Eigenvalues based spectrum sensing against untrusted users in cognitive radio networks

Spectrum sensing is an essential mechanism for a cognitive radio system. However, the security aspects of spectrum sensing receive little attention so far. In this paper, we identify two kinds of untrusted secondary users which are called ‘Always Yes’ users and ‘Always No’ users. These untrusted secondary users can degrade detection performance greatly, especially when conventional data fusion rules are applied. To counter these threats, for the correlated primary signals, an eigenvalues based detection scheme with double thresholds and revised data fusion rules is proposed. Maximum eigenvalues are proved to be very effective to detect the correlated primary signals and to find the untrusted users. By using the revised data fusion rules, simulation shows that our method has a better detection performance than the conventional method.

[1]  Sangwon Kim,et al.  The detection and classification of the Wireless Microphone signal in the IEEE 802.22 WRAN system , 2007, 2007 Asia-Pacific Microwave Conference.

[2]  I. Johnstone On the distribution of the largest eigenvalue in principal components analysis , 2001 .

[3]  Yonghong Zeng,et al.  Maximum Eigenvalue Detection: Theory and Application , 2008, 2008 IEEE International Conference on Communications.

[4]  Anant Sahai,et al.  Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.

[5]  Geoffrey Ye Li,et al.  Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[6]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[7]  Ying-Chang Liang,et al.  Optimization for Cooperative Sensing in Cognitive Radio Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[8]  Kazunori Akabane,et al.  A Novel Cooperative Sensing Technique for Cognitive Radio , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[9]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.