Trust-aware resource allocation in a cognitive radio system
Cognitive radio (CR) is a concept which can be used to improve the utilization of scarce radio spectrum resources. A reliable strategy for the detection of unused spectrum bands is essential in a practical implementation of CR systems. It is widely accepted that in a real-world environment, cooperat...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/97634 http://hdl.handle.net/10220/13191 http://ieeexplore.ieee.org.ezlibproxy1.ntu.edu.sg/xpl/articleDetails.jsp?tp=&arnumber=6273067&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F6261593%2F6272893%2F06273067.pdf%3Farnumber%3D6273067 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-97634 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-976342020-05-28T07:41:34Z Trust-aware resource allocation in a cognitive radio system Qin, Tao Leung, Cyril Chen, Yiqiang Miao, Chun Yan School of Computer Engineering IEEE International Conference on Computer Science and Automation Engineering (2012 : Zhangjiajie, China) DRNTU::Engineering::Computer science and engineering Cognitive radio (CR) is a concept which can be used to improve the utilization of scarce radio spectrum resources. A reliable strategy for the detection of unused spectrum bands is essential in a practical implementation of CR systems. It is widely accepted that in a real-world environment, cooperative spectrum sensing involving many secondary users (SUs) scattered over a wide geographical area can greatly improve sensing accuracy. However, some SUs may misbehave, i.e. provide false sensing information, in an attempt to maximize their own utility gains. Such selfish behaviour, if unchecked, can severely impact the operation of the CR system. In this paper, we propose a novel trust-aware resource allocation scheme in a centralized cognitive radio network with a system-level trust model in which trustworthiness is used as social capital to gain system resources. The scheme can detect misbehaving SUs and filter out the malicious attacks while attempting to maximize the total bit rate of SUs. Computer simulations are used to illustrate the efficiency and robustness of the proposed scheme under various attack scenarios. 2013-08-23T03:17:58Z 2019-12-06T19:44:47Z 2013-08-23T03:17:58Z 2019-12-06T19:44:47Z 2012 2012 Conference Paper https://hdl.handle.net/10356/97634 http://hdl.handle.net/10220/13191 http://ieeexplore.ieee.org.ezlibproxy1.ntu.edu.sg/xpl/articleDetails.jsp?tp=&arnumber=6273067&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F6261593%2F6272893%2F06273067.pdf%3Farnumber%3D6273067 en |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering |
spellingShingle |
DRNTU::Engineering::Computer science and engineering Qin, Tao Leung, Cyril Chen, Yiqiang Miao, Chun Yan Trust-aware resource allocation in a cognitive radio system |
description |
Cognitive radio (CR) is a concept which can be used to improve the utilization of scarce radio spectrum resources. A reliable strategy for the detection of unused spectrum bands is essential in a practical implementation of CR systems. It is widely accepted that in a real-world environment, cooperative spectrum sensing involving many secondary users (SUs) scattered over a wide geographical area can greatly improve sensing accuracy. However, some SUs may misbehave, i.e. provide false sensing information, in an attempt to maximize their own utility gains. Such selfish behaviour, if unchecked, can severely impact the operation of the CR system. In this paper, we propose a novel trust-aware resource allocation scheme in a centralized cognitive radio network with a system-level trust model in which trustworthiness is used as social capital to gain system resources. The scheme can detect misbehaving SUs and filter out the malicious attacks while attempting to maximize the total bit rate of SUs. Computer simulations are used to illustrate the efficiency and robustness of the proposed scheme under various attack scenarios. |
author2 |
School of Computer Engineering |
author_facet |
School of Computer Engineering Qin, Tao Leung, Cyril Chen, Yiqiang Miao, Chun Yan |
format |
Conference or Workshop Item |
author |
Qin, Tao Leung, Cyril Chen, Yiqiang Miao, Chun Yan |
author_sort |
Qin, Tao |
title |
Trust-aware resource allocation in a cognitive radio system |
title_short |
Trust-aware resource allocation in a cognitive radio system |
title_full |
Trust-aware resource allocation in a cognitive radio system |
title_fullStr |
Trust-aware resource allocation in a cognitive radio system |
title_full_unstemmed |
Trust-aware resource allocation in a cognitive radio system |
title_sort |
trust-aware resource allocation in a cognitive radio system |
publishDate |
2013 |
url |
https://hdl.handle.net/10356/97634 http://hdl.handle.net/10220/13191 http://ieeexplore.ieee.org.ezlibproxy1.ntu.edu.sg/xpl/articleDetails.jsp?tp=&arnumber=6273067&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F6261593%2F6272893%2F06273067.pdf%3Farnumber%3D6273067 |
_version_ |
1681059752194342912 |