A Two Step Secure Spectrum Sensing Algorithm Using Fuzzy Logic for Cognitive Radio Networks

In this paper, a two step secure spectrum sensing algorithm is proposed for cognitive radio networks. In this algorithm, the sensing results of secondary users are pre-filtered and applying fuzzy logic, so, the overall sensing performance of the network is improved. To determine pre-filter parameters, statistical parameters of the sensing results are used to remove those sensing results which are far from the majority sensing results. However, to obtain a better performance in the spectrum sensing, we propose a fuzzy logic to nullify the effects of malicious users who transmit false sensing data to the fusion center. We further propose a Fuzzy Trust Level for each user as to weight the sensing result of the corresponding user before combining all sensing results in the fusion center. Simulation results demonstrate that our proposed algorithm yield significant improvement in the performance of the spectrum sensing and identifying malicious users.

[1]  Z. Trabelsi,et al.  On Detecting Port Scanning using Fuzzy Based Intrusion Detection System , 2008, 2008 International Wireless Communications and Mobile Computing Conference.

[2]  Haiming Wang,et al.  Double Thresholds Based Cooperative Spectrum Sensing Against Untrusted Secondary Users in Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[3]  Lotfi A. Zadeh,et al.  Fuzzy Algorithms , 1968, Inf. Control..

[4]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[5]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[6]  Kuan-Jen Peng,et al.  Distortion and Cost Controlled Video Streaming in a Heterogeneous Wireless Network Environment , 2006, 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications.

[7]  Majid Khabbazian,et al.  Malicious User Detection in a Cognitive Radio Cooperative Sensing System , 2010, IEEE Transactions on Wireless Communications.

[8]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[9]  R.W. Brodersen,et al.  Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[10]  Wang Jun,et al.  A Distributed Spectrum Sensing Scheme Based on Credibility and Evidence Theory in Cognitive Radio Context , 2006, 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications.

[11]  Kyung Sup Kwak,et al.  Soft Combination Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networks , 2009 .

[12]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[13]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[14]  Jun Wang,et al.  A Distributed Spectrum Sensing Scheme Based on Credibility and Evidence Theory in Cognitive Radio Context , 2006, PIMRC.

[15]  Ehsan Taghavi Trustworthy Node Detection in Cognitive Radio in HostileEnvironments , 2013 .

[16]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[17]  Insoo Koo,et al.  A Secure Distributed Spectrum Sensing Scheme in Cognitive Radio , 2009, ICIC.

[18]  S. Enserink,et al.  A cyclostationary feature detector , 1994, Proceedings of 1994 28th Asilomar Conference on Signals, Systems and Computers.