procedure 1 shows the process of by applying the trust value and the consistency value in primary user detection algorithm. The basic idea is to eliminate the reports from users who have consistent low trust values. The value of and can be chosen dynamically. This procedure can be used together with many existing primary user detection algorithms such as hard decision combing and soft decision combing. The study in  has shown that hard decision performs almost the same as soft decision in terms of achieving performance gain when the cooperative users (10–20) face independent fading. For simplicity, in this paper, we will use the hard decision combining algorithm in [7, 8] to demonstrate the performance of the proposed scheme and other defense schemes.
Procedure 1: Primary user detection.
3.2. Multiple Malicious Users Detection
The detection of single attacker is to find the node that has the largest probability to be malicious. We can extend this method to multiple attackers case. The idea is enumerating all possible malicious nodes set and trying to identify the set with the largest suspicious level. We call this method "ideal malicious node detection." However, as we will discuss later, this method faces the curse of dimensionality when the number of secondary users is large. As a result, we propose a heuristic scheme named "Onion-peeling approach" which is applicable in practice.
3.2.1. Ideal Malicious Node Detection
For each possible malicious node set , using (22)–(25), we can calculate the probability that this contains only malicious users and no honest users. And we can find the with the largest value. Then compare this with certain threshold, if it is beyond this threshold, the nodes in are considered to be malicious.
However, for a cognitive radio network with secondary users, there are different choices of set . Thus, the complexity grows exponentially with . So this ideal detection of attackers faces the curse of dimensionality. When is large, we have to use approximation.
3.2.2. Onion-Peeling Approach
To make the detection of multiple malicious nodes feasible in practice, we propose a heuristic "onion-peeling approach" that detects the malicious user set in a batch-by-batch way. Initially all nodes are assumed to be honest. We calculate suspicious level of all users according to their reports. When the suspicious level of a node is beyond certain threshold, it will be considered as malicious and moved into the malicious user set. Reports from nodes in malicious user set are excluded in primary user detection. And the way to calculate suspicious level is updated once the malicious node set is updated. We continue to calculate the suspicious level of remaining nodes until no malicious node can be found.
where we assume that all other nodes are honest when computing and . In (26) we only calculate the suspicious level for each node rather than that of a malicious nodes set, the computation complexity is reduced from to .
As mentioned before, and are the priori probabilities of whether the primary user exists or not, and are the observation probabilities of under busy and idle states. An honest user's report probability can be calculated by (14).
Repeat the procedure until no new malicious node can be found.
Based on the above discussion, the primary user detection process is shown in Procedure 2. The basic idea is to exclude the reports from users who have suspicious level higher than threshold. In this procedure, can be chosen dynamically. This procedure can be used together with many existing primary user detection algorithms. As discussed in Section 3.1, hard decision performs almost the same as soft decision in terms of achieving performance gain when the cooperative users (10–20) face independent fading. So for simplicity, we still use the hard decision combining algorithm in [7, 8] to demonstrate the performance of the proposed scheme.
Procedure 2: Primary user detection.
nodes that are currently assumed to be honest.
3.3. Optimal Attack
As presented in Section 2.2, the attack model in this paper has three parameters: the attack threshold ( ), attack strength ( ), and attack probability ( ). These parameters determine the power and covertness of the attack. Here, the power of attack can be described by the probability that the attack is successful (i.e., causing false alarm and/or miss detection). The covertness of the attack can be roughly described by the likelihood that the attack will not be detected.
Briefly speaking, when or increases, the attack happens more frequently. When increases, the attack goal is easier to achieve. Thus, the power of attack increases with , , and . On the other hand, when the attack power increases, the covertness reduces. Therefore, there is the tradeoff between attack power and covertness.
The attacker surely prefers maximum attack power and maximum covertness. Of course, these two goals cannot be achieve simultaneously. Then, what is the "best" way to choose attack parameters from the attacker's point of view? In this section, we define a metric called damage that considers the tradeoff between attack power and covertness, and find the attack parameters that maximize the damage. To simplify the problem, we only consider one attacker case in this study.
We first make the following arguments.
The attacker can damage the system if it achieves the attack goal and is not detected by the defense scheme. Thus, the total damage can be described by the number of successful attacks before the attacker is detected.
