Trust-aware resource allocation in a cognitive radio system
Cognitive radio (CR) is a concept which can be used to improve the utilization of scarce radio spectrum resources. A reliable strategy for the detection of unused spectrum bands is essential in a practical implementation of CR systems. It is widely accepted that in a real-world environment, cooperat...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/97634 http://hdl.handle.net/10220/13191 http://ieeexplore.ieee.org.ezlibproxy1.ntu.edu.sg/xpl/articleDetails.jsp?tp=&arnumber=6273067&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F6261593%2F6272893%2F06273067.pdf%3Farnumber%3D6273067 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | Cognitive radio (CR) is a concept which can be used to improve the utilization of scarce radio spectrum resources. A reliable strategy for the detection of unused spectrum bands is essential in a practical implementation of CR systems. It is widely accepted that in a real-world environment, cooperative spectrum sensing involving many secondary users (SUs) scattered over a wide geographical area can greatly improve sensing accuracy. However, some SUs may misbehave, i.e. provide false sensing information, in an attempt to maximize their own utility gains. Such selfish behaviour, if unchecked, can severely impact the operation of the CR system. In this paper, we propose a novel trust-aware resource allocation scheme in a centralized cognitive radio network with a system-level trust model in which trustworthiness is used as social capital to gain system resources. The scheme can detect misbehaving SUs and filter out the malicious attacks while attempting to maximize the total bit rate of SUs. Computer simulations are used to illustrate the efficiency and robustness of the proposed scheme under various attack scenarios. |
---|