Trust-aware resource allocation in a cognitive radio system

Cognitive radio (CR) is a concept which can be used to improve the utilization of scarce radio spectrum resources. A reliable strategy for the detection of unused spectrum bands is essential in a practical implementation of CR systems. It is widely accepted that in a real-world environment, cooperat...

Full description

Saved in:
Bibliographic Details
Main Authors: Qin, Tao, Leung, Cyril, Chen, Yiqiang, Miao, Chun Yan
Other Authors: School of Computer Engineering
Format: Conference or Workshop Item
Language:English
Published: 2013
Subjects:
Online Access:https://hdl.handle.net/10356/97634
http://hdl.handle.net/10220/13191
http://ieeexplore.ieee.org.ezlibproxy1.ntu.edu.sg/xpl/articleDetails.jsp?tp=&arnumber=6273067&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F6261593%2F6272893%2F06273067.pdf%3Farnumber%3D6273067
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-97634
record_format dspace
spelling sg-ntu-dr.10356-976342020-05-28T07:41:34Z Trust-aware resource allocation in a cognitive radio system Qin, Tao Leung, Cyril Chen, Yiqiang Miao, Chun Yan School of Computer Engineering IEEE International Conference on Computer Science and Automation Engineering (2012 : Zhangjiajie, China) DRNTU::Engineering::Computer science and engineering Cognitive radio (CR) is a concept which can be used to improve the utilization of scarce radio spectrum resources. A reliable strategy for the detection of unused spectrum bands is essential in a practical implementation of CR systems. It is widely accepted that in a real-world environment, cooperative spectrum sensing involving many secondary users (SUs) scattered over a wide geographical area can greatly improve sensing accuracy. However, some SUs may misbehave, i.e. provide false sensing information, in an attempt to maximize their own utility gains. Such selfish behaviour, if unchecked, can severely impact the operation of the CR system. In this paper, we propose a novel trust-aware resource allocation scheme in a centralized cognitive radio network with a system-level trust model in which trustworthiness is used as social capital to gain system resources. The scheme can detect misbehaving SUs and filter out the malicious attacks while attempting to maximize the total bit rate of SUs. Computer simulations are used to illustrate the efficiency and robustness of the proposed scheme under various attack scenarios. 2013-08-23T03:17:58Z 2019-12-06T19:44:47Z 2013-08-23T03:17:58Z 2019-12-06T19:44:47Z 2012 2012 Conference Paper https://hdl.handle.net/10356/97634 http://hdl.handle.net/10220/13191 http://ieeexplore.ieee.org.ezlibproxy1.ntu.edu.sg/xpl/articleDetails.jsp?tp=&arnumber=6273067&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F6261593%2F6272893%2F06273067.pdf%3Farnumber%3D6273067 en
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering
spellingShingle DRNTU::Engineering::Computer science and engineering
Qin, Tao
Leung, Cyril
Chen, Yiqiang
Miao, Chun Yan
Trust-aware resource allocation in a cognitive radio system
description Cognitive radio (CR) is a concept which can be used to improve the utilization of scarce radio spectrum resources. A reliable strategy for the detection of unused spectrum bands is essential in a practical implementation of CR systems. It is widely accepted that in a real-world environment, cooperative spectrum sensing involving many secondary users (SUs) scattered over a wide geographical area can greatly improve sensing accuracy. However, some SUs may misbehave, i.e. provide false sensing information, in an attempt to maximize their own utility gains. Such selfish behaviour, if unchecked, can severely impact the operation of the CR system. In this paper, we propose a novel trust-aware resource allocation scheme in a centralized cognitive radio network with a system-level trust model in which trustworthiness is used as social capital to gain system resources. The scheme can detect misbehaving SUs and filter out the malicious attacks while attempting to maximize the total bit rate of SUs. Computer simulations are used to illustrate the efficiency and robustness of the proposed scheme under various attack scenarios.
author2 School of Computer Engineering
author_facet School of Computer Engineering
Qin, Tao
Leung, Cyril
Chen, Yiqiang
Miao, Chun Yan
format Conference or Workshop Item
author Qin, Tao
Leung, Cyril
Chen, Yiqiang
Miao, Chun Yan
author_sort Qin, Tao
title Trust-aware resource allocation in a cognitive radio system
title_short Trust-aware resource allocation in a cognitive radio system
title_full Trust-aware resource allocation in a cognitive radio system
title_fullStr Trust-aware resource allocation in a cognitive radio system
title_full_unstemmed Trust-aware resource allocation in a cognitive radio system
title_sort trust-aware resource allocation in a cognitive radio system
publishDate 2013
url https://hdl.handle.net/10356/97634
http://hdl.handle.net/10220/13191
http://ieeexplore.ieee.org.ezlibproxy1.ntu.edu.sg/xpl/articleDetails.jsp?tp=&arnumber=6273067&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F6261593%2F6272893%2F06273067.pdf%3Farnumber%3D6273067
_version_ 1681059752194342912