Through experiments, we found that the defense scheme cannot detect some conservative attackers, who use very small , , and values. It can be proved that all possible values of that will not trigger the detector form a continuous 3D region, referred to as the undetectable region.
Thus, maximizing the total damage is equivalent to finding attack parameters in the undetectable region that maximize the probability of successful attack.
Based on the above arguments, we define damage as the probability that the attacker achieves the attack goal (i.e., causing false alarm) in one round of collaborative sensing. Without loss of generality, we only consider FA attack in this section. In FA attack, when sensed energy is below attack threshold , the attacker will report with probability . When is greater than the decision threshold and the primary user does not present, the attacker causes false alarm and the attack is successful. Thus, the damage is calculated as:
Substitute (36)–(39) to (35), then we have
Finding optimal attack has two purposes. First, with the strongest attack (in our framework), we can evaluate the worst-case performance of the proposed scheme. Second, it reveals insights of the attack strategies. Since it is extremely difficult to obtain the close form solution of the undetectable region, we will find undetectable region through simulations and search for optimal attack parameters using numerical methods. Details will be presented in Section 4.4.
4. Simulation Results
We simulate a cognitive radio network with (=10) secondary users. Cognitive radio nodes are randomly located around the primary user. The minimum distance from them to primary transmitter is 1000 m and maximum distance is 2000 m. The time-bandwidth product [7, 8] is . Primary transmission power and noise level are 200 mw and −110 dBm, respectively. The path loss factor is 3 and Rayleigh fading is assumed. Channel gains are updated based on node's location for each sensing report. The attack threshold is , the attack strength is , and the attack probability is 100% or 50%. We conduct simulations for different choices of thresholds. Briefly speaking, if trust value threshold is set too high or suspicious level threshold is set too low, it is possible that honest nodes will be regarded as malicious. If trust consistency value is set too low, it will take more rounds to detect malicious users. In simulation, for single malicious node detection, we choose the trust value threshold , the consistency value threshold , and the window size for calculating consistency value is . For multiple malicious users detection, the suspicious level threshold is set to .
4.1. Single Attacker
Three schemes of primary user detection are compared.
OR Rule: the presence of primary user is detected if one or more secondary users' reported value is greater than certain threshold. This is the most common hard fusion scheme.
Ki Rule: the presence of primary user is detected if or more secondary users' reported value is greater than certain threshold. This is the straightforward defense scheme proposed in .
Proposed Scheme: Use OR rule after removing reports from malicious nodes.
By comparing the ROC for Case 1 and Case 3, we see that the performance of primary user detection degrades significantly even when there is only one malicious user. This demonstrates the vulnerability of collaborative sensing, which leads inefficient usage of available spectrum resource.
The proposed scheme demonstrates significant performance gain over the scheme without defense (i.e., OR rule) and the straightforward defense scheme (i.e., K2 rule). For example, Table 1 shows the false alarm rate ( ) for two given detection rate ( ), when attack probability ( ) is 1. When the attack probability is 0.5, the performance advantage is smaller but still large.
4.2. Multiple Attackers
By comparing the ROC curves for Case 1 and Case 3, we see that the performance of primary user detection degrades significantly when there are multiple malicious users. And the degradation is much more severe than single malicious user case.
The proposed scheme demonstrates significant performance gain over the scheme without defense (i.e., OR rule) and the straightforward defense scheme (i.e., Ki rule). Table 2 shows the false alarm rate ( ) when detection rate is .
When there are three attackers, false alarm rates for all these schemes become larger, but the performance advantage of the proposed scheme over other schemes is still large.
Figures 4 and 5 show the ROC performance when the malicious user adopts the FAMD attack. We observe that the FAMD attack is stronger than FA. In other words, the OR rule and K2 rule have worse performance when facing the FAMD attack. However, the performance of the proposed scheme is almost the same under both attacks. That is, the proposed scheme is highly effective under both attacks, and much better than the traditional OR rule and the simple defense K2 rule. The example false alarm rates are listed as follows.
Figures 8 and 9 shows the ROC performance when the schemes face the FAMD attack for multiple malicious users. We observe that the FAMD attack is stronger than FA. Compared to the cases with FA attack, performance of the OR rule and Ki rule is worse when facing the FAMD attack. However, the performance of the proposed scheme is almost the same under both attacks. That is, the proposed scheme is highly effective under both attacks, and much better than the traditional OR rule and the simple defense Ki rule. The examples of false alarm rate are listed in Table 1.
4.3. Dynamic Behaviors
4.4. Optimal Attack
As discussed in Section 3.3, given the defense scheme, the attacker can find the optimal attack parameters that maximize the damage. In this set of experiments, we find the optimal attack parameters and evaluate the worst performance of the proposed scheme.
We assume that there are cognitive radio nodes performing collaborative sensing. We set the decision threshold so that the overall detection rate is 99% when all users are honest. When OR rule is used, leads to = 99%.
Obviously, the practical values of and cannot be over certain range. Within the range, for each pair of ( , ), we run simulations to identify the maximum attack probability that the attacker can use and avoid being detected. In particular, binary search is used to find the maximum . We first try an initial , which is usually the value of a neighbor pair. For example, if we already obtain the for pair ( , ) through simulation, then normally the maximum for pair ( , ) is a little bit smaller than that of pair ( , ). Then, we run the simulation for 2000 rounds. If the attacker is not detected within 2000 rounds, we will search the middle value of range ( , 1), otherwise we search the middle value of range (0, ). The search continues until the maximum is found. Then, the boundary of undetectable region is determined. We would like to point out that there exists more computational efficient ways to search for the undetectable region, which can be exploited in the future work.
According to (40), we know that the maximum damage will occur at the boundary of the undetectable region. Using (40), we can find the point (i.e., attack parameters) that maximizes the damage in the undetectable region. In this experiment, the optimal attack parameters are , , and , the maximum damage is 0.02.
With the optimal attack parameters, for decision threshold , the overall false alarm rate will increase from 1% to 3%. Recall that the decision threshold was determined to ensure 99% detection rate. This is the worst-case performance of the proposed scheme. Please note that this is the worst case when the attackers are undetectable. When malicious users can be detected, as discussed in Section 4.1, the performance will get close to upper bound (the performance of honest nodes) as detection round increases.
False Alarm Rate (when detection rate = 0.99).
Finally, we would like to point out that the optimal attack is only optimal under certain attack model and certain defense scheme. The method of finding the optimal attack can be extended to study other attack models. We believe the proposed scheme will still work very well under many other attack models, since the attacker's basic philosophies are similar.
4.5. Impact of Position Estimation Error upon Performance
Recall that the proposed scheme needs to know the channel gains that are estimated based on the position of secondary nodes. There are many existing schemes that estimate the location of wireless devices in sensor networks [27–31]. These schemes can be classified into two categories: range based and range free. The range based methods first estimate the distances between pairs of wireless nodes and then calculate the position of individual nodes. Examples of range based schemes are Angle of Arrival (AoA) , Received Signal Strength Indicator (RSSI) , Time of Arrival (ToA) , and Time Difference of Arrival (TDoA) . The range free methods usually use connectivity information to identify the beacon nodes within radio range and then estimate the absolute position of non-beacon nodes .
The performance of these schemes are measured by the location estimate error, which is usually normalized to the units of node radio transmission range (R). Most current algorithms can achieve the accuracy that the estimation error is less than one unit of radio transmission range [28–32].
In this section, we study the impact of position estimation error on the proposed scheme. The simulation settings are mostly the same as the settings in previous experiments. We choose the decision threshold to ensure the overall detection rate be 99% when there are no malicious nodes. The radio transmission range is set to 50 m, which is a typical value for wireless sensor nodes. Both FA attack and FAMD attack with single attacker are simulated.
The average number of rounds to detect malicious node is very stable when the position estimation error is within 4 units of radio range. Recall that most positioning estimate algorithms have the estimation error around 1 unit of radio range. Thus, the performance of the proposed scheme is stable given realistic positioning estimation errors.
When estimation error goes beyond 4 units of radio range, it would take much more rounds to detect the malicious node.
The position estimation error has similar impact on the FA attack and the FAMD attack.
In conclusion, the performance of the proposed scheme is not sensitive to the position estimate error as long as it is within a reasonable range. This reasonable range can be achieved by existing positioning algorithms.
