TY - GEN
T1 - Cooperative spectrum sensing techniques using decision comparison for cognitive radio systems including malicious nodes
AU - Sakaguchi, Toru
AU - Ohtsuki, Tomoaki
PY - 2010/12/1
Y1 - 2010/12/1
N2 - We consider cooperative spectrum sensing based on energy detection. The performance of cooperative spectrum sensing is largely degraded if there are some malfunctioning sensing devices. As methods to mitigate the effects of malicious nodes on cooperative spectrum sensing, pre-filtering and weighting of sensing data are shown to be effective. As malicious nodes, three types of the nodes that regularly produce false values far above or below the threshold have been considered. However, anything other than the three kinds of malicious nodes has not been considered. In this paper, we present techniques to identify not only malicious nodes that give false values far above or below the threshold but also malicious nodes that give false values slightly above or below the threshold or random false values, and to mitigate their harmful effects on the cooperative spectrum sensing. By results of simulations, we show that the proposed algorithm can identify all those malicious nodes, and can mitigate their harmful effects.
AB - We consider cooperative spectrum sensing based on energy detection. The performance of cooperative spectrum sensing is largely degraded if there are some malfunctioning sensing devices. As methods to mitigate the effects of malicious nodes on cooperative spectrum sensing, pre-filtering and weighting of sensing data are shown to be effective. As malicious nodes, three types of the nodes that regularly produce false values far above or below the threshold have been considered. However, anything other than the three kinds of malicious nodes has not been considered. In this paper, we present techniques to identify not only malicious nodes that give false values far above or below the threshold but also malicious nodes that give false values slightly above or below the threshold or random false values, and to mitigate their harmful effects on the cooperative spectrum sensing. By results of simulations, we show that the proposed algorithm can identify all those malicious nodes, and can mitigate their harmful effects.
UR - http://www.scopus.com/inward/record.url?scp=78651260090&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78651260090&partnerID=8YFLogxK
U2 - 10.1109/ISCIT.2010.5664884
DO - 10.1109/ISCIT.2010.5664884
M3 - Conference contribution
AN - SCOPUS:78651260090
SN - 9781424470105
T3 - ISCIT 2010 - 2010 10th International Symposium on Communications and Information Technologies
SP - 464
EP - 469
BT - ISCIT 2010 - 2010 10th International Symposium on Communications and Information Technologies
T2 - 2010 10th International Symposium on Communications and Information Technologies, ISCIT 2010
Y2 - 26 October 2010 through 29 October 2010
ER -