A Primary User Authentication Scheme for Secure Cognitive TV Spectrum Sharing

نویسندگان

  • Fatty M. Salem
  • Maged H. Ibrahim
  • I. I. Ibrahim
چکیده

Cognitive radio is being intensively investigated by regulatory bodies as the enabling technology for opportunistic access to the TV white spaces. The successful deployment of cognitive radio networks and the realization of their benefits depend on the assignment of essential security challenges to resist misuse of the systems. In this paper, we propose a primary user authentication scheme in the presence of attackers. Our system is based on the deployment of multiple stages of “helper” nodes, helper nodes in the first stage are fixed and close to primary user, while helper nodes in the next stages are placed within the primary user’s coverage area. Helper nodes are responsible for sensing the spectrum based on the received signal power detection scheme, and broadcasting the spectrum information to secondary users. Compared to prior work, our system can provide a stricter requirement for probability of false alarm and probability of missing.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

The Optimal MMSE Transceiver Design for IoT-oriented Cognitive Radio Systems

This paper studies interference alignment scheme and minimum mean square error (MMSE) improvement in Internet of Things (IoT)-oriented cognitive systems, where IoT devices share the licensed spectrum by cognitive radio in spectrum underlay. Target to manage the inter-tier interference caused by cognitive spectrum sharing as well as ensure an MMSE at receivers, the interference alignment algorit...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Interference Cancellation and Energy Harvesting Techniques for Cooperative Spectrum Sharing Cognitive Radio Systems

With the exponential increase in wireless applications, there arises the need to utilize the spectrum more efficiently. Cooperative spectrum sharing (CSS) schemes have been proposed as a viable framework for cognitive radio where, an unlicensed (secondary) user can access the spectrum of licensed (primary) user, on the condition that unlicensed user will help the licensed user in achieving the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012