Primary user boundary detection in cognitive radio networks: Estimated secondary user locations and impact of malicious secondary users

Huaxia Wang, Yu Dong Yao

Research output: Contribution to journalArticlepeer-review

15 Scopus citations

Abstract

Cognitive radio is an effective technology to improve spectrum utilization through spectrum sharing among primary users (PUs) and secondary users (SUs). Developing accurate and efficient methods to determine the PU coverage is crucial in order to avoid potential interference from SU to PU. In this paper, we propose to use the estimated location of each SU, which is obtained using the self-organizing maps algorithm, to determine the boundary of PU coverage. Furthermore, the PU boundary detection issue considering the presence of malicious SUs is also investigated. Support vector machine (SVM) algorithm, considering both linear and kernel cases, is implemented as the PU boundary detection method. Numerical results show that the boundary detection accuracy based on the estimated network layout approaches the results obtained from an accurate network layout (i.e., each SU with precise location information) and the kernel-based SVM classification results outperform the linear SVM method. In addition, PU boundary detection performance in the presence of malicious SUs is evaluated, in which three different K nearest neighbor based malicious SU detection algorithms are utilized.

Original languageEnglish (US)
Pages (from-to)4577-4588
Number of pages12
JournalIEEE Transactions on Vehicular Technology
Volume67
Issue number5
DOIs
StatePublished - May 2018
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Automotive Engineering
  • Aerospace Engineering
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Primary user boundary detection in cognitive radio networks: Estimated secondary user locations and impact of malicious secondary users'. Together they form a unique fingerprint.

Cite this