Multiuser Detection
Detection, Estimation, and Modulation Theory: Radar-Sonar Signal Processing and Gaussian Signals in Noise
Wireless Communications
Estimating the Support of a High-Dimensional Distribution
Neural Computation
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Spectrum sensing in cognitive radio networks: the cooperation-processing tradeoff
Wireless Communications & Mobile Computing - Cognitive Radio, Software Defined Radio And Adaptive Wireless Systems
CRAHNs: Cognitive radio ad hoc networks
Ad Hoc Networks
Secure data aggregation in wireless sensor networks: A comprehensive overview
Computer Networks: The International Journal of Computer and Telecommunications Networking
Spectrum management in cognitive radio ad hoc networks
IEEE Network: The Magazine of Global Internetworking - Special issue title on networking over multi-hop cognitive networks
Data-aggregation techniques in sensor networks: a survey
IEEE Communications Surveys & Tutorials
Sensor-assisted localization in cellular systems
IEEE Transactions on Wireless Communications
Using the physical layer for wireless authentication in time-variant channels
IEEE Transactions on Wireless Communications
Cognitive radio: brain-empowered wireless communications
IEEE Journal on Selected Areas in Communications
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Enforcing spectrum access rules in cognitive radio networks through cooperative jamming
WASA'13 Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications
Hi-index | 0.00 |
Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that access spectrum resources in a proper, disciplined manner. For a cognitive radio network to achieve this goal, spectrum policies and the ability to enforce them are necessary. Detection of an unauthorized (anomalous) usage is one of the critical issues in spectrum etiquette enforcement. In this paper, we present a network structure for dynamic spectrum access and formulate the anomalous usage detection problem using statistical significance testing. The detection problem investigated considers two cases, namely, the authorized (primary) transmitter is (i) mobile and (ii) fixed. We propose a detection scheme for each case by exploiting the spatial pattern of received signal energy across a network of sensors. Analytical models are formulated when the distribution of the energy measurements is given and, due to the intractability of the general problem, we present an algorithm using machine learning techniques to solve the general case when the statistics of the energy measurements are unknown. Our simulation results show that our approaches can effectively detect unauthorized spectrum usage with a detection probability above 0.9 while keeping the false alarm rate less than 0.1 when only one unauthorized radio is present, and the detection probability is even higher for more unauthorized radios.