Skip to main content

Performance Analysis of a Collaborative DSA-Based Network with Malicious Nodes

  • Conference paper
  • First Online:
e-Infrastructure and e-Services for Developing Countries (AFRICOMM 2017)

Abstract

This work analyses the performance of a Dynamic Spectrum Access (DSA) network with secondary nodes to provide Internet services, and studies the impact of malicious nodes and cooperative secondary nodes on the performance of the network and spectrum utilization. The work mathematically models the throughput, latency, and spectrum utilization with varying numbers of malicious nodes, secondary nodes, miss probabilities, and false alarm probabilities, and studies their effect on performance of the network. The results point to rapid spectrum starvation as the number of malicious nodes increase, as well as the negative impact of too many secondary nodes crowding out available spectrum with resultant degradation of throughput and latency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kaligineedi, P., Khabbazian, M., Bhargava, V.K.: Secure cooperative sensing techniques for cognitive radio systems. In: 2008 IEEE International Conference on Communications, pp. 3406–3410 (2008)

    Google Scholar 

  2. Yu, F.R., et al.: Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In: 2009 Military Communications Conference, MILCOM 2009. IEEE (2009)

    Google Scholar 

  3. Chen, R., Park, J.-M., Bian, K.: Robust distributed spectrum sensing in cognitive radio networks. In: INFOCOM 2008, The 27th Conference on Computer Communications. IEEE (2008)

    Google Scholar 

  4. Mfupe, L., Mekuria, F., Montsi, L., Mzyece, M.: Geo-location white space spectrum databases: review of models and design of a dynamic spectrum access coexistence planner and manager. In: Mishra, A., Johnson, D. (eds.) White Space Communication, pp. 153–194. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-08747-4_6

    Chapter  Google Scholar 

  5. Bouassida, M.S., et al.: Sybil nodes detection based on received signal strength variations within VANET. Int. J. Netw. Secur. 9(1), 22–33 (2009)

    Google Scholar 

  6. Othman, A.K., Adams, A.E., Tsimenidis, C.C.: Node discovery protocol and localization for distributed underwater acoustic networks. In: 2006 International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications, AICT-ICIW 2006. IEEE (2006)

    Google Scholar 

  7. Takyi, A., Densmore, M., Johnson, D.: Collaborative neighbour monitoring in TV white space network. In: Proceedings Southern Africa Telecommunication Networks and Applications Conference (SATNAC 2016), George, South Africa (2016)

    Google Scholar 

  8. Jin, Z., Anand, S., Subbalakshmi, K.P.: Detecting primary user emulation attacks in dynamic spectrum access networks. In: 2009 IEEE International Conference on Communications, ICC 2009. IEEE (2009)

    Google Scholar 

  9. Sharma, S.K., Chatzinotas, S., Ottersten, B.: Cooperative spectrum sensing for heterogeneous sensor networks using multiple decision statistics. In: Weichold, M., Hamdi, M., Shakir, M.Z., Abdallah, M., Karagiannidis, G.K., Ismail, M. (eds.) CrownCom 2015. LNICST, vol. 156, pp. 321–333. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24540-9_26

    Chapter  Google Scholar 

  10. Jain, M., Kumar, V., Gangopadhyay, R., Debnath, S.: Cooperative spectrum sensing using improved p-norm detector in generalized \(\kappa \)-\(\mu \) fading channel. In: Weichold, M., Hamdi, M., Shakir, M., Abdallah, M., Karagiannidis, G., Ismail, M. (eds.) CrownCom 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 156, pp. 225–234. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24540-9_18

    Chapter  Google Scholar 

  11. Pinifolo, J., et al.: Successful deployment and key applications of television white space networks (TVWS) in Malawi. In: Proceedings and Report of the 7th UbuntuNet Alliance Annual Conference, pp. 347–354 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Augustine Takyi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Takyi, A., Densmore, M., Hadzic, S., Johnson, D. (2018). Performance Analysis of a Collaborative DSA-Based Network with Malicious Nodes. In: Odumuyiwa, V., Adegboyega, O., Uwadia, C. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 250. Springer, Cham. https://doi.org/10.1007/978-3-319-98827-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98827-6_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98826-9

  • Online ISBN: 978-3-319-98827-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics