10th EAI International Conference on Communications and Networking in China

Research Article

Joint Malicious User Detection and Resource Allocation in Cognitive Radio Networks

  • @INPROCEEDINGS{10.4108/eai.15-8-2015.2260669,
        author={xiaoge huang and Liping Chen and Qianbin Chen and Bin Shen},
        title={Joint Malicious User Detection and Resource Allocation in Cognitive Radio Networks},
        proceedings={10th EAI International Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2015},
        month={9},
        keywords={cognitive radio malicious user detection power allocation},
        doi={10.4108/eai.15-8-2015.2260669}
    }
    
  • xiaoge huang
    Liping Chen
    Qianbin Chen
    Bin Shen
    Year: 2015
    Joint Malicious User Detection and Resource Allocation in Cognitive Radio Networks
    CHINACOM
    IEEE
    DOI: 10.4108/eai.15-8-2015.2260669
xiaoge huang,*, Liping Chen1, Qianbin Chen1, Bin Shen1
  • 1: Chongqing University of Posts and Telecommunications
*Contact email: huangxg@cqupt.edu.cn

Abstract

Cognitive radio is an effective technology to solve the increasing spectrum demands for wireless application by reducing the spectrum based on the sensing results. However, the reliability of each secondary user (SU) is uncertain. In order to improve the chance to access the idle spectrum, some SUs send false sensing results and become malicious users (MUs). Our objective is to design a novel algorithm that joint MUs detection and power allocation to optimize the total utility of the whole cognitive radio network, while meets the requirement of MUs detection accuracy as well as the interference limitation to primary users (PUs). The utility is composed of three parts: the detection probability of MUs, sum-rate and the energy consumption for MUs detection. We formulate the problem into two sub-problems. Firstly, we detect MUs to get the detection probability of MUs and the energy consumption for MUs detection. Sencondly, based on the results from the first step we use the Lagrange dual decomposition method to maximize the sum-rate in the network.