Visible to the public Biblio

Filters: Keyword is spectrum scarcity  [Clear All Filters]
2021-03-15
Morozov, M. Y., Perfilov, O. Y., Malyavina, N. V., Teryokhin, R. V., Chernova, I. V..  2020.  Combined Approach to SSDF-Attacks Mitigation in Cognitive Radio Networks. 2020 Systems of Signals Generating and Processing in the Field of on Board Communications. :1–4.
Cognitive radio systems aim to solve the issue of spectrum scarcity through implementation of dynamic spectrum management and cooperative spectrum access. However, the structure of such systems introduced unique types of vulnerabilities and attacks, one of which is spectrum sensing data falsification attack (SSDF). In such attacks malicious users provide incorrect observations to the fusion center of the system, which may result in severe quality of service degradation and interference for licensed users. In this paper we investigate this type of attacks and propose a combined approach to their mitigation. On the first step a reputational method is used to isolate the initially untrustworthy nodes, on the second step specialized q-out-of-m fusion rule is utilized to mitigate the remains of attack. In this paper we present theoretical analysis of the proposed combined method.
Thanuja, T. C., Daman, K. A., Patil, A. S..  2020.  Optimized Spectrum sensing Techniques for Enhanced Throughput in Cognitive Radio Network. 2020 International Conference on Emerging Smart Computing and Informatics (ESCI). :137–141.
The wireless communication is a backbone for a development of a nation. But spectrum is finite resource and issues like spectrum scarcity, loss of signal quality, transmission delay, raised in wireless communication system due to growth of wireless applications and exponentially increased number of users. Secondary use of a spectrum using Software Defined Radio (SDR) is one of the solutions which is also supported by TRAI. The spectrum sensing is key process in communication based on secondary use of spectrum. But energy consumption, added delay, primary users security are some threats in this system. Here in this paper we mainly focused on throughput optimization in secondary use of spectrum based on optimal sensing time and number of Secondary users during cooperative spectrum sensing in Cognitive radio networks.