Abstract
Cognitive radio (CR) is a technological invention to improve the spectrum performance in wireless networks linked to a cooperative spectrum sensing strategy. This performance, however, can be degraded by adversary secondary nodes which intentionally aim to falsify the decisions on the presence of primary nodes. The purpose of this paper is to model and investigate the impact of adversary secondary nodes in the context of cooperative spectrum sensing in CRs in terms of false alarms and missed detection probabilities. The impact of these probabilities is then included analytically in the throughput formula accordingly, under the assumption of adopting Slotted-ALOHA protocol by the secondary nodes. Then an intrusion detection system is proposed with the goal to maximize the network throughput with adversary secondary users. Simulations are carried out to test the validation of the proposed method and to evaluate the achieved results with the well-known decision rules.
Similar content being viewed by others
Data Availability
The manuscript has no associated data.
References
Mitola, J., & Maguire, G. Q. (1999). Cognitive radio: Making software radios more personal. IEEE personal communications, 6(4), 13–18.
Pandit, S., & Singh, G. (2017). Spectrum sharing in cognitive radio networks. Springer.
Matin, M. A. (2017). Spectrum Access and Management for Cognitive Radio Networks. Springer.
Chkirbene, Z., & Hamdi, N. (2015). A survey on spectrum management in cognitive radio networks. International Journal of Wireless and Mobile Computing, 8(2), 153–165.
Wang, B., & Liu, K. R. (2010). Advances in cognitive radio networks: A survey. IEEE Journal of selected topics in signal processing, 5(1), 5–23.
Benmammar, B., Amraoui, A., & Krief, F. (2013). A survey on dynamic spectrum access techniques in cognitive radio networks. International Journal of Communication Networks and Information Security (IJCNIS), 5(2), 68–79.
Noorshams, N., Malboubi, M., Bahai, A. (2010). Centralized and decentralized cooperative spectrum sensing in cognitive radio networks: A novel approach. In 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2010, pp. 1–5.
Lee, W.-Y., & Akyildiz, I. F. (2011). Spectrum-aware mobility management in cognitive radio cellular networks. IEEE Transactions on Mobile Computing, 11(4), 529–542.
Miao, L., Di, Xu., Huo, Z.-M., & Sun, Z.-X. (2022). Research on spectrum sensing data falsification attack detection algorithm in cognitive Internet of Things. Telecommunication Systems, 80(2), 227–238.
Nair, P. R., Vinod, A. P., & Krishna, A. K. (2011). A fast two stage detector for spectrum sensing in cognitive radios. IEEE Vehicular Technology Conference (VTC Fall), 2011, 1–5.
Zeng, Y., Zhang, M., Han, F., Gong, Yi., & Zhang, J. (2019). Spectrum analysis and convolutional neural network for automatic modulation recognition. IEEE Wireless Communications Letters, 8(3), 929–932.
Prashob, R. N., Vinod, A., & Krishna, A. K. (2010). An adaptive threshold based energy detector for spectrum sensing in cognitive radios at low SNR. IEEE International Conference on Communication Systems, 2010, 574–578.
Hillenbrand, J., Weiss, T. A., & Jondral, F. K. (2005). Calculation of detection and false alarm probabilities in spectrum pooling systems. IEEE Communications letters, 9(4), 349–351.
Ganesan, G., & Li, Y. (2007). Cooperative spectrum sensing in cognitive radio, part II: Multiuser networks. IEEE Transactions on wireless communications, 6(6), 2214–2222.
Cabric, D., Mishra, S. M., & Brodersen, R. W. (2004). Implementation issues in spectrum sensing for cognitive radios. Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 1, 772–776.
Kam, M., Zhu, Q., & Gray, W. S. (1992). Optimal data fusion of correlated local decisions in multiple sensor detection systems. IEEE Transactions on Aerospace and Electronic Systems, 28(3), 916–920.
Shekhawat, G.K., & Yadav, R.P. (2021). Review on classical to deep spectrum sensing in cognitive radio networks. In 2021 Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 11–15. IEEE.
Abbass, N., Hassan, H. A. H., Chaaya, J. A., Mansour, A., & Yao, K. C. (2021). Spectrum sensing for cognitive radio: Recent advances and future challenge. Sensors, 21(7), 2408.
Haldorai, A., & Kandaswamy, U. (2019). Cooperative spectrum handovers in cognitive radio networks. In A. Haldorai & U. Kandaswamy (Eds.), Intelligent spectrum handovers in cognitive radio networks (pp. 1–18). Springer International Publishing.
Kumar, A., & Kumar, K. (2020). Multiple access schemes for cognitive radio networks: A survey. Physical Communication, 38, 100953.
Akyildiz, I. F., Lee, W.-Y., Vuran, M. C., & Mohanty, S. (2006). NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer Networks, 50(13), 2127–2159.
Alam, S., & Mallick, S. (2021). Analysis of throughput in narrowband cognitive radio networks over fading channels: A collaborative spectrum sensing approach.
Lundén, J., Koivunen, V., Huttunen, A., Poor, H.V. (2007). Spectrum sensing in cognitive radios based on multiple cyclic frequencies. In 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2007, pp. 37–43.
Ibe, O. C. (2017). Fundamentals of Data Communication Networks. UK: Wiley.
Fragkiadakis, A. G., Tragos, E. Z., & Askoxylakis, I. G. (2012). A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys & Tutorials, 15(1), 428–445.
Mao, H., & Zhu, L. (2011). An investigation on security of cognitive radio networks. International Conference on Management and Service Science, 2011, 1–4.
Safdar, G.A., & O’Neill, M. (2009). Common control channel security framework for cognitive radio networks. In VTC Spring 2009-IEEE 69th Vehicular Technology Conference, 2009, pp. 1–5.
Salahdine, F., & Kaabouch, N. (2020). Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey. Physical Communication, 39, 101001.
Funding
This manuscript has been funded partially by research offices at the University of Kurdistan and the University of Halabja.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical Approval
This article does not contain any studies with human participants or animals perorated by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Tofiq, A.K.H., Fathi, M. & Ahmed, F.W. A Lightweight Secure Throughput Optimization Scheme in Cognitive Radio Networks. Wireless Pers Commun 132, 245–259 (2023). https://doi.org/10.1007/s11277-023-10609-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10609-8