Title :
Secure transmission power of cognitive radios for dynamic spectrum access applications
Author :
Li, Xiaohua ; Chen, Jinying ; Ng, Fan
Author_Institution :
Dept. of Electr. & Comput. Eng., State Univ. of New York at Binghamton, Binghamton, NY
Abstract :
One of the major concerns of cognitive radios when used for secondary spectrum access is the potential of interfering primary users, considering especially that cognitive radios may be misbehaved or under malicious attacks. In this paper, we present a method for a cognitive radio to secure its transmission power purely from its physical-layer received signals. Built into the transceiver hardware as an independent self-check procedure, this method can guarantee the avoidance of excessive interference of cognitive radios to primary users even when the more flexible upper-layer software or policy regulator is compromised under attacks. Analysis and simulations show that the secure transmission power determined by this procedure can be very close to the ideal secondary transmission power in many practical situations, so the proposed method is helpful to guarantee both the efficiency and the security of cognitive radios.
Keywords :
cognitive radio; interference (signal); telecommunication security; cognitive radios; dynamic spectrum access applications; independent self-check procedure; interference; malicious attacks; physical-layer received signals; policy regulator; secondary spectrum; secondary transmission power; secure transmission power; transceiver hardware; upper-layer software; Application software; Chromium; Cognitive radio; Hardware; Information security; Interference; Power engineering and energy; Power engineering computing; TV broadcasting; Transceivers;
Conference_Titel :
Information Sciences and Systems, 2008. CISS 2008. 42nd Annual Conference on
Conference_Location :
Princeton, NJ
Print_ISBN :
978-1-4244-2246-3
Electronic_ISBN :
978-1-4244-2247-0
DOI :
10.1109/CISS.2008.4558523