A Byzantine Attack Defender: the Conditional Frequency Check

Size: px
Start display at page:

Download "A Byzantine Attack Defender: the Conditional Frequency Check"

Transcription

1 A Byzantine Attack Defender: the Conditional Frequency Check Xiaofan He and Huaiyu Dai Peng Ning Department of ECE Department of CSC North Carolina State University, USA North Carolina State University, USA Abstract Collaborative spectrum sensing is vulnerable to the Byzantine attack. Existing reputation based countermeasures will become incapable when malicious users dominate the network. Also, there is a scarcity of methods that fully explore the Markov property of the spectrum states to restrain sensors statistical misbehaviors. In this paper, a new malicious user detection method based on two proposed Conditional Frequency Check (CFC) statistics is developed with a Markovian spectrum model. With the assistance of one trusted sensor, the proposed method can achieve high malicious user detection accuracy in the presence of arbitrary percentage of malicious users, and thus significantly improves collaborative spectrum sensing performance. I. INTRODUCTION Various collaborative spectrum sensing schemes have been proposed to overcome the unreliability of single user spectrum sensing []. Along with all the benefits, collaborative spectrum sensing also induces security vulnerabilities [2], among which the Byzantine attack [3] (a.k.a. spectrum sensing data falsification (SSDF) attack [4]) is the focus of this paper. Many existing defenses against Byzantine attacks are reputation based, e.g., [5 8]. In this type of methods, lower reputations will be assigned to sensors that deviate from the global decision to mitigate the negative effects of the malicious sensors. However, the underlying assumption is that the global decision is correct, which may not be true when malicious sensors dominate the network. In fact, it has been shown in [3] [9] that when Byzantine attackers in the network exceed a certain fraction, such reputation based methods become completely incapable. Non-reputation based approaches have also been proposed, such as [ 2]. However, these methods still rely on the correctness of the global decision and hence only investigate the scenarios where a small fraction of users are malicious. When the majority are not trustworthy, global decision independent approaches are more suitable. Such type of works include the prior-probability aided method proposed in [3], and the user-centric misbehavior detection presented in [4]. In practice usually there is memory in the spectrum state evolvement, and the spectrum occupancy is more precisely modeled by a Markov model. Most of the existing methods either consider the i.i.d. spectrum state model for simplicity This work was supported in part by the National Science Foundation under Grants CCF-83462, ECCS-2258 and CNS-626. When all sensors have the same spectrum sensing capability, the reputation based methods cannot mitigate the effect of Byzantine attacks if more than 5% sensors are malicious [3]. (e.g., [,2,4]), or focus their analysis on one time slot and ignore the correlation between the spectrum states at consecutive time slots (e.g., [3,5 8,]). In [3], the Markov property of the spectrum is incorporated into the malicious user detection algorithm; however, it is generally difficult to obtain the required prior knowledge of the true spectrum in practice. In this paper, a global decision independent method, the Conditional Frequency Check (CFC), is proposed based on a Markov spectrum model to combat the Byzantine attacks. In particular, two CFC statistics, which explore the second order property of the Markov model, are constructed in this paper. The corresponding analysis proves that these two proposed CFC statistics together with an auxiliary hamming distance check are capable of detecting any sensor that misbehaves. In addition, two consistent histogram estimators based on the history of sensors reports are also developed for these two CFC statistics. With the aid of one trusted sensor, the proposed method is capable of detecting any malicious sensor with high accuracy regardless of the portion of malicious ones in the sensor group, without requiring any prior knowledge of the spectrum and sensing models. The rest of this paper is organized as follows. Section II formulates the problem. The proposed malicious sensor detection method and the corresponding theoretical analysis are presented in Section III. Some supporting simulation results are presented in Section IV, and Section V concludes the paper. II. PROBLEM FORMULATION In this paper, the following scenario is considered: ) The true spectrum has two states, i.e., (idle) and (occupied), and follows a homogeneous Markov model with state transition matrix A = [a ij ] 2 2 (i,j {,}) where a ij Pr(s t+ = j s t = i) and s t denotes the true spectrum state at time t. The stationary state distribution is denoted by π = [π,π ], which satisfies πa = π. In addition, it is assumed that the Markov chain of spectrum states is in equilibrium. 2) One trusted honest sensor exists and is known by the fusion center. 3) All sensors, including malicious ones, have the same spectrum sensing capability, i.e., identical detection probabilities P d s and false alarm probabilities P fa s. 2 4) An honest sensor will send its local sensing result directly to the fusion center. 5) 2 This is a common assumption in literature (e.g., [3] []). Defense to more intelligent and powerful attackers remains a future work.

