Cooperative spectrum sensing techniques using decision comparison for cognitive radio systems including malicious nodes

Toru Sakaguchi, Tomoaki Ohtsuki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

We consider cooperative spectrum sensing based on energy detection. The performance of cooperative spectrum sensing is largely degraded if there are some malfunctioning sensing devices. As methods to mitigate the effects of malicious nodes on cooperative spectrum sensing, pre-filtering and weighting of sensing data are shown to be effective. As malicious nodes, three types of the nodes that regularly produce false values far above or below the threshold have been considered. However, anything other than the three kinds of malicious nodes has not been considered. In this paper, we present techniques to identify not only malicious nodes that give false values far above or below the threshold but also malicious nodes that give false values slightly above or below the threshold or random false values, and to mitigate their harmful effects on the cooperative spectrum sensing. By results of simulations, we show that the proposed algorithm can identify all those malicious nodes, and can mitigate their harmful effects.

Original languageEnglish
Title of host publicationISCIT 2010 - 2010 10th International Symposium on Communications and Information Technologies
Pages464-469
Number of pages6
DOIs
Publication statusPublished - 2010
Event2010 10th International Symposium on Communications and Information Technologies, ISCIT 2010 - Tokyo, Japan
Duration: 2010 Oct 262010 Oct 29

Other

Other2010 10th International Symposium on Communications and Information Technologies, ISCIT 2010
CountryJapan
CityTokyo
Period10/10/2610/10/29

    Fingerprint

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Cite this

Sakaguchi, T., & Ohtsuki, T. (2010). Cooperative spectrum sensing techniques using decision comparison for cognitive radio systems including malicious nodes. In ISCIT 2010 - 2010 10th International Symposium on Communications and Information Technologies (pp. 464-469). [5664884] https://doi.org/10.1109/ISCIT.2010.5664884