A Two Step Secure Spectrum Sensing Algorithm Using Fuzzy Logic for Cognitive Radio Networks

DOI: 10.4236/ijcns.2011.48062   PDF   HTML     5,149 Downloads   9,565 Views   Citations


In this paper, a two step secure spectrum sensing algorithm is proposed for cognitive radio networks. In this algorithm, the sensing results of secondary users are pre-filtered and applying fuzzy logic, so, the overall sensing performance of the network is improved. To determine pre-filter parameters, statistical parameters of the sensing results are used to remove those sensing results which are far from the majority sensing results. However, to obtain a better performance in the spectrum sensing, we propose a fuzzy logic to nullify the effects of malicious users who transmit false sensing data to the fusion center. We further propose a Fuzzy Trust Level for each user as to weight the sensing result of the corresponding user before combining all sensing results in the fusion center. Simulation results demonstrate that our proposed algorithm yield significant improvement in the performance of the spectrum sensing and identifying malicious users.

Share and Cite:

E. Taghavi and B. Abolhassani, "A Two Step Secure Spectrum Sensing Algorithm Using Fuzzy Logic for Cognitive Radio Networks," International Journal of Communications, Network and System Sciences, Vol. 4 No. 8, 2011, pp. 507-513. doi: 10.4236/ijcns.2011.48062.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] S. Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications,” IEEE Journal on Selected Areas in Communications, Vol. 23, No. 2, 2005, pp. 201-220. doi:10.1109/JSAC.2004.839380
[2] S. M. Kay, “Fundamentals of Statistical Signal Processing: Detection Theory,” Prentice Hall, Upper Saddle River, 1998.
[3] H. V. Poor, “An Introduction to Signal Detection and Estimation,” Springer-Verlag, New York, 1994.
[4] S. Enserink and D. Cochran, “A Cyclostationary Feature Detector,” Proceedings of the 28th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, 31 October-2 November 1994, pp. 806-810. doi:10.1109/ACSSC.1994.471573
[5] P. Kaligineedi, M. Khabbazian and V. K. Bhargava, “Secure Cooperative Sensing Techniques for Cognitive Radio System,” IEEE International Conference on Communications, Beijing, 19-23 May 2008, pp. 3406-3410.
[6] B. Shen and K. S. Kwak, “Soft Combination Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networks,” ETRI Journal, Vol. 31, No. 3, 2009, pp. 263-270. doi:10.4218/etrij.09.0108.0501
[7] D. Cabric, S. M. Mishra and R. W. Brodersen, “Implementation Issues in Spectrum Sensing for Cognitive Radios,” Proceedings of 38th Asilomar Conference on Signals, Systems, Computers, Pacific Grove, 7-10 November 2004, pp. 772-776.
[8] R. L. Chen, J.-M. Park and K. G. Bian, “Robust Distributed Spectrum Sensing in Cognitive Radio Networks,” Proceedings of the 27th Annual IEEE Conference on Computer Communications, Phoenix, 13-18 April 2008, pp. 1876-1884.
[9] K. J. Peng and Z. H. Tsai, “A Distributed Spectrum Sensing Scheme Based on Credibility and Evidence Theory in Cognitive Radio,” Proceedings of the 17th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Helsinki, 11-14 September 2006, pp. 1-5. doi:10.1109/PIMRC.2006.254089
[10] N.-T. Nhan and I. Koo, “A Secure Distributed Spectrum Sensing Scheme in Cognitive Radio,” Proceedings of the Intelligent Computing 5th International Conference on Emerging Intelligent Computing Technology and Applications, Vol. 5755, 2009, pp. 698-707.
[11] S. Y. Xu, Y. L. Shang and H. M. Wang, “Double Thresholds Based Cooperative Spectrum Sensing against Untrusted Secondary Users in Cognitive Radio Networks,” IEEE International Vehicular Technology Conference, Barcelona, 26-29 April 2009, pp. 1-5.
[12] W. K. Wang, H. S.Li, Y. Sun and Z. Han, “Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks,” IEEE Annual Conf. on Information Sciences and Systems, Baltimore, 18-20 March 2009, pp. 130-134.
[13] E. MoeenTaghavi and B. Abolhassani, “Trustworthy Node Detection in Cognitive Radio in Hostile Environments,” International Conference on Communication and Electronics Information, Vol. 2, 2011, pp. 258-262.
[14] P. Kaligineedi, M. Khabbazian and V. K. Bhargava, “Malicious User Detection in a Cognitive Radio Cooperative Sensing System,” IEEE Transaction on Wireless Communications, Vol. 9, No. 8, 2010, pp. 2488-2497.
[15] L. A. ZADEH, “Fuzzy Sets,” Information and Control, Vol. 8, No. 3, 1965, pp. 338-353. doi:10.1016/S0019-9958(65)90241-X
[16] L. A. ZADEH, “Fuzzy Algorithms,” Information and Control, Vol. 12, 1968, pp. 94-102. doi:10.1016/S0019-9958(68)90211-8
[17] W. El-Hajj, F. Aloul, Z. Trabelsi and N. Zaki, “On Detecting Port Scanning Using Fuzzy Based Intrusion Detection System,” International Conference on Wireless Communications and Mobile Computing, Crete Island, 6-8 August 2008, pp. 105-110.

comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.