2 2 A malicious sensor, however, will tamper its local inference before reporting to the fusion center. In particular, she will flip local inference from to and to with probabilities ϕ and ϕ, respectively. The flipping probabilities ϕ may not necessarily be the same for different malicious sensors. From the fusion center s viewpoint, the equivalent detection and false alarm probabilities of a malicious sensor with flipping probabilities ϕ [ϕ,ϕ ] are given by P (M) d =( ϕ )P d +ϕ ( P d ), () P (M) fa =( ϕ )P fa +ϕ ( P fa ). (2) If a malicious sensor attacks, i.e., {ϕ,ϕ } {,}, her statistical behaviors will deviate from that of the honest sensor. The objective of this paper is to detect the malicious sensors by observing their statistical deviations. III. THE PROPOSED METHOD The proposed malicious sensor detection method consists of two phases: ) conditional frequency check (CFC), and 2) an auxiliary hamming distance check (HDC). A. Conditional Frequency Check According to the preceding model, a malicious sensor has two degrees of freedom, i.e., two parameters ϕ and ϕ, in launching an attack. The convectional frequency check, which detects malicious sensors by computing their frequencies of reporting [], enforces only one constraint to the attacker s behavior as indicated in Eq.(6) below. This is insufficient to prevent the malicious sensor from attacking. However, when the true spectrum states are Markovian, the proposed CFC can enforce two constraints by exploring the correlation between consecutive spectrum states, and consequently identify any flipping attack easily. In particular, the CFC consists of two statistics as defined below. Definition : The two conditional frequency check statistics of a sensor are defined as Ψ Pr(r t = r t = ), and Ψ Pr(r t = r t = ), respectively, where r t denotes the sensor s report at time t. According to the definitions, these two statistics are related to the model parameters as Ψ = π a P 2 fa +(π a +π a )P d P fa +π a P 2 d π P fa +π P d, (3) Ψ = π a ( P fa ) 2 +(π a +π a )( P d )( P fa ) π ( P fa )+π ( P d ) π a ( P d ) 2 + π ( P fa )+π ( P d ). (4) In the CFC, the fusion center will evaluate Ψ and Ψ for every sensor and compare the resulting values with those of the trusted sensor. If the values are sufficiently different, the corresponding sensor will be identified as malicious. In the following, the effectiveness of this statistical check is demonstrated through two analytical results, followed by a practical approach to estimating these two statistics that eliminates the requirement of any prior knowledge about the sensing and spectrum models. Proposition : For the Markov spectrum model considered in this paper, any sensor that survives the CFC can pass the FC. Proof: A malicious sensor can pass the FC as long as Pr(r (M) t = ) = Pr(r (tr) t = ), where r (M) t (r (tr) t ) denotes the malicious (trusted) sensor s report at time t. However, she needs to achieve Ψ (M) = Ψ (tr) and Ψ (M) = Ψ (tr) to survive the CFC. Note that Pr(r (tr) t = i) = Pr(r (tr) t = i) (i {,}) when the true spectrum states are in equilibrium, and Pr(r (tr) t = ) = Ψ (tr) Pr(r (tr) t = ) + ( Ψ(tr) )Pr(r (tr) t = ). Consequently, for any sensor that survives the CFC, we have Pr(r (M) t = )= Ψ (M) 2 Ψ (M) Ψ (M) Ψ (tr) = 2 Ψ (tr) Ψ (tr) =Pr(r (tr) t = ), (5) which implies that this sensor can also pass the FC. Proposition 2: If ap fa+a Pd 2, a malicious sensor can never pass the CFC if she attacks, i.e., {ϕ,ϕ } {,}. If ap fa+a Pd, an active malicious sensor can pass the CFC only if she sets {ϕ,ϕ } to {,}. Proof: According to Proposition, passing the FC is a necessary condition for a malicious sensor to pass the CFC. Thus, ϕ must satisfy π P (M) fa +π P (M) d = Pr(r (M) t = ) = Pr(r (tr) t = ) = π P fa +π P d. Considering () and (2), this implies the following linear constraint on ϕ and ϕ : ϕ (π ( P fa )+π ( P d )) = ϕ (π P fa +π P d ).(6) When (6) holds, defineg (ϕ ) (π P fa +π P d ) (Ψ (M) Ψ (tr) ). After some algebra, it can be shown that g (ϕ )=ϕ 2 κ 2 [π π 2 a (π a +π a )π π (7) +π π 2 a ]+ϕ κ [ 2π π a P fa +(π a +π a )(P fa π P d π )+2π π a P d ] P fa P d (π ( P fa )+π ( P d )). where κ = Note that the malicious sensor can pass the CFC only if she could find a ϕ = [ϕ,ϕ ] that satisfies both g (ϕ ) = (i.e., Ψ (M) = Ψ (tr) ) and (6). Denote ϕ as the non-zero root of g (ϕ ) =, which can be found as: ϕ = ξ 2 κ ξ, (8) where ξ = π π 2 a (π a +π a )π π +π π 2 a and ξ 2 = 2π π a P fa +(π a +π a ) (π P fa π P d ) +2π π a P d. According to (6) and (8), ϕ is given as where κ = P fa P d (π P fa +π P d ). ϕ = ξ 2 κ ξ, (9)

3 3 Consider the relation πa = π, (8) and (9) can be simplified as ϕ =2 2(a P fa +a Pd) a +a, () ϕ = 2(a P fa +a Pd) a +a. () As a direct consequence of () and (), ϕ +ϕ = 2 must hold if the malicious sensor wants to pass the CFC. On the other hand, ϕ,ϕ by definition. These two conditions imply that {ϕ,ϕ } exists only if 2(aP fa+a Pd) = and the corresponding {ϕ,ϕ } equals {,}. Otherwise, there is no valid non-zero solution for both g (ϕ ) = and (6). That is, the malicious sensor cannot pass the CFC if she attacks. Define the error function e(ϕ) Ψ (tr) Ψ (M) 2, where Ψ (tr) [Ψ (tr),ψ (tr) ] and Ψ (M) [Ψ (M),Ψ (M) ] are the CFC statistics of the trusted and the malicious sensor, respectively. A typical figure ofe(ϕ) when the condition ap fa+a Pd holds is shown in Fig.. As can be seen, {,} is the only blind spot of the CFC. In contrast, the conventional FC only enforces a linear constraint (6) on the attacker, thus forming a blind line as indicated in Fig.. Fig.. holds. e(ϕ) = Ψ (tr) Ψ (M) ϕ P d =.9, P fa =., a =.2, a =.2 The linear constraint enforced by the frequency check Typical graph of e(ϕ) when the condition a P fa +a Pd a +a Definition 2: For any sensor, two histogram estimators for Ψ and Ψ are defined as: ( T ) ( / T ) ˆΨ, (2) ˆΨ t= δ rt+,δ rt, ( T δ rt+,δ rt, t= ϕ t= ) ( / T t= δ rt, δ rt, ), (3) respectively, where δ i,j = iff i = j and T is the detection window length. Proposition 3: The two estimators ˆΨ and ˆΨ converge to Ψ and Ψ, respectively, as T. Proof: The proof is give in the Appendix. Remark : According to Proposition 3, the CFC statistics of all honest sensors (including the trusted one) will converge to the same value, i.e., Ψ (tr). On the other hand, the CFC statistics of any malicious sensor will converge to some value Ψ (M) (depending on its ϕ), which is different from Ψ (tr) according to Proposition 2. Therefore, any sensor whose CFC statistics differs from that of the trusted sensor is malicious. In practice, the values of the two CFC statistics between any two honest sensors may be different due to finite detection window length T. For this concern, only when the difference between the CFC statistics of a sensor and those of the trusted sensor is larger than a pre-specified threshold β CFC, will this sensor be identified as malicious. The proposed CFC procedure with threshold β CFC is summarized in Algorithm. Algorithm The CFC procedure Compute ˆΨ (tr) and ˆΨ (tr) for the trusted sensor according to (2) and (3). for sensor i do Compute ˆΨ (i) and ˆΨ (i) according to (2) and (3). if ˆΨ (tr) ˆΨ (i) 2 > β CFC then Classify sensor i as malicious. end if end for B. The Hamming Distance Check As shown in Fig., the CFC fails to detect the malicious sensor using ϕ = {,} when ap fa+a Pd. This may happen when a = a and P d + P fa =. However, in this case, a large normalized hamming distance between the report sequences from a malicious sensor i and the trusted T sensor, which is defined as d h (i,tr) T δ (i) r, will t,r (tr) t t= be expected because of the high local inference flipping probability at the malicious sensor. Based on this observation, sensor i will be identified as malicious if d h (i,tr) is greater than a pre-specified threshold β HDC. IV. SIMULATIONS Two different cases are simulated. In both cases P d =.9 and P fa =., but in the first case, A = [ ], and in the second case, A = [ ]. Thus, the condition a P fa +a Pd is satisfied in the first case but not in the second one. Every malicious sensor randomly selects its own {ϕ,ϕ } according to uniform distribution over (,] 2. The thresholds are set as β CFC =.2 and β HDC =.3. There are n H = 8 honest sensors and n M = 3 malicious sensors, i.e., the malicious sensors dominate the network. The detection window length is T = (time slot). At the fusion center, the majority voting rule is used. Simulation results of a typical run of the first case are shown in Fig. 2 Fig. 4. In particular, by comparing Fig. 2 and Fig. 3, it can be seen that two malicious sensors whose flipping probabilities ϕ and ϕ are close to successfully pass the CFC. However, these two malicious sensors fail to pass the subsequent HDC. Also, it can be seen by comparing Fig. 3 and Fig. 4 that there is one malicious user surviving both CFC and HDC. Further examination reveals that the flipping probabilities of this malicious user are low: ϕ and

4 4 CFC Truth Ψ.6 Ψ Ψ Fig. 2. sensor detection result using CFC Ψ Fig. 4. True sensor types. CFC and HDC V. CONCLUSIONS Ψ sensors with flipping probablities close to Miss classified sensor Ψ Fig. 3. sensor detection result using CFC and HDC. A new method consisting of two CFC statistics and an auxiliary HDC procedure has been proposed in this paper for malicious user detection under a Markov spectrum model. By using the two consistent histogram estimators of the CFC statistics, the proposed method does not require any prior knowledge of the spectrum and sensing models for malicious sensor detection. Both theoretical analysis and simulation results show that the proposed method, with the assistance of a trusted sensor, can achieve high malicious user detection accuracy, and thus significantly improves collaborative spectrum sensing performance. The proposed method does not rely on global decision and thus is effective even when the malicious sensors dominate the network. ϕ.. Although this malicious sensor is not detected, its negative influence on the spectrum sensing result of the fusion center is negligible. Table I summarizes the simulation results over Monte Carlo runs for both cases. The proposed method achieves nearly perfect sensing results in both cases, i.e., P d =.9956 and P fa =.6 in the first case, and P d =.9958 and P fa =.8 in the second case, which are significantly better than the sensing performances of both the single trusted sensor and that of using all sensors without malicious sensor detection. Besides, the proposed algorithm also provides high malicious sensor detection accuracy (η > 95%) in both cases. TABLE I AVERAGE PERFORMANCES COMPARISON OVER RUNS. No detection only Proposed Pd FC (case one) Pfa FC (case one) η (case one) 95.9% Pd FC (case two) Pfa FC (case two) η (case two) 95.3% APPENDIX A PROOF OF PROPOSITION 3 Proof: It can be seen that ˆΨ = n n X ti in which X ti i= is defined as {, if rti+ =, given r ti =, X ti =, if r ti+ =, given r ti =, (4) where t i is the time slot for the i-th reported of the sensor. To prove the convergence of ˆΨ, we need to prove ) E( ˆΨ ) = Ψ, which is simple to show by noticing that E(X t ) = Pr(r t+ = r t = ) = Ψ ; 2) lim Var( ˆΨ ) =. T In general, X t s are not independent due to the correlation between the consecutive true spectrum states in the Markov model. Thus, the central limit theorem can not be applied. However, we will show the second fact is true by first proving that the correlation between X i and X j (i > j) vanishes as (i j) approaches infinity. That is, lim E(X ix j )=E(X i )E(X j ) (5) (i j)

