A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks
Cognitive radio (CR) is being considered as a vital technology to provide solution to spectrum scarcity in next generation network, by efficiently utilizing the vacant spectrum of the licensed users. Cooperative spectrum sensing in cognitive radio network has a promising performance compared to the...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2019-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2019/2350694 |
id |
doaj-67eacae2fda64f8e98010689913243d7 |
---|---|
record_format |
Article |
spelling |
doaj-67eacae2fda64f8e98010689913243d72020-11-24T21:32:29ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772019-01-01201910.1155/2019/23506942350694A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio NetworksMuhammad Sajjad Khan0Muhammad Jibran1Insoo Koo2Su Min Kim3Junsu Kim4Department of Electrical Engineering, International Islamic University Islamabad, PakistanDepartment of Electrical Engineering, International Islamic University Islamabad, PakistanSchool of Electrical Engineering, University of Ulsan, 93 Daehak-ro, Nam-gu, Ulsan 680-749, Republic of KoreaDepartment of Electronic Engineering, Korea Polytechnic University, 237 Sangidaehak-ro, Siheung-si, Gyeonggi-do 429-793, Republic of KoreaDepartment of Electronic Engineering, Korea Polytechnic University, 237 Sangidaehak-ro, Siheung-si, Gyeonggi-do 429-793, Republic of KoreaCognitive radio (CR) is being considered as a vital technology to provide solution to spectrum scarcity in next generation network, by efficiently utilizing the vacant spectrum of the licensed users. Cooperative spectrum sensing in cognitive radio network has a promising performance compared to the individual sensing. However, the existence of the malicious users’ attack highly degrades the performance of the cognitive radio networks by sending falsified data also known as spectrum sensing data falsification (SSDF) to the fusion center. In this paper, we propose a double adaptive thresholding technique in order to differentiate legitimate users from doubtful and malicious users. Prior to the double adaptive approach, the maximal ratio combining (MRC) scheme is utilized to assign weight to each user such that the legitimate users experience higher weights than the malicious users. Double adaptive threshold is applied to give a fair chance to the doubtful users to ensure their credibility. A doubtful user that fails the double adaptive threshold test is declared as a malicious user. The results of the legitimate users are combined at the fusion center by utilizing Dempster-Shafer (DS) evidence theory. Effectiveness of the proposed scheme is proved through simulations by comparing with the existing schemes.http://dx.doi.org/10.1155/2019/2350694 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Muhammad Sajjad Khan Muhammad Jibran Insoo Koo Su Min Kim Junsu Kim |
spellingShingle |
Muhammad Sajjad Khan Muhammad Jibran Insoo Koo Su Min Kim Junsu Kim A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks Wireless Communications and Mobile Computing |
author_facet |
Muhammad Sajjad Khan Muhammad Jibran Insoo Koo Su Min Kim Junsu Kim |
author_sort |
Muhammad Sajjad Khan |
title |
A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks |
title_short |
A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks |
title_full |
A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks |
title_fullStr |
A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks |
title_full_unstemmed |
A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks |
title_sort |
double adaptive approach to tackle malicious users in cognitive radio networks |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2019-01-01 |
description |
Cognitive radio (CR) is being considered as a vital technology to provide solution to spectrum scarcity in next generation network, by efficiently utilizing the vacant spectrum of the licensed users. Cooperative spectrum sensing in cognitive radio network has a promising performance compared to the individual sensing. However, the existence of the malicious users’ attack highly degrades the performance of the cognitive radio networks by sending falsified data also known as spectrum sensing data falsification (SSDF) to the fusion center. In this paper, we propose a double adaptive thresholding technique in order to differentiate legitimate users from doubtful and malicious users. Prior to the double adaptive approach, the maximal ratio combining (MRC) scheme is utilized to assign weight to each user such that the legitimate users experience higher weights than the malicious users. Double adaptive threshold is applied to give a fair chance to the doubtful users to ensure their credibility. A doubtful user that fails the double adaptive threshold test is declared as a malicious user. The results of the legitimate users are combined at the fusion center by utilizing Dempster-Shafer (DS) evidence theory. Effectiveness of the proposed scheme is proved through simulations by comparing with the existing schemes. |
url |
http://dx.doi.org/10.1155/2019/2350694 |
work_keys_str_mv |
AT muhammadsajjadkhan adoubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks AT muhammadjibran adoubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks AT insookoo adoubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks AT suminkim adoubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks AT junsukim adoubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks AT muhammadsajjadkhan doubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks AT muhammadjibran doubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks AT insookoo doubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks AT suminkim doubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks AT junsukim doubleadaptiveapproachtotacklemalicioususersincognitiveradionetworks |
_version_ |
1725957415769210880 |