Secure and Optimized Unauthorized Secondary User Detection in Dynamic Spectrum Access

被引:0
|
作者
Zhang, Xiaonan [1 ]
Jia, Qi [1 ]
Guo, Linke [1 ]
机构
[1] SUNY Binghamton, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
基金
美国国家科学基金会;
关键词
Dynamic Spectrum Access; Unauthorized SU Detection; Security; Accuracy; Efficiency; HIERARCHICAL MODULATION; CODES; ERROR;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Dynamic spectrum access (DSA) has been envisioned to become the key to solving worldwide spectrum shortage. However, the open nature of wireless medium brings severe threats to the DSA system resulting from unauthorized access. Specifically, unauthorized secondary user (SU) utilizes the licensed spectrum by faking/replaying the spectrum permit, which will not only introduce severe interference to authorized SU but also disable the DSA system due to the lack of stability and incentives. In this paper, we propose a secure and optimized unauthorized SU detection scheme. By optimizing permit modulation and embedding based on the current channel condition, we shorten the unauthorized SU's detection period and further improve the accuracy with low-complexity implementation. The proposed scheme ensures the security of DSA system and will further unleash its great potential. Extensive experimental results using both MATLAB and Universal Software Radio Peripheral (USRP) demonstrate the effectiveness, efficiency, and accuracy of our proposed scheme.
引用
收藏
页码:254 / 262
页数:9
相关论文
共 50 条
  • [41] Delay Analysis of Multi-User Dynamic Spectrum Access Networks
    Safavi, Ebrahim
    Subbalakshmi, K. P.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON DYNAMIC SPECTRUM ACCESS NETWORKS (DYSPAN), 2015, : 319 - 325
  • [42] Prediction of Exponentially Distributed Primary User Traffic for Dynamic Spectrum Access
    Liu, Chun-Hao
    Gabran, Wesam
    Cabric, Danijela
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1441 - 1446
  • [43] Multinode spectrum sensing based on energy detection for Dynamic Spectrum Access
    Visser, Frank E.
    Janssen, Gerard J. M.
    Pawelczak, Przemyslaw
    2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, : 1394 - 1398
  • [44] Bayesian Compressed Sensing based Dynamic Joint Spectrum Sensing and Primary User Localization for Dynamic Spectrum Access
    Li, Xue
    Hong, Steven
    Han, Zhu
    Wu, Zhiqiang
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [45] Secondary User VoIP Capacity in Opportunistic Spectrum Access Networks with Friendly Scheduling
    Hassanein, Hanan S.
    Badawy, Ghada H.
    Todd, Terence D.
    2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012, : 1760 - 1765
  • [46] Dynamic Spectrum Pricing with Secondary User's Normal Demand Preference
    Wang, Li
    Li, Feng
    MOBILE INFORMATION SYSTEMS, 2018, 2018
  • [47] Ways of Unauthorized Access to Medical Data and Approach to Organize Secure Access using Blockchain Technology
    Maksymiv, Taras
    Chaplinskyi, Roman
    2020 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT), 2020, : 791 - 795
  • [48] Unauthorized Access Detection in Underlay Cognitive Satellite Networks
    Benedetto, Francesco
    Giunta, Gaetano
    Pallotta, Luca
    IEEE Networking Letters, 2021, 3 (04): : 181 - 185
  • [49] Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access
    Dong, Xuewen
    Kang, Qiao
    Yao, Qingsong
    Lu, Di
    Xu, Yang
    Liu, Jia
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 1439 - 1448
  • [50] Unauthorized port access detection in the H-HIDS
    Sato, T
    Miyamori, D
    Sakuma, R
    Fukase, M
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 389 - 394