Secure and Optimized Unauthorized Secondary User Detection in Dynamic Spectrum Access

被引:0
|
作者
Zhang, Xiaonan [1 ]
Jia, Qi [1 ]
Guo, Linke [1 ]
机构
[1] SUNY Binghamton, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
基金
美国国家科学基金会;
关键词
Dynamic Spectrum Access; Unauthorized SU Detection; Security; Accuracy; Efficiency; HIERARCHICAL MODULATION; CODES; ERROR;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Dynamic spectrum access (DSA) has been envisioned to become the key to solving worldwide spectrum shortage. However, the open nature of wireless medium brings severe threats to the DSA system resulting from unauthorized access. Specifically, unauthorized secondary user (SU) utilizes the licensed spectrum by faking/replaying the spectrum permit, which will not only introduce severe interference to authorized SU but also disable the DSA system due to the lack of stability and incentives. In this paper, we propose a secure and optimized unauthorized SU detection scheme. By optimizing permit modulation and embedding based on the current channel condition, we shorten the unauthorized SU's detection period and further improve the accuracy with low-complexity implementation. The proposed scheme ensures the security of DSA system and will further unleash its great potential. Extensive experimental results using both MATLAB and Universal Software Radio Peripheral (USRP) demonstrate the effectiveness, efficiency, and accuracy of our proposed scheme.
引用
收藏
页码:254 / 262
页数:9
相关论文
共 50 条
  • [1] Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access
    Das, Debarun
    Znati, Taieb
    Weiss, Martin B. H.
    2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,
  • [2] CREAM: Unauthorized Secondary User Detection in Fading Environments
    Zhang, Xiaonan
    Huang, Pei
    Jia, Qi
    Guo, Linke
    2018 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2018, : 406 - 414
  • [3] Intelligent Algorithms for Dynamic Spectrum Access a Secondary User in Cognitive Radio Systems
    Kandaurova, E. O.
    Chirov, D. S.
    2021 SYSTEMS OF SIGNAL SYNCHRONIZATION, GENERATING AND PROCESSING IN TELECOMMUNICATIONS (SYNCHROINFO), 2021,
  • [4] One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious
    Garnaev, Andrey
    Trappe, Wade
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) : 1064 - 1075
  • [5] Traffic Pattern-Based Reward Maximization for Secondary User in Dynamic Spectrum Access
    Ahmed, M. Ejaz
    Song, Ju Bin
    Han, Zhu
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 291 - 296
  • [6] SECURE BLOCKCHAINS FOR DYNAMIC SPECTRUM ACCESS A Decentralized Database in Moving Cognitive Radio Networks Enhances Security and User Access
    Kotobi, Khashayar
    Bilen, Sven G.
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2018, 13 (01): : 32 - 39
  • [7] INTERFERENCE EFFECTS OF NON-IDEAL DYNAMIC SPECTRUM ACCESS ON PRIMARY AND SECONDARY USER CAPACITIES
    Datla, Dinesh
    Newman, Tim
    Bose, Tamal
    Reed, Jeffrey H.
    2009 IEEE 13TH DIGITAL SIGNAL PROCESSING WORKSHOP & 5TH IEEE PROCESSING EDUCATION WORKSHOP, VOLS 1 AND 2, PROCEEDINGS, 2009, : 212 - 217
  • [8] Optimizing the Coexistence Performance of Secondary-User Networks Under Primary-User Constraints for Dynamic Spectrum Access
    Sun, Chen
    Villardi, Gabriel Porto
    Lan, Zhou
    Alemseged, Yohannes D.
    Ha Nguyen Tran
    Harada, Hiroshi
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (08) : 3665 - 3676
  • [9] Primary User Traffic Estimation for Dynamic Spectrum Access
    Gabran, Wesam
    Liu, Chun-Hao
    Pawelczak, Przemyslaw
    Cabric, Danijela
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (03) : 544 - 558
  • [10] Distributed and Secure Uplink Power Control in Dynamic Spectrum Access
    Lin, Yousi
    Yang, Yaling
    Du, Xiaojiang
    Wu, Jie
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (12) : 10242 - 10256