A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks

Cognitive radio (CR) is being considered as a vital technology to provide solution to spectrum scarcity in next generation network, by efficiently utilizing the vacant spectrum of the licensed users. Cooperative spectrum sensing in cognitive radio network has a promising performance compared to the...

Full description

Bibliographic Details
Main Authors: Muhammad Sajjad Khan, Muhammad Jibran, Insoo Koo, Su Min Kim, Junsu Kim
Format: Article
Language:English
Published: Hindawi-Wiley 2019-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2019/2350694
id doaj-67eacae2fda64f8e98010689913243d7
record_format Article
spelling doaj-67eacae2fda64f8e98010689913243d72020-11-24T21:32:29ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772019-01-01201910.1155/2019/23506942350694A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio NetworksMuhammad Sajjad Khan0Muhammad Jibran1Insoo Koo2Su Min Kim3Junsu Kim4Department of Electrical Engineering, International Islamic University Islamabad, PakistanDepartment of Electrical Engineering, International Islamic University Islamabad, PakistanSchool of Electrical Engineering, University of Ulsan, 93 Daehak-ro, Nam-gu, Ulsan 680-749, Republic of KoreaDepartment of Electronic Engineering, Korea Polytechnic University, 237 Sangidaehak-ro, Siheung-si, Gyeonggi-do 429-793, Republic of KoreaDepartment of Electronic Engineering, Korea Polytechnic University, 237 Sangidaehak-ro, Siheung-si, Gyeonggi-do 429-793, Republic of KoreaCognitive radio (CR) is being considered as a vital technology to provide solution to spectrum scarcity in next generation network, by efficiently utilizing the vacant spectrum of the licensed users. Cooperative spectrum sensing in cognitive radio network has a promising performance compared to the individual sensing. However, the existence of the malicious users’ attack highly degrades the performance of the cognitive radio networks by sending falsified data also known as spectrum sensing data falsification (SSDF) to the fusion center. In this paper, we propose a double adaptive thresholding technique in order to differentiate legitimate users from doubtful and malicious users. Prior to the double adaptive approach, the maximal ratio combining (MRC) scheme is utilized to assign weight to each user such that the legitimate users experience higher weights than the malicious users. Double adaptive threshold is applied to give a fair chance to the doubtful users to ensure their credibility. A doubtful user that fails the double adaptive threshold test is declared as a malicious user. The results of the legitimate users are combined at the fusion center by utilizing Dempster-Shafer (DS) evidence theory. Effectiveness of the proposed scheme is proved through simulations by comparing with the existing schemes.http://dx.doi.org/10.1155/2019/2350694
collection DOAJ
language English
format Article
sources DOAJ
author Muhammad Sajjad Khan
Muhammad Jibran
Insoo Koo
Su Min Kim
Junsu Kim
spellingShingle Muhammad Sajjad Khan
Muhammad Jibran
Insoo Koo
Su Min Kim
Junsu Kim
A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks
Wireless Communications and Mobile Computing
author_facet Muhammad Sajjad Khan
Muhammad Jibran
Insoo Koo
Su Min Kim
Junsu Kim
author_sort Muhammad Sajjad Khan
title A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks
title_short A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks
title_full A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks
title_fullStr A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks
title_full_unstemmed A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks
title_sort double adaptive approach to tackle malicious users in cognitive radio networks
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2019-01-01
description Cognitive radio (CR) is being considered as a vital technology to provide solution to spectrum scarcity in next generation network, by efficiently utilizing the vacant spectrum of the licensed users. Cooperative spectrum sensing in cognitive radio network has a promising performance compared to the individual sensing. However, the existence of the malicious users’ attack highly degrades the performance of the cognitive radio networks by sending falsified data also known as spectrum sensing data falsification (SSDF) to the fusion center. In this paper, we propose a double adaptive thresholding technique in order to differentiate legitimate users from doubtful and malicious users. Prior to the double adaptive approach, the maximal ratio combining (MRC) scheme is utilized to assign weight to each user such that the legitimate users experience higher weights than the malicious users. Double adaptive threshold is applied to give a fair chance to the doubtful users to ensure their credibility. A doubtful user that fails the double adaptive threshold test is declared as a malicious user. The results of the legitimate users are combined at the fusion center by utilizing Dempster-Shafer (DS) evidence theory. Effectiveness of the proposed scheme is proved through simulations by comparing with the existing schemes.
url http://dx.doi.org/10.1155/2019/2350694
work_keys_str_mv AT muhammadsajjadkhan adoubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks
AT muhammadjibran adoubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks
AT insookoo adoubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks
AT suminkim adoubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks
AT junsukim adoubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks
AT muhammadsajjadkhan doubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks
AT muhammadjibran doubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks
AT insookoo doubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks
AT suminkim doubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks
AT junsukim doubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks
_version_ 1725957415769210880