cognitive radio: some security issues
DESCRIPTION
Intelligent radio that prevents interference. Just a concept right now that is evolvingTRANSCRIPT
![Page 1: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/1.jpg)
SOME SECURITY ISSUES
![Page 2: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/2.jpg)
Introduction
What is Cognitive Radio?
Spectrum Sensing
Primary User Emulation
Simulation & Results
OVERVIEW
![Page 3: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/3.jpg)
Evolution of numerous wireless applications.
Limited Public Bandwidth or Spectrum
Inefficient use of Licensed Spectrum
What if one could use the licensed spectrum when no primary users are using it?
INTRODUCTION
![Page 4: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/4.jpg)
![Page 5: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/5.jpg)
Intelligent Radio.
Senses Environment and Spectrum(Cognitive capability).
Analyzes it(Self-organized capability).
Adapts to it(Reconfigurable capability).
Learns from the results.
WHAT IS COGNITIVE RADIO?
![Page 6: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/6.jpg)
General Architecture of Cognitive Radio
![Page 7: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/7.jpg)
Dynamic Spectrum Access (DSA)
Distributed Spectrum Sensing (DSS)
Common Control Channel (CCC)
SPECTRUM SENSING
![Page 8: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/8.jpg)
![Page 9: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/9.jpg)
Dynamic Spectrum Access (DSA)
Distributed Spectrum Sensing (DSS)
Common Control Channel (CCC)
SPECTRUM SENSING
![Page 10: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/10.jpg)
Dynamic Spectrum Access (DSA)
Distributed Spectrum Sensing (DSS)
Common Control Channel (CCC)
SPECTRUM SENSING
![Page 11: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/11.jpg)
CCC
CooperationOptimization
![Page 12: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/12.jpg)
Matched Filter
Cyclo-Stationary Feature
Energy Detection
SPECTRUM SENSING TECHNIQUES
![Page 13: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/13.jpg)
Matched Filter
Cyclo-Stationary Feature
Energy Detection
SPECTRUM SENSING TECHNIQUES
![Page 14: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/14.jpg)
Matched Filter
Cyclo-Stationary Feature
Energy Detection
SPECTRUM SENSING TECHNIQUES
![Page 15: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/15.jpg)
Idle spectrum can be used by secondary users without causing disturbance to the primary user.
But these secondary users must co-operate and use the spectrum fairly.
Some secondary users prevent others from using this idle spectrum by transmitting unrecognizable signals.
i.e. they emulate (imitate) the primary users and hence prevent secondary users from utilizing it.
They are of two types: Selfish PUE attackers Malicious PUE attackers
PRIMARY USER EMULATION
![Page 16: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/16.jpg)
SYSTEM MODEL FOR CRNs
![Page 17: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/17.jpg)
Received power due to Primary Transmitter, Pr_p
PDF of Pr_p
Received power due to Malicious users, Pr_m
PDF of Pr_m
![Page 18: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/18.jpg)
The following slides contain the simulated
results of the PDFs of signals received by the
secondary receiver due to primary
transmitter and malicious users.
SIMULATION & RESULTS
![Page 19: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/19.jpg)
![Page 20: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/20.jpg)
![Page 21: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/21.jpg)
![Page 22: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/22.jpg)
SYSTEM MODEL FOR CRNs
![Page 23: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/23.jpg)
As it can be seen, the results of the previous
system model are not desirable.
So, another system model is presented to
counteract the PUE.
SYSTEM MODEL ALTERATION
![Page 24: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/24.jpg)
PROPOSED MODEL
![Page 25: Cognitive radio: some security issues](https://reader036.vdocuments.mx/reader036/viewer/2022062616/5498f6d4b479594b718b45dc/html5/thumbnails/25.jpg)
THOUGHTS OR QUERIES?