5 5 Note that and E(X i X j ) =Pr(r i+ =,r j+ = r i =,r j = ) =Pr(r j+ = r j = )Pr(r i+ = r i =,r j = ) =Pr(r j+ = r j = )[Pr(s i+ = r i =,r j = )P d +Pr(s i+ = r i =,r j = )P fa ] E(X j )E(X i ) =Pr(r j+ = r j = )Pr(r i+ = r i = ) =Pr(r j+ = r j = )[Pr(s i+ = r i = )P d +Pr(s i+ = r i = )P fa ]. Comparing the two preceding equations, it can be seen that, to prove (5), it is sufficient to prove lim Pr(s i+ = r i =,r j = ) = Pr(s i+ = r i = ) (i j) Note that Pr(s i+ = r i = ) is given as Pr(s i+ = r i = ) = P dpr(s i+ =,s i = )+P fa Pr(s i+ =,s i = ) P d Pr(s i = )+P fa Pr(s i = ) = π P d a +π P fa a π P d +π P fa, (6) and Pr(s i+ = r i =,r j = ) is given as 3 Pr(s i+ = r i =,r j = ) = P2 d Pr(s i+ =,s i =,s j = ) P 2 d Pr(s i =,s j = )... +P dp fa Pr(s i+ =,s i =,s j = ) +P d P fa Pr(s i =,s j = )... +P dp fa Pr(s i+ =,s i =,s j = ) +P d P fa Pr(s i =,s j = )... +P2 fa Pr(s i+ =,s i =,s j = ) +P 2 fa Pr(s i =,s j = ) = π (Pd 2p() i j a +P d P fa ( p () i j )a ) π (Pd 2p() i j +P dp fa ( p () i j ))... +π (Pfa 2 p() i j a +P d P fa ( p () i j )a ) +π (Pfa 2 p() i j +P dp fa ( p () i j )), (7) where p () n Pr(s n+j = s j = ) and p () n Pr(s n+j = s j = ). According to the definition, the following recursive relation holds for p () n, p () n =Pr(s j+n = s j = ) =Pr(s j+n =,s j+n = s j = ) +Pr(s j+n =,s j+n = s j = ) =a p () n +a ( p () n ). (8) Consequently, p () a = a +a. Similarly, we have p () = a a +a. Substituting these two expressions into (7), it can be verified that Pr(s i+ = r i =,r j = ) = π P d a +π P fa a π P d +π P fa = Pr(s i+ r i = ) as i j approaches infinity. Therefore (5) holds. Now, we will use (5) to prove that lim Var( ˆΨ ) =. n For any positiveδ, K δ such that Cov(X i,x j ) < δ/2 when i j > K δ due to (5). Also, given K δ, N δ such that 4K δ < δn δ. Then, for any n > N δ, we have Var( ˆΨ ) = n 2 ( )] Cov(X i X j ) [n n 2 2K δ + δ 2 (n 2K δ ) < i j 2 δ N δ K δ + δ 2 < δ. That is, lim hand, for any finite N δ, n > N δ with probability when T approaches infinity, which implies Var( ˆΨ ) =. On the other n lim Var( ˆΨ ) =. T Therefore, ˆΨ converges to Ψ. Following the same approach, it can be shown that ˆΨ converges to Ψ. REFERENCES [] I. F. Akyildiz, B. F. Lo, and R. Balakrishnan, Cooperative spectrum sensing in cognitive radio networks: A survey, Physical Communication (Elsevier) Journal, vol. 4, no., pp. 4 62, Mar. 2. [2] G. Baldini, T. Sturman, A. Biswas, R. Leschhorn, G. Gódor, and M. Street, Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead, IEEE Commun. Surveys Tuts., no. 99, pp. 25, Apr. 2. [3] A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney, Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks, IEEE Trans. Signal Process., vol. 59, no. 2, pp , Feb. 2. [4] R. Chen, J. M. Park, Y. T. Hou, and J. H. Reed, Toward secure distributed spectrum sensing in cognitive radio networks, IEEE Commun. Mag., vol. 46, no. 4, pp. 5 55, Apr. 28. [5] R. Chen, J. M. Park, and K. Bian, Robust distributed spectrum sensing in cognitive radio networks, Proc. INFOCOM, Phoenix, AZ, May. 28. [6] P. Kaligineedi, M. Khabbazian, and V. K. Bhargava, user detection in a cognitive radio cooperative sensing system, IEEE Trans. Wireless Commun., vol. 9, no. 8, pp , Jun. 2. [7] W. Wang, H. Li, Y. Sun, and Z. Han, Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks, EURASIP Journal on Advances in Signal Processing, vol. 2, Oct. 2. [8] K. Zeng, P. Paweczak, and D. Cabric, Reputation-based cooperative spectrum sensing with trusted nodes assistance, IEEE Commun. Lett., vol. 4, no. 3, pp , Mar. 2. [9] S. Marano, V. Matta, L. Tong, Distributed detection in the presence of Byzantine attacks, IEEE Trans. Signal Process., vol. 57, no., pp. 6 29, Jan. 29. [] H. Li, and Z. Han, Catch me if you can: An abnormality detection approach for collaborative spectrum sensing in cognitive radio networks, IEEE Trans. Wireless Commun., vol. 9, no., pp , Nov. 2. [] F. Adelantado, and C. Verikoukis, A non-parametric statistical approach for malicious users detection in cognitive wireless ad-hoc networks, Proc. ICC, Kyoto, Japan, Jul. 2. [2] A. Vempaty, K. Agrawal, H. Chen, and P. Varshney, Adaptive learning of Byzantines behavior in cooperative spectrum sensing, Proc. WCNC, Quintana Roo, Mexico, May 2. [3] D. Zhao, X. Ma, and X. Zhou, Prior probability-aided secure cooperative spectrum sensing, Proc. WiCOM, Wuhan, China, Oct. 2. [4] S. Li, H. Zhu, B. Yang, C. Chen, and X. Guan, Believe yourself: A usercentric misbehavior setection scheme for secure collaborative spectrum sensing, Proc. ICC, Kyoto, Japan, Jul Note that a x...+b +y is used to represent a+b due to space limitations. x+y

Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing

Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Mihir Laghate and Danijela Cabric Department of Electrical Engineering, University of California, Los Angeles Emails:

More information

Reliable Cooperative Sensing in Cognitive Networks

Reliable Cooperative Sensing in Cognitive Networks Reliable Cooperative Sensing in Cognitive Networks (Invited Paper) Mai Abdelhakim, Jian Ren, and Tongtong Li Department of Electrical & Computer Engineering, Michigan State University, East Lansing, MI

More information

Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks

Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks Priyank Anand, Ankit Singh Rawat Department of Electrical Engineering Indian Institute of Technology Kanpur

More information

Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks

Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks Keshav Agrawal, Aditya Vempaty, Hao Chen and Pramod K. Varshney Electrical Engineering Department,

More information

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Chunhua Sun, Wei Zhang, and haled Ben Letaief, Fellow, IEEE Department of Electronic and Computer Engineering The Hong ong

More information

On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels

On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels On the Optimality of Myopic Sensing 1 in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels Kehao Wang, Lin Chen arxiv:1103.1784v1 [cs.it] 9 Mar 2011 Abstract Recent works ([1],

More information

On Noise-Enhanced Distributed Inference in the Presence of Byzantines

On Noise-Enhanced Distributed Inference in the Presence of Byzantines Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 211 On Noise-Enhanced Distributed Inference in the Presence of Byzantines Mukul Gagrani