Untrustworthy secondary users can significantly degrade the performance of collaborative spectrum sensing. We propose two attack models, FA attack and FAMD attack. The first attack intends to cause false alarm and the second attack causes both false alarm and miss detection. To deal with these attacks, we first propose a defense scheme to detect single malicious user. The basic idea is to calculate the trust value of all secondary nodes based on their reports. Only reports from nodes that have consistent high trust value will be used in primary user detection. Then we extend the method for single attacker to multiple attacker case. This defense scheme uses an onion-peeling approach and does not need prior knowledge about the attacker number. Finally, we define the damage metric and investigate the attack parameters that maximize the damage.
Comprehensive simulations are conducted to study the ROC curves and suspicious level dynamics for different attack models, attacker numbers and different collaborative sensing schemes. The proposed schemes demonstrate significant performance advantage. For example, when there are 10 secondary users, with the primary user detection rate equals to 0.99, one malicious user can make the false alarm rate ( ) increases to 72%. Whereas the K2 rule defense scheme can reduce to 13%, the proposed scheme reduces to 5%. Two malicious users can make the false alarm rate ( ) increases to 85%. Whereas the K3 defense scheme can reduce to 23%, the proposed scheme reduces to 8%. Furthermore, when a good user suddenly turns bad, the proposed scheme can quickly increase the suspicious level of this user. If this user only behaves badly for a few times, its suspicious level can recover after a large number of good behaviors. For single attacker case, we find optimal attack parameters for the proposed scheme. When facing the optimal attack, the proposed scheme yield 3% false alarm rate, with 99% detection rate. On the other hand, when the K2 rule scheme faces the strongest attack against the K2 rule, the false alarm rate can be 17.5% with 99% detection rate. With the proposed scheme, the impact from malicious users is greatly reduced even if the attacker adopts optimal attack parameters and remains undetected.
This work is supported by CNS-0905556, NSF Award no. 0910461, no. 0831315, no. 0831451 and no. 0901425.
- Mitola J III, Maguire GQ Jr.: Cognitive radio: making software radios more personal. IEEE Personal Communications 1999, 6(4):13-18. 10.1109/98.788210View ArticleGoogle Scholar
- Haykin S: Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 2005, 23(2):201-220.View ArticleGoogle Scholar
- Hossain E, Niyato D, Han Z: Dynamic Spectrum Access in Cognitive Radio Networks. Cambridge University Press, Cambridge, UK; 2008.Google Scholar
- Cabric D, Mishra SM, Brodersen RW: Implementation issues in spectrum sensing for cognitive radios. Proceedings of the 38th Asilomar Conference on Signals, Systems and Computers (ACSSC '04), November 2004, Pacific Grove, Calif, USA 772-776.Google Scholar
- Urkowitz H: Energy detection of unknown deterministic signals. Proceedings of the IEEE 1967, 55(4):523-531.View ArticleGoogle Scholar
- Cabric D, Tkachenko A, Brodersen RW: Experimental study of spectrum sensing based on energy detection and network cooperation. Proceedings of the 1st ACM International Workshop on Technology and Policy for Accessing Spectrum (TAPAS '06), August 2006, Pacific Grove, Calif, USAGoogle Scholar
- Ghasemi A, Sousa ES: Collaborative spectrum sensing for opportunistic access in fading environments. Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN '05), November 2005 131-136.Google Scholar
- Ghasemi A, Sousa ES: Opportunistic spectrum access in fading channels through collaborative sensing. Journal of Communications 2007, 2(2):71-82.View ArticleGoogle Scholar
- Ghasemi A, Sousa ES: Spectrum sensing in cognitive radio networks: the cooperation-processing tradeoff. Wireless Communications and Mobile Computing 2007, 7(9):1049-1060. 10.1002/wcm.480View ArticleGoogle Scholar
- Letaief KB, Zhang W: Cooperative spectrum sensing. In Cognitive Wireless Communication Networks. Springer, New York, NY, USA; 2007.Google Scholar
- Han Z, Liu KJR: Resource Allocation for Wireless Networks: Basics, Techniques, and Applications. Cambridge University Press, Cambridge, UK; 2008.View ArticleGoogle Scholar
