Beruflich Dokumente
Kultur Dokumente
Mehdi Mahdavi
I. INTRODUCTION
The conducted research by the Federal Communication
Commission (FCC) indicated that some part of radio spectrum
is idle in certain periods of time [1]. One of reasons of this
inefficient usage of spectrum is assigning spectrum to licensed
users, called primary users. Improper usage of spectrum and
increasing application of wireless systems on the other hand,
necessitate development of dynamic access techniques, where
users who have no spectrum licenses, also known as secondary
users, are allowed to use temporarily unused licensed spectrum
[2]. This technology is known as Cognitive Radio (CR). CR is
based on effective spectrum sensing. Through spectrum
sensing and analysis, SUs can obtain awareness about the
spectrum usage and existence of PU.
1144
Suppose
is energy detector output of ith secondary
th
user at n frame. Typically, local sensing for primary signal
detection can be formulated as a binary hypothesis problem as
follows [16]:
L
2
n i (k )
H0
k =1
i [n ] =
L
2
hi (k )s (k ) + ni (k )
H1
k =1
i = 1, 2,, N
is
where is transmitted signal from the primary user,
the channel gain between the primary user and the ith
secondary user, is zero-mean additive white Gaussian noise
is number of samples obtained from energy
(AWGN),
denote the hypothesis of the absence
detector and and
and presence of the PU signal, respectively.
B. Attack Model
There are always users who intentionally or
unintentionally send false data to the FC. SUs who
intentionally send false data called malicious users and
divided into three groups: Always YES, Always NO and
Always Opposite users. The efficiency of CSS is reduced by
the presence of malicious users.
Frame
1
Sensing Phase
Transmission Phase
Decision Phase
(1)
1145
where
where
(2)
(3)
lrd I (i ) =
N I (i
1
reach dist I (i , k )
N I ( ) (i )
(4)
LOFI (i ) =
k N I ( i ) (i )
ldrI ( k )
ldrI (i )
(5)
N I ( ) (i )
i
1146
1147
VI. CONCLUSION
This paper proposed an outlier-based malicious user
detection scheme for cooperative sensing. The proposed
scheme, which is based on Local Outlier Factor, is resistant
against several malicious users while the number and type of
attacker is unknown. Also proposed CSS scheme dont require
pre-knowledge about data distribution, primary network,
location of primary transmitter and location of secondary
users. Finally, LOF tests perform better than recent research
works.
[18]
[19]
[20]
VII. REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[21]
[22]
[23]
[24]
1148