More information

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical

More information

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of

More information

False Discovery Rate Based Distributed Detection in the Presence of Byzantines

False Discovery Rate Based Distributed Detection in the Presence of Byzantines IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS () 1 False Discovery Rate Based Distributed Detection in the Presence of Byzantines Aditya Vempaty*, Student Member, IEEE, Priyadip Ray, Member, IEEE,

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

WITH the wide employment of wireless devices in various

WITH the wide employment of wireless devices in various 1 Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel Lichuan a, Student ember, IEEE, Yong Xiang, Senior ember, IEEE, Qingqi Pei, Senior ember, IEEE, Yang Xiang, Senior

More information

STRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS

STRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS STRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS Qing Zhao University of California Davis, CA 95616 qzhao@ece.ucdavis.edu Bhaskar Krishnamachari University of Southern California

More information

Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game

Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game IEEE ICC 202 - Wireless Networks Symposium Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game Yang Gao, Yan Chen and K. J. Ray Liu Department of Electrical and Computer

More information

Hard Decision Cooperative Spectrum Sensing Based on Estimating the Noise Uncertainty Factor

Hard Decision Cooperative Spectrum Sensing Based on Estimating the Noise Uncertainty Factor Hard Decision Cooperative Spectrum Sensing Based on Estimating the Noise Uncertainty Factor Hossam M. Farag Dept. of Electrical Engineering, Aswan University, Egypt. hossam.farag@aswu.edu.eg Ehab Mahmoud

More information

An Improved Blind Spectrum Sensing Algorithm Based on QR Decomposition and SVM

An Improved Blind Spectrum Sensing Algorithm Based on QR Decomposition and SVM An Improved Blind Spectrum Sensing Algorithm Based on QR Decomposition and SVM Yaqin Chen 1,(&), Xiaojun Jing 1,, Wenting Liu 1,, and Jia Li 3 1 School of Information and Communication Engineering, Beijing

More information

Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks

Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks 1 Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks Monireh Dabaghchian, Amir Alipour-Fanid, Kai Zeng, Qingsi Wang, Peter Auer arxiv:1709.10128v3 [cs.ni]

More information

NOWADAYS the demand to wireless bandwidth is growing

NOWADAYS the demand to wireless bandwidth is growing 1 Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks Monireh Dabaghchian, Student Member, IEEE, Amir Alipour-Fanid, Student Member, IEEE, Kai Zeng, Member,

More information

Novel Distributed Spectrum Sensing Techniques for Cognitive Radio Networks

Novel Distributed Spectrum Sensing Techniques for Cognitive Radio Networks 28 IEEE Wireless Communications and Networking Conference (WCNC) Novel Distributed Spectrum Sensing Techniques for Cognitive Radio Networks Peter J. Smith, Rajitha Senanayake, Pawel A. Dmochowski and Jamie

More information

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS Jesus Perez and Ignacio Santamaria Advanced Signal Processing Group, University of Cantabria, Spain, https://gtas.unican.es/

More information

Quantifying Trust and Reputation for Defense against Adversaries in Multi-Channel Dynamic Spectrum Access Networks

Quantifying Trust and Reputation for Defense against Adversaries in Multi-Channel Dynamic Spectrum Access Networks University of Central Florida Electronic Theses and Dissertations Doctoral Dissertation (Open Access) Quantifying Trust and Reputation for Defense against Adversaries in Multi-Channel Dynamic Spectrum

More information

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,

More information

Byzantines and Mitigation Techniques

Byzantines and Mitigation Techniques Distributed Detection in Tree Networs: 1 Byzantines and Mitigation Techniques Bhavya Kailhura, Student Member, IEEE, Swasti Brahma, Member, IEEE, Beran Dule, Member, IEEE, Yunghsiang S Han, Fellow, IEEE,

More information

EUSIPCO

EUSIPCO EUSIPCO 3 569736677 FULLY ISTRIBUTE SIGNAL ETECTION: APPLICATION TO COGNITIVE RAIO Franc Iutzeler Philippe Ciblat Telecom ParisTech, 46 rue Barrault 753 Paris, France email: firstnamelastname@telecom-paristechfr

More information

Distributed Inference and Learning with Byzantine Data

Distributed Inference and Learning with Byzantine Data Syracuse University SURFACE Dissertations - ALL SURFACE 8-1-2016 Distributed Inference and Learning with Byzantine Data Bhavya Kailkhura Syracuse University Follow this and additional works at: http://surface.syr.edu/etd

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

False Data Injection Attacks Against Nonlinear State Estimation in Smart Power Grids

False Data Injection Attacks Against Nonlinear State Estimation in Smart Power Grids 1 False Data Injection Attacks Against Nonlinear State Estimation in Smart Power rids Md. Ashfaqur Rahman and Hamed Mohsenian-Rad Department of Electrical and Computer Engineering, Texas Tech University,

More information

Novel spectrum sensing schemes for Cognitive Radio Networks

Novel spectrum sensing schemes for Cognitive Radio Networks Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced

More information

LECTURE 3. Last time:

LECTURE 3. Last time: LECTURE 3 Last time: Mutual Information. Convexity and concavity Jensen s inequality Information Inequality Data processing theorem Fano s Inequality Lecture outline Stochastic processes, Entropy rate

More information

SPATIAL DIVERSITY AWARE DATA FUSION FOR COOPERATIVE SPECTRUM SENSING

SPATIAL DIVERSITY AWARE DATA FUSION FOR COOPERATIVE SPECTRUM SENSING 2th European Signal Processing Conference (EUSIPCO 22) Bucharest, Romania, August 27-3, 22 SPATIAL DIVERSITY AWARE DATA FUSIO FOR COOPERATIVE SPECTRUM SESIG uno Pratas (,2) eeli R. Prasad () António Rodrigues

More information

Performance of Round Robin Policies for Dynamic Multichannel Access

Performance of Round Robin Policies for Dynamic Multichannel Access Performance of Round Robin Policies for Dynamic Multichannel Access Changmian Wang, Bhaskar Krishnamachari, Qing Zhao and Geir E. Øien Norwegian University of Science and Technology, Norway, {changmia,

