cognitive radio: some security issues

25
SOME SECURITY ISSUES

Upload: joseph-vijay

Post on 23-Dec-2014

243 views

Category:

Technology


0 download

DESCRIPTION

Intelligent radio that prevents interference. Just a concept right now that is evolving

TRANSCRIPT

Page 1: Cognitive radio: some security issues

SOME SECURITY ISSUES

Page 2: Cognitive radio: some security issues

Introduction

What is Cognitive Radio?

Spectrum Sensing

Primary User Emulation

Simulation & Results

OVERVIEW

Page 3: Cognitive radio: some security issues

Evolution of numerous wireless applications.

Limited Public Bandwidth or Spectrum

Inefficient use of Licensed Spectrum

What if one could use the licensed spectrum when no primary users are using it?

INTRODUCTION

Page 4: Cognitive radio: some security issues
Page 5: Cognitive radio: some security issues

Intelligent Radio.

Senses Environment and Spectrum(Cognitive capability).

Analyzes it(Self-organized capability).

Adapts to it(Reconfigurable capability).

Learns from the results.

WHAT IS COGNITIVE RADIO?

Page 6: Cognitive radio: some security issues

General Architecture of Cognitive Radio

Page 7: Cognitive radio: some security issues

Dynamic Spectrum Access (DSA)

Distributed Spectrum Sensing (DSS)

Common Control Channel (CCC)

SPECTRUM SENSING

Page 8: Cognitive radio: some security issues
Page 9: Cognitive radio: some security issues

Dynamic Spectrum Access (DSA)

Distributed Spectrum Sensing (DSS)

Common Control Channel (CCC)

SPECTRUM SENSING

Page 10: Cognitive radio: some security issues

Dynamic Spectrum Access (DSA)

Distributed Spectrum Sensing (DSS)

Common Control Channel (CCC)

SPECTRUM SENSING

Page 11: Cognitive radio: some security issues

CCC

CooperationOptimization

Page 12: Cognitive radio: some security issues

Matched Filter

Cyclo-Stationary Feature

Energy Detection

SPECTRUM SENSING TECHNIQUES

Page 13: Cognitive radio: some security issues

Matched Filter

Cyclo-Stationary Feature

Energy Detection

SPECTRUM SENSING TECHNIQUES

Page 14: Cognitive radio: some security issues

Matched Filter

Cyclo-Stationary Feature

Energy Detection

SPECTRUM SENSING TECHNIQUES

Page 15: Cognitive radio: some security issues

Idle spectrum can be used by secondary users without causing disturbance to the primary user.

But these secondary users must co-operate and use the spectrum fairly.

Some secondary users prevent others from using this idle spectrum by transmitting unrecognizable signals.

i.e. they emulate (imitate) the primary users and hence prevent secondary users from utilizing it.

They are of two types: Selfish PUE attackers Malicious PUE attackers

PRIMARY USER EMULATION

Page 16: Cognitive radio: some security issues

SYSTEM MODEL FOR CRNs

Page 17: Cognitive radio: some security issues

Received power due to Primary Transmitter, Pr_p

PDF of Pr_p

Received power due to Malicious users, Pr_m

PDF of Pr_m

Page 18: Cognitive radio: some security issues

The following slides contain the simulated

results of the PDFs of signals received by the

secondary receiver due to primary

transmitter and malicious users.

SIMULATION & RESULTS

Page 19: Cognitive radio: some security issues
Page 20: Cognitive radio: some security issues
Page 21: Cognitive radio: some security issues
Page 22: Cognitive radio: some security issues

SYSTEM MODEL FOR CRNs

Page 23: Cognitive radio: some security issues

As it can be seen, the results of the previous

system model are not desirable.

So, another system model is presented to

counteract the PUE.

SYSTEM MODEL ALTERATION

Page 24: Cognitive radio: some security issues

PROPOSED MODEL

Page 25: Cognitive radio: some security issues

THOUGHTS OR QUERIES?