Show simple item record

AuthorMa, Songjun
AuthorPeng, Yunfeng
AuthorWang, Tao
AuthorGan, Xiaoying
AuthorYang, Feng
AuthorWang, Xinbing
AuthorGuizani, Mohsen
Available date2022-11-10T09:47:26Z
Publication Date2014
Publication Name2014 IEEE International Conference on Communications, ICC 2014
ResourceScopus
Resource2-s2.0-84906996562
URIhttp://dx.doi.org/10.1109/ICC.2014.6884103
URIhttp://hdl.handle.net/10576/36177
AbstractRecently, security of cognitive radio (CR) is becoming a severe issue. There is one kind of threat, which we call greedy spectrum occupancy threat (GSOT) in this paper, has long been ignored in previous work. In GSOT, a secondary user may selfishly occupy the spectrum for a long time, which makes other users suffer additional waiting time in queue to access the spectrum and leads to congestion or breakdown. In this paper, a queueing model is established to describe the system with greedy secondary user (GSU). Based on this model, the impacts of GSU on the system are evaluated. Numerical results indicate that the steady-state performance of the system is influenced not only by average occupancy time, but also by the number of users as well as number of channels. Since a sudden change in average occupancy time of GSU will produce dramatic performance degradation, the greedy second user prefers to increase its occupancy time in a gradual manner in case it is detected easily. Once it reaches its targeted occupancy time, the system will be in steady state, and the performance will be degraded. In order to detect such a cunning behavior as quickly as possible, we propose a wavelet based detection approach. Simulation results are presented to demonstrate the effectiveness and quickness of the proposed approach. 2014 IEEE.
Languageen
PublisherIEEE Computer Society
SubjectComputer simulation
Queueing theory
Wavelet analysis
Cognitive radio network
Numerical results
Performance degradation
Queueing model
Secondary users
Spectrum occupancies
Steady state performance
Wavelet based detection
Cognitive radio
TitleDetecting the greedy spectrum occupancy threat in cognitive radio networks
TypeConference Paper
Pagination4939-4944


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record