More information

Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks

Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks Mohammed Karmoose Electrical Engineering Department Alexandria University Alexandria 1544, Egypt Email: mhkarmoose@ieeeorg Karim

More information

Sensing for Cognitive Radio Networks

Sensing for Cognitive Radio Networks Censored Truncated Sequential Spectrum 1 Sensing for Cognitive Radio Networks Sina Maleki Geert Leus arxiv:1106.2025v2 [cs.sy] 14 Mar 2013 Abstract Reliable spectrum sensing is a key functionality of a

More information

Target Tracking and Classification using Collaborative Sensor Networks

Target Tracking and Classification using Collaborative Sensor Networks Target Tracking and Classification using Collaborative Sensor Networks Xiaodong Wang Department of Electrical Engineering Columbia University p.1/3 Talk Outline Background on distributed wireless sensor

More information

The Poisson Channel with Side Information

The Poisson Channel with Side Information The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH

More information

Fully-distributed spectrum sensing: application to cognitive radio

Fully-distributed spectrum sensing: application to cognitive radio Fully-distributed spectrum sensing: application to cognitive radio Philippe Ciblat Dpt Comelec, Télécom ParisTech Joint work with F. Iutzeler (PhD student funded by DGA grant) Cognitive radio principle

More information

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu

More information

Stability analysis of a cognitive multiple access channel with primary QoS constraints

Stability analysis of a cognitive multiple access channel with primary QoS constraints tability analysis of a cognitive multiple access channel with primary o constraints J. Gambini 1,2,O.imeone 1, U. pagnolini 2,.Bar-Ness 1 andungsooim 3 1 CWCR, NJIT, Newark, New Jersey 07102-1982, UA 2

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1

More information

OPPORTUNISTIC Spectrum Access (OSA) is emerging

OPPORTUNISTIC Spectrum Access (OSA) is emerging Optimal and Low-complexity Algorithms for Dynamic Spectrum Access in Centralized Cognitive Radio Networks with Fading Channels Mario Bkassiny, Sudharman K. Jayaweera, Yang Li Dept. of Electrical and Computer

More information

Cooperative Eigenvalue-Based Spectrum Sensing Performance Limits Under different Uncertainty

Cooperative Eigenvalue-Based Spectrum Sensing Performance Limits Under different Uncertainty Cooperative Eigenvalue-Based Spectrum Sensing Performance Limits Under different Uncertainty A. H.Ansari E&TC Department Pravara Rural Engineering College Loni B. A.Pangavhane E&TC Department Pravara Rural

More information

GAMINGRE 8/1/ of 7

GAMINGRE 8/1/ of 7 FYE 09/30/92 JULY 92 0.00 254,550.00 0.00 0 0 0 0 0 0 0 0 0 254,550.00 0.00 0.00 0.00 0.00 254,550.00 AUG 10,616,710.31 5,299.95 845,656.83 84,565.68 61,084.86 23,480.82 339,734.73 135,893.89 67,946.95

More information

Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios

Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios 1206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH 2009 Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong Wong,

More information

Cyber Attacks, Detection and Protection in Smart Grid State Estimation

Cyber Attacks, Detection and Protection in Smart Grid State Estimation 1 Cyber Attacks, Detection and Protection in Smart Grid State Estimation Yi Zhou, Student Member, IEEE Zhixin Miao, Senior Member, IEEE Abstract This paper reviews the types of cyber attacks in state estimation

More information

Energy-Efficient Noncoherent Signal Detection for Networked Sensors Using Ordered Transmissions

Energy-Efficient Noncoherent Signal Detection for Networked Sensors Using Ordered Transmissions Energy-Efficient Noncoherent Signal Detection for Networked Sensors Using Ordered Transmissions Ziad N. Rawas, Student Member, IEEE, Qian He, Member, IEEE, and Rick S. Blum, Fellow, IEEE Abstract Energy

More information

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting 1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University

More information

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012 Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications

More information

Unsupervised Anomaly Detection for High Dimensional Data

Unsupervised Anomaly Detection for High Dimensional Data Unsupervised Anomaly Detection for High Dimensional Data Department of Mathematics, Rowan University. July 19th, 2013 International Workshop in Sequential Methodologies (IWSM-2013) Outline of Talk Motivation

More information

WE consider the classical problem of distributed detection

WE consider the classical problem of distributed detection 16 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 57, NO 1, JANUARY 2009 Distributed Detection in the Presence of Byzantine Attacks Stefano Marano, Vincenzo Matta, Lang Tong, Fellow, IEEE Abstract Distributed

More information

DIT - University of Trento

DIT - University of Trento PhD Dissertation International Doctorate School in Information and Communication Technologies DIT - University of Trento TOWARDS ENERGY EFFICIENT COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIO NETWORKS

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Dynamic spectrum access with learning for cognitive radio

Dynamic spectrum access with learning for cognitive radio 1 Dynamic spectrum access with learning for cognitive radio Jayakrishnan Unnikrishnan and Venugopal V. Veeravalli Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University

More information

Distributed Spectrum Sensing for Cognitive Radio Networks Based on the Sphericity Test

Distributed Spectrum Sensing for Cognitive Radio Networks Based on the Sphericity Test This article h been accepted for publication in a future issue of this journal, but h not been fully edited. Content may change prior to final publication. Citation information: DOI 0.09/TCOMM.208.2880902,

More information

TARGET DETECTION WITH FUNCTION OF COVARIANCE MATRICES UNDER CLUTTER ENVIRONMENT

TARGET DETECTION WITH FUNCTION OF COVARIANCE MATRICES UNDER CLUTTER ENVIRONMENT TARGET DETECTION WITH FUNCTION OF COVARIANCE MATRICES UNDER CLUTTER ENVIRONMENT Feng Lin, Robert C. Qiu, James P. Browning, Michael C. Wicks Cognitive Radio Institute, Department of Electrical and Computer

More information

Technical note on seasonal adjustment for M0

Technical note on seasonal adjustment for M0 Technical note on seasonal adjustment for M0 July 1, 2013 Contents 1 M0 2 2 Steps in the seasonal adjustment procedure 3 2.1 Pre-adjustment analysis............................... 3 2.2 Seasonal adjustment.................................

