Cognitive Radio Networks Based on Users' Reputation Scheme
- Authors
-
-
Mahmoud A. Ammar
Department of Computer Engineering, University of Zawia, Zawia, LibyaAuthor -
Salahedin A. Rehan
Department of Electrical and Electronic Engineering, University of Zawia, Zawia, LibyaAuthor
-
- Keywords:
- Cognitive Radio CR, Users’ Trust, Primary User, Primary User Emulation Attack (PUEA), Cooperative Spectrum Sensing
- Abstract
-
Cognitive Radio (CR) can be defined as a technology that allows users to change the transmission parameters as required to increase the spectrum efficiency. Because of this mechanism, some threats emerge. Two major threats are found in CR. The first is the Primary User Emulation Attack (PUEA), where the attacker is able to transmit at a forbidden time slot effectively, emulating the signals of the primary user. This makes all the system users believe that the spectrum is occupied by a good primary user. The second threat is known as the spectrum sensing data falsification attack (SSDF). In this case, the attackers send false observation information, intentionally or unintentionally, to the fusion center (FC), causing it to make the wrong decision. In this study, the scheme presented was based on a users' reputation for secure spectrum access in cognitive radio networks. Each Secondary User (SU) performs local sensing and then forwards the sensing results to the main fusion center FC. The FC makes the final decision about the presence of the primary user based on the proposed approach. The schemes substantially reduce the effect of cognitive users with low reputation values while improving the impact of cognitive users with the high reputation values on the final decision. It has been verified that the proposed approach can improve the sensing performance under the impact of a different number of reliable and unreliable users in a CR network. Results based on simulation show that the proposed scheme outperforms the traditional majority scheme despite a high number of malicious users.
- Downloads
-
Download data is not yet available.
- References
-
Cabric, D., Mishra, S. M., & Brodersen, R. W. (2004). Implementation issues in spectrum sensing for cognitive radios. Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004.,
Cabrić, D., Mishra, S. M., Willkomm, D., Brodersen, R., & Wolisz, A. (2005). A cognitive radio approach for usage of virtual unlicensed spectrum. 14th IST mobile and wireless communications summit,
Dutta, S., & Arora, K. (2018). Review On Cognitive Radio.
Pawelczak, P., Janssen, G. J., & Prasad, R. V. (2006). WLC10-4: Performance measures of dynamic spectrum access networks. IEEE Globecom 2006,
Tkachenko, A., Cabric, D., & Brodersen, R. (2006). Experimental study of spectrum sensing based on energy detection and network cooperation. Proc. 1st Int. Workshop on Technol. and Policy of Spectrum Sensing TAPAS 2006,
Yadav, P., Chatterjee, S., & Bhattacharya, P. P. (2012). A survey on dynamic spectrum access techniques in cognitive radio. International Journal of Next-Generation Networks, 4(4), 27.
Yucek, T., & Arslan, H. (2009). A survey of spectrum sensing algorithms for cognitive radio applications. IEEE communications surveys & tutorials, 11(1), 116-130.
Zhao, Q. (2007). Sadler, BM: A survey of dynamic spectrum access. IEEE Signal Process. Mag, 24(3), 79-89.
- Downloads
- Published
- 2021-06-30
- Issue
- Vol. 36 No. 2 (2021)
- Section
- Articles
- License
-
Copyright (c) 2021 Mahmoud A. Ammar, Salahedin A. Rehan

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright of the articles Published by Almukhtar Journal of Science (MJSc) is retained by the author(s), who grant MJSc a license to publish the article. Authors also grant any third party the right to use the article freely as long as its integrity is maintained and its original authors and cite MJSc as the original publisher. Also, they accept the article remains published by the MJSc website (except in the occasion of a retraction of the article).
How to Cite
Similar Articles
- Joma A. Ifhima, Adly S. Tolba, Soad S. Omar, An Economic Study to Estimate Post Harvest Losses of Tomatoes Crop in The Green Mountain Region , Al-Mukhtar Journal of Sciences: Vol. 16 No. 1 (2007)
- Marwa Y. H. Elmabruk, Ali A. Bataw, Identification and Morphological Description of Xylocopa species (Xylocopidae: Hymenoptera) in North East of Libya , Al-Mukhtar Journal of Sciences: Vol. 34 No. 4 (2019)
- Abdelhamid M Hamad, Effect of Sucrose Concentrations and Incubation Periods on in Vitro Rooting of Moris Pineapple (Ananas comosus) , Al-Mukhtar Journal of Sciences: Vol. 34 No. 4 (2019)
- Fathi M. Ali, Abdulsalam M. A. Aboelhaj, Waheeda R. Ali , Comparative Study of Immunization of White Mice Cells Against Hydatid Cysts Using Excretion/Secretion and Cyst Fluid Antigens II: Fluctuation in average percentage of Leukocytes , Al-Mukhtar Journal of Sciences: Vol. 21 No. 1 (2008): Special issue
- Rabah Baser M. Taher, Studying the ability of using no-fines concrete in lightweight structures , Al-Mukhtar Journal of Sciences: Vol. 21 No. 1 (2008): Special issue
You may also start an advanced similarity search for this article.











