Cognitive radio: some security issues

67 %
33 %
Information about Cognitive radio: some security issues
Technology

Published on March 6, 2014

Author: josephvijay3954

Source: slideshare.net

Description

Intelligent radio that prevents interference. Just a concept right now that is evolving

SOME SECURITY ISSUES

OVERVIEW  Introduction  What is Cognitive Radio?  Spectrum Sensing  Primary User Emulation  Simulation & Results

INTRODUCTION  Evolution of numerous wireless applications.  Limited Public Bandwidth or Spectrum  Inefficient use of Licensed Spectrum  What if one could use the licensed spectrum when no primary users are using it?

WHAT IS COGNITIVE RADIO?  Intelligent Radio.  Senses Environment and Spectrum(Cognitive capability).  Analyzes it(Self-organized capability).  Adapts to it(Reconfigurable capability).  Learns from the results.

General Architecture of Cognitive Radio

SPECTRUM SENSING  Dynamic Spectrum Access (DSA)  Distributed Spectrum Sensing (DSS)  Common Control Channel (CCC)

SPECTRUM SENSING  Dynamic Spectrum Access (DSA)  Distributed Spectrum Sensing (DSS)  Common Control Channel (CCC)

SPECTRUM SENSING  Dynamic Spectrum Access (DSA)  Distributed Spectrum Sensing (DSS)  Common Control Channel (CCC)

CCC Cooperation Optimization

SPECTRUM SENSING TECHNIQUES  Matched Filter  Cyclo-Stationary Feature  Energy Detection

SPECTRUM SENSING TECHNIQUES  Matched Filter  Cyclo-Stationary Feature  Energy Detection

SPECTRUM SENSING TECHNIQUES  Matched Filter  Cyclo-Stationary Feature  Energy Detection

PRIMARY USER EMULATION  Idle spectrum can be used by secondary users without causing disturbance to the primary user.  But these secondary users must co-operate and use the spectrum fairly.  Some secondary users prevent others from using this idle spectrum by transmitting unrecognizable signals.  i.e. they emulate (imitate) the primary users and hence prevent secondary users from utilizing it.  They are of two types:  Selfish PUE attackers  Malicious PUE attackers

SYSTEM MODEL FOR CRNs

Received power due to Primary Transmitter, Pr_p PDF of Pr_p Received power due to Malicious users, Pr_m PDF of Pr_m

SIMULATION & RESULTS  The following slides contain the simulated results of the PDFs of signals received by the secondary receiver due to primary transmitter and malicious users.

SYSTEM MODEL FOR CRNs

SYSTEM MODEL ALTERATION  As it can be seen, the results of the previous system model are not desirable.  So, another system model is presented to counteract the PUE.

PROPOSED MODEL

Add a comment

Related presentations

Related pages

Cognitive radio network security: A survey - ScienceDirect

Since cognitive radios can adapt ... but through other cognitive radio terminals through which some access ... Security issues in cognitive radio ...
Read more

Security in Cognitive Radio Networks: Threats and Mitigation

Security in Cognitive Radio Networks: ... has not focused on security aspects of cognitive radio. ... radio due to their intelligent behavior. Some ...
Read more

Security Threats and Detection Technique in Cognitive ...

Security Threats and Detection Technique ... the channel whether the channel have some data packets ... “Security issues in cognitive radio ...
Read more

Security Issues in Cooperative In-Band Sensing for ...

Security Issues in Cooperative In-Band Sensing for Cognitive Radio Network ... these algorithms still have bad performance on some network conditions ...
Read more

Cognitive Radio, Software Defined Radio, and Adaptive ...

Adaptive Wireless Communication Systems Hüseyin Arslan ... •Security issues ... The term “Cognitive Radio ...
Read more

A layered approach to cognitive radio network security: A ...

A layered approach to cognitive radio network security: ... some low band spectrum, ... depth look at the security issues specific to the new CRN
Read more

Cognitive Radio RF: Overview and Challenges

Cognitive radio system (CRS) is a ... bands and coexistence architecture for cognitive radio and investigating security and ... some issues are still ...
Read more

Qusay H. Mahmoud c11.tex V1 - April24, 2007 4:05 P.M. Page 271

Security Issues in Cognitive Radio ... security concepts in the context of cognitive networks. Some of the fundamental building Cognitive Networks: ...
Read more

Future Directions in Cognitive Radio Network Research

Future Directions in Cognitive Radio Network ... • Articulate some of the key research ... cognitive network security, cognitive system adaptation ...
Read more