More information

Resilient Distributed Optimization Algorithm against Adversary Attacks

Resilient Distributed Optimization Algorithm against Adversary Attacks 207 3th IEEE International Conference on Control & Automation (ICCA) July 3-6, 207. Ohrid, Macedonia Resilient Distributed Optimization Algorithm against Adversary Attacks Chengcheng Zhao, Jianping He

More information

Uncertainty. Jayakrishnan Unnikrishnan. CSL June PhD Defense ECE Department

Uncertainty. Jayakrishnan Unnikrishnan. CSL June PhD Defense ECE Department Decision-Making under Statistical Uncertainty Jayakrishnan Unnikrishnan PhD Defense ECE Department University of Illinois at Urbana-Champaign CSL 141 12 June 2010 Statistical Decision-Making Relevant in

More information

Improved Spectrum Utilization in Cognitive Radio Systems

Improved Spectrum Utilization in Cognitive Radio Systems Improved Spectrum Utilization in Cognitive Radio Systems Lei Cao and Ramanarayanan Viswanathan Department of Electrical Engineering The University of Mississippi Jan. 15, 2014 Lei Cao and Ramanarayanan

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

A New PCR Combination Rule for Dynamic Frame Fusion

A New PCR Combination Rule for Dynamic Frame Fusion Chinese Journal of Electronics Vol.27, No.4, July 2018 A New PCR Combination Rule for Dynamic Frame Fusion JIN Hongbin 1, LI Hongfei 2,3, LAN Jiangqiao 1 and HAN Jun 1 (1. Air Force Early Warning Academy,

More information

بسم الله الرحمن الرحيم

بسم الله الرحمن الرحيم بسم الله الرحمن الرحيم Reliability Improvement of Distributed Detection in Clustered Wireless Sensor Networks 1 RELIABILITY IMPROVEMENT OF DISTRIBUTED DETECTION IN CLUSTERED WIRELESS SENSOR NETWORKS PH.D.

More information

Network Performance Tomography

Network Performance Tomography Network Performance Tomography Hung X. Nguyen TeleTraffic Research Center University of Adelaide Network Performance Tomography Inferring link performance using end-to-end probes 2 Network Performance

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Dispersion of the Gilbert-Elliott Channel

Dispersion of the Gilbert-Elliott Channel Dispersion of the Gilbert-Elliott Channel Yury Polyanskiy Email: ypolyans@princeton.edu H. Vincent Poor Email: poor@princeton.edu Sergio Verdú Email: verdu@princeton.edu Abstract Channel dispersion plays

More information

arxiv: v3 [cs.lg] 4 Oct 2011

arxiv: v3 [cs.lg] 4 Oct 2011 Reinforcement learning based sensing policy optimization for energy efficient cognitive radio networks Jan Oksanen a,, Jarmo Lundén a,b,1, Visa Koivunen a a Aalto University School of Electrical Engineering,

More information

A New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality

A New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality 0 IEEE Information Theory Workshop A New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality Kumar Viswanatha, Emrah Akyol and Kenneth Rose ECE Department, University of California

More information

Energy-Efficient Distributed Spectrum Sensing for Cognitive Sensor Networks

Energy-Efficient Distributed Spectrum Sensing for Cognitive Sensor Networks Energy-Efficient Distributed Spectrum Sensing for Cognitive Sensor Networks Sina Maleki, Member, IEEE, Ashish Pandharipande, Senior Member, IEEE, and Geert Leus, Senior Member, IEEE Abstract Reliability

More information

UWB Geolocation Techniques for IEEE a Personal Area Networks

UWB Geolocation Techniques for IEEE a Personal Area Networks MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com UWB Geolocation Techniques for IEEE 802.15.4a Personal Area Networks Sinan Gezici Zafer Sahinoglu TR-2004-110 August 2004 Abstract A UWB positioning

More information

arxiv: v2 [eess.sp] 20 Nov 2017

arxiv: v2 [eess.sp] 20 Nov 2017 Distributed Change Detection Based on Average Consensus Qinghua Liu and Yao Xie November, 2017 arxiv:1710.10378v2 [eess.sp] 20 Nov 2017 Abstract Distributed change-point detection has been a fundamental

More information

An Indirect Reciprocity Game Theoretic Framework for Dynamic Spectrum Access

An Indirect Reciprocity Game Theoretic Framework for Dynamic Spectrum Access IEEE ICC 2012 - Cognitive Radio and Networks Symposium An Indirect Reciprocity Game Theoretic Framework for Dynamic Spectrum Access Biling Zhang 1, 2, Yan Chen 1, and K. J. Ray Liu 1 1 Department of Electrical

More information

Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information

Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information Fabio E. Lapiccirella, Zhi Ding and Xin Liu Electrical and Computer Engineering University of California, Davis, California

More information

Distributed Randomized Algorithms for the PageRank Computation Hideaki Ishii, Member, IEEE, and Roberto Tempo, Fellow, IEEE

Distributed Randomized Algorithms for the PageRank Computation Hideaki Ishii, Member, IEEE, and Roberto Tempo, Fellow, IEEE IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 55, NO. 9, SEPTEMBER 2010 1987 Distributed Randomized Algorithms for the PageRank Computation Hideaki Ishii, Member, IEEE, and Roberto Tempo, Fellow, IEEE Abstract

More information

arxiv:cs/ v1 [cs.ni] 27 Feb 2007

arxiv:cs/ v1 [cs.ni] 27 Feb 2007 Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors Yunxia Chen, Qing Zhao, and Ananthram Swami Abstract arxiv:cs/0702158v1 [cs.ni] 27 Feb 2007 We

More information

Distributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users

Distributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users Distributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users Mario Bkassiny and Sudharman K. Jayaweera Dept. of Electrical and Computer Engineering University of New

More information

On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks

On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks This paper was presented as part of the Mini-Conference at IEEE INFOCOM 11 On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks Lei Sun Wenye Wang

More information

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2427 An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel Ersen Ekrem, Student Member, IEEE,

More information

Behavior Propagation in Cognitive Radio Networks: A Social Network Approach

Behavior Propagation in Cognitive Radio Networks: A Social Network Approach 1 Behavior Propagation in Cognitive Radio Networks: A Social Network Approach Husheng Li, Ju Bin Song, Chien-fei Chen, Lifeng Lai and Robert C. Qiu Abstract A key feature of cognitive radio network is

More information

Collaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks

Collaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks Collaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks Simulation and Theoretical Results Jun Wang Paulo Urriza Prof. Danijela Čabrić UCLA CORES Lab March 12, 2010

More information

AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS

AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS 1 AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS Shensheng Tang, Brian L. Mark, and Alexe E. Leu Dept. of Electrical and Computer Engineering George Mason University Abstract We apply a

More information

The peculiarities of the model: - it is allowed to use by attacker only noisy version of SG C w (n), - CO can be known exactly for attacker.

