Detection Schemes of Illegal Spectrum Access Behaviors in Multiple Authorized Users Scenario

In this paper, our aim is to detect illegal spectrum access behaviors. Firstly, we detect whether the channel is busy, and then if it is busy, recognizing whether there are illegal users. To get closer to the actual situation, we consider a more general scenario where multiple users are authorized to work on the same channel under certain interference control strategies, and build it as a ternary hypothesis test model using the generalized multi-hypothesis Neyman-Pearson criterion. Considering the various potential combination of multiple authorized users, the spectrum detection process utilizes a two-step detector. We adopt the Generalized Likelihood Ratio Test (GLRT) and the Rao test to detect illegal spectrum access behaviors. What is more, the Wald test is proposed which has a compromise between computational complexity and performance. The relevant formulas of the three detection schemes are derived. Finally, comprehensive and in-depth simulations are provided to verify the effectiveness of the proposed detection scheme that it has the best detection performance under different authorized sample numbers and different performance constraints. Besides, we illustrate the probability of detection of illegal behaviors under different parameters of illegal behaviors and different sets of AUs’ states under the Wald test.

[1]  W. Gardner Exploitation of spectral redundancy in cyclostationary signals , 1991, IEEE Signal Processing Magazine.

[2]  Zhu Han,et al.  Spectrum Sensing Under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective , 2018, IEEE Transactions on Information Forensics and Security.

[3]  Yu-Dong Yao,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack , 2011, IEEE Transactions on Wireless Communications.

[4]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[5]  Peter Willett,et al.  Generalized Rao Test for Decentralized Detection of an Uncooperative Target , 2017, IEEE Signal Processing Letters.

[6]  Guoru Ding,et al.  Detection of Spectrum Misuse Behavior in Satellite-Terrestrial Spectrum Sensing Based on Multi-Hypothesis Tests , 2020, IEEE Access.

[7]  Yulong Gao,et al.  Cooperative spectrum sensing based on the compressed sensing , 2015, 2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC).

[8]  Roberto Garello,et al.  Cooperative spectrum sensing based on the limiting eigenvalue ratio distribution in wishart matrices , 2009, IEEE Communications Letters.

[9]  Kenji Nakagawa,et al.  Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[10]  Mohamed-Slim Alouini,et al.  On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.

[11]  Larry J. Greenstein,et al.  Detecting anomalous spectrum usage in dynamic spectrum access networks , 2012, Ad Hoc Networks.

[12]  Kang G. Shin,et al.  Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation , 2011, IEEE Transactions on Mobile Computing.

[13]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[14]  Zhu Han,et al.  Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.