Influence of relaying malicious node within cooperative sensing in cognitive radio network
- 69 Downloads
Intending to enhance the utilization of the radio spectrum in cognitive radio without inflecting the primary user is a primary issue. Cooperative sensing techniques have been proposed to improve the radio access decision compensating for the inherent sensing errors present in the devices. Meanwhile collaboration among secondary users poses a potential security threat. A malicious node might alter the resulted sensing information to attain a personal benefit. This text quantifies the number of nodes getting affected by the malicious nodes’ false reports by deriving formulas validated by simulated scenarios. The analysis of this paper is based on the assumption that nodes are deployed according to a poisson point process. First, we estimate the scope of influence of the malicious node, it is shown in a one dimensional network that a malicious node can take advantage of its relative position with respect to other neighboring nodes in order to leverage its influence. Then, the influence of this malicious node in a two dimensional network is investigated varying its relative position. The derivations are validated by simulations of the network carried out via R programming language describing the relevant deployment scenarios.
KeywordsCognitive radio Cooperative sensing Stochastic geometry Poisson point process
- 3.Mishra, S.M., Sahai, A., & Brodersen, R.W. (June 2006). Cooperative sensing among cognitive radios. In 2006 IEEE international conference on communications (Vol. 4. pp. 1658–1663). https://doi.org/10.1109/ICC.2006.254957.
- 6.Adelantado, F., & Verikoukis, C. (June 2011). A non-parametric statistical approach for malicious users detection in cognitive wireless ad-hoc networks. In 2011 IEEE international conference on communications (ICC) (pp. 1–5). https://doi.org/10.1109/icc.2011.5963004.
- 7.ElSawy, H., Hossain, E., & Haenggi, M. (2013). Stochastic geometry for modeling, analysis, and design of multi-tier and cognitive cellular wireless networks: A survey. IEEE Communications Surveys Tutorials, 15(3), 996–1019. https://doi.org/10.1109/SURV.2013.052213.00000. ISSN 1553-877X.CrossRefGoogle Scholar
- 9.Hasan, S. M., Hayat, M. A., & Hossain, M. F. (2015). On the downlink sinr and outage probability of stochastic geometry based lte cellular networks with multi-class services. In 2015 18th international conference on computer and information technology (ICCIT) (pp. 65–69). https://doi.org/10.1109/ICCITechn.2015.7488044.
- 14.Lu, W., & Di Renzo, M. (2015). Stochastic geometry modeling of cellular networks: Analysis, simulation and experimental validation. In Proceedings of the 18th ACM international conference on modeling, analysis and simulation of wireless and mobile systems. MSWiM ’15, (pp. 179–188). ACM, New York, NY. https://doi.org/10.1145/2811587.2811597. http://doi.acm.org/10.1145/2811587.2811597.