- Visotsky E, Kuffher S, Peterson R: On collaborative detection of TV transmissions in support of dynamic spectrum sharing. Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN '05), November 2005, Baltimore, Md, USA 338-345.Google Scholar
- Ganesan G, Li Y: Agility improvement through cooperative diversity in cognitive radio. Proceedings of the IEEE Global Communications Conference (GLOBECOM '05), November 2005, St. Louis, Mo, USA 2505-2509.Google Scholar
- Ganesan G, Li Y: Cooperative spectrum sensing in cognitive radio, part I: two user networks. IEEE Transactions on Wireless Communications 2007, 6(6):2204-2212.View ArticleGoogle Scholar
- Ganesan G, Li Y: Cooperative spectrum sensing in cognitive radio, part II: multiuser networks. IEEE Transactions on Wireless Communications 2007, 6(6):2214-2222.View ArticleGoogle Scholar
- Quan Z, Cui S, Sayed AH: Optimal linear cooperation for spectrum sensing in cognitive radio networks. IEEE Journal on Selected Topics in Signal Processing 2008, 2(1):28-40.View ArticleGoogle Scholar
- Unnikrishnan J, Veeravalli VV: Cooperative sensing for primary detection in cognitive radio. IEEE Journal on Selected Topics in Signal Processing 2008, 2(1):18-27.View ArticleGoogle Scholar
- Sun C, Zhang W, Letaief KB: Cooperative spectrum sensing for cognitive radios under bandwidth constraints. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '07), March 2007, Hong Kong 1-5.Google Scholar
- Sun C, Zhang W, Letaief KB: Cluster-based cooperative spectrum sensing in cognitive radio systems. Proceedings of IEEE International Conference on Communications (ICC '07), June 2007, Glasgow, UK 2511-2515.Google Scholar
- Lee C-H, Wolf W: Energy efficient techniques for cooperative spectrum sensing in cognitive radios. Proceedings of the 5th IEEE Consumer Communications and Networking Conference (CCNC '08), January 2008, Las Vegas, Nev, USA 968-972.Google Scholar
- Chen R, Park J-M, Reed JH: Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications 2008, 26(1):25-37.View ArticleGoogle Scholar
- Newman T, Clancy T: Security threats to cognitive radio signal classifiers. Proceedings of the Virginia Tech Wireless Personal Communications Symposium, June 2009, Blacksburg, Va, USAGoogle Scholar
- Mishra SM, Sahai A, Brodersen RW: Cooperative sensing among cognitive radios. Proceedings of the IEEE International Conference on Communications (ICC '06), June 2006, Istanbul, Turkey 4: 1658-1663.Google Scholar
- Chen R, Park J-M, Bian K: Robust distributed spectrum sensing in cognitive radio networks. Proceedings of IEEE International Conference on Computer Communications (INFOCOM '08), April 2008, Phoenix, Ariz, USA 31-35.Google Scholar
- Clancy T, Goergen N: Security in cognitive radio networks: threats and mitigation. Proceedings of the 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom '08), May 2008, SingaporeGoogle Scholar
- Wang W, Li H, Sun Y, Han Z: Attack-proof collaborative spectrum sensing in cognitive radio networks. Proceedings of the 43rd Annual Conference on Information Sciences and Systems (CISS '09), March 2009 130-134.Google Scholar
- Wang W, Li H, Sun Y, Han Z: CatchIt: detect malicious nodes in collaborative spectrum sensing. Proceedings of the IEEE Global Communications Conference (GLOBECOM '09), November 2009, Honolulu, Hawaii, USAGoogle Scholar
- Peng R, Sichitiu ML: Angle of arrival localization for wireless sensor networks. Proceedings of the 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks (Secon '06), September 2006 1: 374-382.Google Scholar
- Bahl P, Padmanabhan VN: RADAR: an in-building RF-based user location and tracking system. Proceedings of IEEE International Conference on Computer Communications (INFOCOM '00), March 2000, Tel Aviv, Israel 775-784.Google Scholar
- Wellenhoff BH, Lichtenegger H, Collins J: Global Positions System: Theory and Practice. 4th edition. Springer, Berlin, Germany; 1997.Google Scholar
- Savvides A, Han C-C, Strivastava MB: Dynamic fine-grained localization in ad-hoc networks of sensors. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM '01), July 2001, Rome, Italy 166-179.View ArticleGoogle Scholar
- He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T: Rangefree localization schemes for large scale sensor networks. Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (MOBICOM '03), 2003, San Diego, Calif, USAGoogle Scholar
- Zhao Q, Tong L, Swami A, Chen Y: Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: a POMDP framework. IEEE Journal on Selected Areas in Communications 2007, 25(3):589-599.View ArticleGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.