Security Issues in Cognitive Radios

dc.contributor.authorShrivastava, Shivanshu
dc.date.accessioned2017-10-24T10:16:42Z
dc.date.accessioned2023-10-20T07:28:55Z
dc.date.available2017-10-24T10:16:42Z
dc.date.available2023-10-20T07:28:55Z
dc.date.issued2017
dc.descriptionSupervisors: A. Rajesh and P. K. Boraen_US
dc.description.abstractCognitive Radio (CR) based spectrum sensing has been identified as an effective measure to combat spectrum scarcity. Individual CR sensing may suffer performance deterioration due to deep fading. Cooperative spectrum sensing (CSS) has been realized as an effective means to counter this problem. CSS is severely affected if some secondary users (SUs) become malicious for their selfish intentions. These SUs are called malicious users (MUs). The objective of this research is suppressing the MUs. We aim at suppressing two types of malicious attacks, namely the spectrum sensing data falsification (SSDF) attacks and the primary user emulation attacks (PUEAs). The first part of the thesis investigates the SSDF attacks. The SSDF attacks are caused when the MUs report malicious data to mislead the CSS system. We propose two schemes to enhance the applicability of the Dixon's statistical outlier detection test in discarding single and multiple malicious data. Simulations reveal that the proposed schemes enhance the performance of the Dixon's test significantly. The proposed schemes are also successful in enhancing its applicability to multiple MU detection. These improvements are obtained without significant compromise on the complexity of the system. The second part of the thesis investigates SSDF attacks launched in collusion. We design a comprehensive categorization of the collusion attack scenarios. The PU is considered to impose a collision penalty on the SUs on suffering any interference. We derive bounds on the collision penalty to prevent attacks in each scenario. It is verified that the bounds on the collision penalty successfully suppress each of the attacks. The derived bounds are also successful in suppressing the reluctance of the PU in sharing its spectrum for the fear of interference. The Nash equilibrium showing the best strategy for the SUs to obtain the maximum gain from the PU spectrum is also derived. The third part of the thesis investigates the PUEAs in CSS. We aim at suppressing its effects on the SU throughput. We maximize the SU throughput in the presence of PUEAs. Maximizing the SU throughput results to increased interference to the PU. We formulate an optimization problem to maximize the SU throughput with a constraint on the interference to the PU. We propose an algorithm based on the Nelder Mead simplex method to solve this problem. Simulations reveal that the throughput of the SU in a CSS system facing PUEAs is maximized. The proposed algorithm is successful in bringing the performance of the PUEA affected CSS system close to an unaffected system in terms of the SU throughput.en_US
dc.identifier.otherROLL NO.10610214
dc.identifier.urihttps://gyan.iitg.ac.in/handle/123456789/854
dc.language.isoenen_US
dc.relation.ispartofseriesTH-1605;
dc.subjectELECTRONICS AND ELECTRICAL ENGINEERINGen_US
dc.titleSecurity Issues in Cognitive Radiosen_US
dc.typeThesisen_US
Files
Original bundle
Now showing 1 - 2 of 2
No Thumbnail Available
Name:
Abstract-TH-1605_10610214.pdf
Size:
110.8 KB
Format:
Adobe Portable Document Format
Description:
Abstract
No Thumbnail Available
Name:
TH-1605_10610214.pdf
Size:
9.67 MB
Format:
Adobe Portable Document Format
Description:
Thesis
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Plain Text
Description: