The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - April (2013 vol.24)
pp: 778-788
A. W. Min , Circuits & Syst. Res, Intel Labs., Hillsboro, OR, USA
K. G. Shin , Dept. of Electr. Eng. & Comput. Sci., Univ. of Michigan, Ann Arbor, MI, USA
ABSTRACT
In cognitive radio networks (CRNs), secondary users must be able to accurately and reliably track the location of small-scale mobile primary users/devices (e.g., wireless microphones) in order to efficiently utilize spatial spectrum opportunities, while protecting primary communications. However, accurate tracking of the location of mobile primary users is difficult due mainly to the CR-unique constraint, i.e., localization must rely solely on reported sensing results (i.e., measured primary signal strengths), which can easily be compromised by malicious sensors (or attackers). To cope with this challenge, we propose a new framework, called Sequential mOnte carLo combIned with shadow-faDing estimation (SOLID), for accurate, attack/fault-tolerant tracking of small-scale mobile primary users. The key idea underlying SOLID is to exploit the temporal shadow fading correlation in sensing results induced by the primary user's mobility. Specifically, SOLID augments conventional Sequential Monte Carlo (SMC)-based target tracking with shadow-fading estimation. By examining the shadow-fading gain between the primary transmitter and CRs/sensors, SOLID 1) significantly improves the accuracy of primary tracking regardless of the presence/absence of attack, and 2) successfully masks the abnormal sensing reports due to sensor faults or attacks, preserving localization accuracy and improving spatial spectrum efficiency. Our extensive evaluation in realistic wireless fading environments shows that SOLID lowers localization error by up to 88 percent in the absence of attacks, and 89 percent in the presence of the challenging "slow-poisoning” attack, compared to the conventional SMC-based tracking.
INDEX TERMS
telecommunication security, cognitive radio, mobile radio, Monte Carlo methods, target tracking, slow-poisoning attack, robust tracking, small-scale mobile primary user, cognitive radio networks, CRN, secondary users, track reliability, small-scale mobile primary devices, wireless microphones, spatial spectrum opportunities, primary communication protection, CR constraint, malicious sensors, sequential Monte Carlo combined-with-shadow-fading estimation, SOLID, attack-fault-tolerant tracking, temporal shadow fading correlation, primary user mobility, SMC-based target tracking, shadow-fading estimation, shadow-fading gain, primary transmitter, sensor faults, sensor attack, localization accuracy, spatial spectrum efficiency, wireless fading environments, localization error, Sensors, Solids, Mobile communication, Fading, Transmitters, Estimation, Wireless sensor networks, Kalman filter, Cognitive radio, mobile primary user, location tracking, security, log-normal shadowing
CITATION
A. W. Min, K. G. Shin, "Robust Tracking of Small-Scale Mobile Primary User in Cognitive Radio Networks", IEEE Transactions on Parallel & Distributed Systems, vol.24, no. 4, pp. 778-788, April 2013, doi:10.1109/TPDS.2012.191
REFERENCES
[1] "Second Memorandum Opinion and Order," FCC 10-174, Sept. 2010.
[2] IEEE 802.22 Working Group on Wireless Regional Area Networks, http://www.ieee802.org22/, 2011.
[3] IEEE 802.22 Working Group on Wireless Local Area Networks, http://www.ieee802.org11/, 2011.
[4] J. Wang, M. Song, S. Santhiveeran, K. Lim, G. Ko, K. Kim, S. Hwang, M. Ghosh, V. Gaddam, and K. Challapali, "First Cognitive Radio Networking Standard for Personal/Portable Devices in TV White Spaces," Proc. IEEE Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Apr. 2010.
[5] P. Bahl, R. Chandra, T. Moscibroda, R. Murty, and M. Welsh, "White Space Networking with Wi-Fi like Connectivity," Proc. ACM SIGCOMM, Aug. 2009.
[6] G. Chouinard, "Wireless Microphone Sensing," IEEE 802.22-07/0530r1, Nov. 2007.
[7] M. Vu, S.S. Ghassemzadeh, and V. Tarokh, "Interference in a Cognitive Network with Beacon," Proc. IEEE Wireless Comm. Networking Conf. (WCNC), June 2008.
[8] M.F. Hanif, M. Shafi, P.J. Smith, and P. Dmochowski, "Interference and Deployment Issues for Cognitive Radio Systems in Shadowing Environments," Proc. IEEE Int'l Conf. Comm. (ICC), June 2009.
[9] K.R. Chowdhury, M.D. Felice, and I.F. Akyildiz, "TP-CRAHN: A Transport Protocol for Cognitive Radio Ad-hoc Networks," Proc. IEEE INFOCOM, Apr. 2009.
[10] R. Chen, J.-M. Park, and J.H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE J. Selected Areas Comm., vol. 26, no. 1, pp. 25-37, Jan. 2008.
[11] S. Liu, Y. Chen, W. Trappe, and L.J. Greenstein, "ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks," Proc. IEEE INFOCOM, Apr. 2009.
[12] S. Huang and X. Liu, and Z. Ding, "Distributed Power Control for Cognitive User Access Based on Primary Link Control Feedback," Proc. IEEE INFOCOM, Mar. 2010.
[13] A.W. Min, X. Zhang, and K.G. Shin, "Spatio-Temporal Fusion for Small-Scale Primary Detection in Cognitive Radio Networks," Proc. IEEE INFOCOM, Mar. 2010.
[14] A.W. Min, X. Zhang, and K.G. Shin, "Detection of Small-Scale Primary Users in Cognitive Radio Networks," IEEE J. Selected Areas Comm., vol. 29, no. 2, pp. 349-361, Feb. 2011.
[15] FCC, "Facilitating Opportunities for Flexible, Efficient, and Reliable Spectrum Use Employing Spectrum Agile Radio Technologies," Rep. ET Docket No. 03-108, Dec. 2003.
[16] "USRP: Universal Software Radio Peripheral," http:/www. ettus.com, 2012.
[17] K. Tan et al., "Sora: High Performance Software Radio Using General Purpose Multi-core Processors," Proc. USENIX Symp. Networked Systems Design and Implementation, Apr. 2009.
[18] S.M. Mishra, R. Tandra, and A. Sahai, "Coexistence with Primary Users of Different Scales," Proc. IEEE Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Apr. 2007.
[19] S. Anand, Z. Jin, and K.P. Subbalakshmi, "An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks," Proc. IEEE Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Oct. 2008.
[20] Y. Liu, P. Ning, and H. Dai, "Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures," Proc. IEEE Symp. Security and Privacy, May 2010.
[21] R. Chen, J.-M. Park, and K. Bian, "Robust Distributed Spectrum Sensing in Cognitive Radio Networks," Proc. IEEE INFOCOM, Apr. 2008.
[22] P. Kaligineedi, M. Khabbazian, and V.K. Bharava, "Secure Cooperative Sensing Techniques for Cognitive Radio Systems," Proc. IEEE Int'l Conf. Comm. (ICC), May 2008.
[23] A.W. Min and K.G. Shin, "Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation," IEEE Trans. Mobile Computing, vol. 10, no. 10, pp. 1434-1447, Oct. 2011.
[24] L. Duan, A.W. Min, J. Huang, and K.G. Shin, "Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks," J. Selected Areas Comm., vol. 30, no. 9, pp. 1658-1665, Oct. 2012.
[25] A.W. Min, K.-H. Kim, and K.G. Shin, "Robust Cooperative Sensing via Stat Estimation in Cognitive Radio Networks," Proc. IEEE Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN), May 2011.
[26] P. Bahl and V.N. Padmanabhan, "RADAR: An In-Building RF-Based User Location and Tracking System," Proc. IEEE INFOCOM, Mar. 2000.
[27] C. Gui and P. Mohapatra, "Power Conservation and Quality of Surveillance in Target Tracking Sensor Networks," Proc. ACM MobiCom, Sept. 2004.
[28] A. Smith, H. Balakrishnan, M. Goraczko, and N. Priyantha, "Tracking Moving Devices with the Cricket Location System," Proc. ACM Int'l Conf. Mobile Systems, Applications, and Services (MobiSys), June 2004.
[29] P. Zhang and M. Martonosi, "LOCALE: Collaborative Localization Estimation for Sparse Mobile Sensor Networks," Proc. ACM Int'l Conf. Information Processing in Sensor Networks (IPSN), Apr. 2008.
[30] M. Ding and X. Cheng, "Fault Tolerant Target Tracking in Sensor Networks," Proc. ACM MobiHoc, May 2009.
[31] X. Sheng, Y.-H. Hu, and P. Ramanathan, "Distributed Particle Filter with GMM Approximation for Multiple Targets Localization and Tracking in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Information Processing in Sensor Networks (IPSN), Apr. 2005.
[32] C.R. Stevenson, C. Cordeiro, E. Sofer, and G. Chouinard, RAN Requirements, IEEE 802.22-05/0007r46, Sept. 2005.
[33] S. Shellhammer, S. Shankar, R. Tandra, and J. Tomcik, "Performance of Power Detector Sensors of DTV Signals in IEEE 802.22 WRANs," Proc. ACM First Int'l Workshop Technology and Policy for Accessing Spectrum (TAPAS), Aug. 2006.
[34] V. Erceg, L.J. Greenstein, S.Y. Tjandra, S.R. Parkoff, A. Gupta, B. Kulic, A.A. Julius, and R. Bianchi, "An Empirically Based Path Loss Model for Wireless Channels in Suburban Environments," IEEE J. Selected Areas Comm., vol. 17, no. 7, pp. 1205-1211, July 1999.
[35] A. Algans, K.I. Pedersen, and P.E. Mogensen, "Experimental Analysis of the Joint Statistical Properties of Azimuth Spread, Delay Spread, and Shadow Fading," IEEE J. Selected Areas Comm., vol. 20, no. 3, pp. 523-531, Apr. 2002.
[36] W.-P. Chen, J.C. Hou, and L. Sha, "Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 3, no. 3, pp. 258-271, July-Sept. 2004.
[37] M. Gudmundson, "Correlation Model for Shadow Fading in Mobile Radio Systems," Electronic Letters, vol. 27, no. 23, pp. 2145-2146, Nov. 1991.
[38] G. Chandrasekaran, M.A. Ergin, M. Gruteser, R.P. Martin, J. Yang, and Y. Chen, "DECODE: Exploiting Shadow Fading to DEtect COMoving wireless Devices," IEEE Trans. Mobile Computing, vol. 8, no. 12, pp. 1663-1675, Dec. 2009.
[39] L. Hu and D. Evans, "Localization for Mobile Sensor Networks," Proc. ACM MobiCom, Sept. 2004.
[40] A. Baggio and K. Langendoen, "Monte-Carlo Localization for Mobile Wireless Sensor Networks," Proc. Int'l Conf. Mobile Ad-Hoc and Sensor Networks (MSN), Dec. 2006.
[41] M. Rudafshani and S. Datta, "Localization in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Information Processing in Sensor Networks (IPSN), Apr. 2007.
[42] S. Haykin, Adaptive Filter Theory, second ed. Prentice Hall, 1991.
[43] G. Chouinard, Sensing Performance with the 802.22.1 Wireless Microphone Beacon, IEEE 802.22-09/0068r1, Mar. 2009.
[44] J. Yoon, M. Liu, and B. Noble, "Sound Mobility Models," Proc. ACM MobiCom, Sept. 2003.
[45] A.W. Min and K.G. Shin, "On Sensing-Access Tradeoff in Cognitive Radio Networks," Proc. IEEE Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Apr. 2010.
[46] A.W. Min and K.G. Shin, "An Optimal Sensing Framework Based on Spatial RSS-Profile in Cognitive Radio Networks," Proc. IEEE Sixth Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), June 2009.
[47] S.M. Alamouti, "A Simple Transmit Diversity Technique for Wireless Communications," IEEE J. Selected Areas Comm., vol. 16, no. 8, pp. 1451-1458, Oct. 1998.
[48] B. Sklar, "Rayleigh Fading Channel in Mobile Digital Communication Systems Part I: Characterization," IEEE Comm. Magazine, vol. 35, no. 7, pp. 90-100, July 2002.
899 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool