Security-reliability trade-off for cognitive radio networks in the presence of eavesdropping attack

نویسنده

  • Jia Zhu
چکیده

In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of an eavesdropper. In the cognitive radio network, CBS first detects whether there is spectrum hole through spectrum sensing and then communicates with CUs over the detected spectrum hole. Due to the broadcast nature of wireless transmission, the eavesdropper can overhear the cognitive transmissions between CBS and CUs and attempts to decode its overheard signals for interception purpose. In order to effectively defend against the eavesdropping attack, we propose a multiuser scheduling scheme for cognitive transmissions, where a CU with the highest instantaneous capacity to CBS is selected and scheduled to communicate with CBS. We analyze the security-reliability trade-off performance of proposed multiuser scheduling scheme for cognitive transmissions with the imperfect spectrum sensing over Rayleigh fading channels, where the security and reliability are evaluated in terms of the intercept probability and the outage probability, respectively. Numerical results illustrate that as the intercept probability requirement loosens, the outage probability of proposed multiuser scheduling scheme decreases accordingly, showing the trade-off between security and reliability. In addition, as the number of CUs increases, numerical intercept probability and outage probability of the multiuser scheduling scheme significantly improve, implying the security and reliability benefits through multiuser scheduling.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

متن کامل

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

A Primary User Emulation Attack Countermeasure Strategy and Energy-Efficiency Analysis in Cognitive Radio Networks

Due to the fact that security and energy efficiency are investigated separately in the conventional Primary User Emulation Attack (PUEA) countermeasure strategy in Cooperative Spectrum Sensing (CSS) process, the tradeoff between security and energy efficiency is discussed in this paper. CSS can improve detection performance whereas energy consumption will dramatically boost up with the increasi...

متن کامل

Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Adv. Sig. Proc.

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013