Trust-aware resource allocation in a cognitive radio system

Cognitive radio (CR) is a concept which can be used to improve the utilization of scarce radio spectrum resources. A reliable strategy for the detection of unused spectrum bands is essential in a practical implementation of CR systems. It is widely accepted that in a real-world environment, cooperat...

Full description

Saved in:
Bibliographic Details
Main Authors: Qin, Tao, Leung, Cyril, Chen, Yiqiang, Miao, Chun Yan
Other Authors: School of Computer Engineering
Format: Conference or Workshop Item
Language:English
Published: 2013
Subjects:
Online Access:https://hdl.handle.net/10356/97634
http://hdl.handle.net/10220/13191
http://ieeexplore.ieee.org.ezlibproxy1.ntu.edu.sg/xpl/articleDetails.jsp?tp=&arnumber=6273067&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F6261593%2F6272893%2F06273067.pdf%3Farnumber%3D6273067
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:Cognitive radio (CR) is a concept which can be used to improve the utilization of scarce radio spectrum resources. A reliable strategy for the detection of unused spectrum bands is essential in a practical implementation of CR systems. It is widely accepted that in a real-world environment, cooperative spectrum sensing involving many secondary users (SUs) scattered over a wide geographical area can greatly improve sensing accuracy. However, some SUs may misbehave, i.e. provide false sensing information, in an attempt to maximize their own utility gains. Such selfish behaviour, if unchecked, can severely impact the operation of the CR system. In this paper, we propose a novel trust-aware resource allocation scheme in a centralized cognitive radio network with a system-level trust model in which trustworthiness is used as social capital to gain system resources. The scheme can detect misbehaving SUs and filter out the malicious attacks while attempting to maximize the total bit rate of SUs. Computer simulations are used to illustrate the efficiency and robustness of the proposed scheme under various attack scenarios.