The peculiarities of the model: - it is allowed to use by attacker only noisy version of SG C w (n), - CO can be known exactly for attacker. Lecture 6. SG based on noisy channels [4]. CO Detection of SG The peculiarities of the model: - it is alloed to use by attacker only noisy version of SG C (n), - CO can be knon exactly for attacker. Practical

More information

Precoding for Decentralized Detection of Unknown Deterministic Signals

Precoding for Decentralized Detection of Unknown Deterministic Signals Precoding for Decentralized Detection of Unknown Deterministic Signals JUN FANG, Member, IEEE XIAOYING LI University of Electronic Science and Technology of China HONGBIN LI, Senior Member, IEEE Stevens

More information

VoI for Learning and Inference! in Sensor Networks!

VoI for Learning and Inference! in Sensor Networks! ARO MURI on Value-centered Information Theory for Adaptive Learning, Inference, Tracking, and Exploitation VoI for Learning and Inference in Sensor Networks Gene Whipps 1,2, Emre Ertin 2, Randy Moses 2

More information

Computing Consecutive-Type Reliabilities Non-Recursively

Computing Consecutive-Type Reliabilities Non-Recursively IEEE TRANSACTIONS ON RELIABILITY, VOL. 52, NO. 3, SEPTEMBER 2003 367 Computing Consecutive-Type Reliabilities Non-Recursively Galit Shmueli Abstract The reliability of consecutive-type systems has been

More information

Reactive Power Compensation for Reliability Improvement of Power Systems

Reactive Power Compensation for Reliability Improvement of Power Systems for Reliability Improvement of Power Systems Mohammed Benidris, Member, IEEE, Samer Sulaeman, Student Member, IEEE, Yuting Tian, Student Member, IEEE and Joydeep Mitra, Senior Member, IEEE Department of

More information

IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) 1. Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio

IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) 1. Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio Yulong Zou, Member, IEEE, Yu-Dong Yao, Fellow, IEEE, and Baoyu Zheng,

More information

Power Allocation over Two Identical Gilbert-Elliott Channels

Power Allocation over Two Identical Gilbert-Elliott Channels Power Allocation over Two Identical Gilbert-Elliott Channels Junhua Tang School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University, China Email: junhuatang@sjtu.edu.cn Parisa

More information

Approximate Inference

Approximate Inference Approximate Inference Simulation has a name: sampling Sampling is a hot topic in machine learning, and it s really simple Basic idea: Draw N samples from a sampling distribution S Compute an approximate

More information

Distributed Event Detection under Byzantine Attack in Wireless Sensor Networks

Distributed Event Detection under Byzantine Attack in Wireless Sensor Networks Distributed Event Detection under Byzantine Attack in Wireless Sensor Networks Pengfei Zhang 1,3, Jing Yang Koh 2,3, Shaowei Lin 3, Ido Nevat 3 1. School of Electrical & Electronic Engineering, Nanyang

More information

On Gaussian MIMO Broadcast Channels with Common and Private Messages

On Gaussian MIMO Broadcast Channels with Common and Private Messages On Gaussian MIMO Broadcast Channels with Common and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 ersen@umd.edu

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

The Byzantine CEO Problem

The Byzantine CEO Problem The Byzantine CEO Problem Oliver Kosut and ang Tong School of Electrical and Computer Engineering Cornell University, Ithaca, NY 14853 Email: {oek2,lt35}@cornelledu Abstract The CEO Problem is considered

More information

Connectivity of inhomogeneous random key graphs intersecting inhomogeneous Erdős-Rényi graphs

Connectivity of inhomogeneous random key graphs intersecting inhomogeneous Erdős-Rényi graphs Connectivity of inhomogeneous random key graphs intersecting inhomogeneous Erdős-Rényi graphs Rashad Eletreby and Osman Yağan Department of Electrical and Computer Engineering and CyLab, Carnegie Mellon

More information

13 SHADOW FLICKER Introduction Methodology

13 SHADOW FLICKER Introduction Methodology Table of contents 13 SHADOW FLICKER... 13-1 13.1 Introduction... 13-1 13.2 Methodology... 13-1 13.2.1 Factors Influencing Shadow Flicker Occurrence... 13-2 13.2.2 Shadow Flicker Analysis Methodology...

More information

Analysis of opportunistic spectrum access in cognitive radio networks using hidden Markov model with state prediction

Analysis of opportunistic spectrum access in cognitive radio networks using hidden Markov model with state prediction Wang and Adriman EURASIP Journal onwireless Communications and Networking (2015) 2015:10 DOI 10.1186/s13638-014-0238-5 RESEARCH Open Access Analysis of opportunistic spectrum access in cognitive radio

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

ONE of the main applications of wireless sensor networks

ONE of the main applications of wireless sensor networks 2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 Coverage by Romly Deployed Wireless Sensor Networks Peng-Jun Wan, Member, IEEE, Chih-Wei Yi, Member, IEEE Abstract One of the main

More information

Performance of Wireless-Powered Sensor Transmission Considering Energy Cost of Sensing

Performance of Wireless-Powered Sensor Transmission Considering Energy Cost of Sensing Performance of Wireless-Powered Sensor Transmission Considering Energy Cost of Sensing Wanchun Liu, Xiangyun Zhou, Salman Durrani, Hani Mehrpouyan, Steven D. Blostein Research School of Engineering, College

More information