Cloud Applications in Cognitive Radio Shameek Bhattacharjee COP 5611 Project Presentation.

Slides:



Advertisements
Similar presentations
PAWS: Use Cases I-D: draft-ietf-paws-problem-stmt-usecases-rqmts Basavaraj Patil, Scott Probasco (Nokia) Juan Carlos Zuniga (Interdigital) IETF 82.
Advertisements

AALTO UNIVERSITY School of Science and Technology Wang Wei
D EFENSE A GAINST S PECTRUM S ENSING D ATA F ALSIFICATION A TTACKS I N C OGNITIVE R ADIO N ETWORKS Li Xiao Department of Computer Science & Engineering.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Fault Tolerant Routing in Tri-Sector Wireless Cellular Mesh Networks Yasir Drabu and Hassan Peyravi Kent State University Kent, OH
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Detecting Primary Receivers for Cognitive Radio Applications Ben Wild, Kannan Ramchandran UC Berkeley Dept. of Electrical Engineering and Computer Science.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Advancing Wireless Link Signatures for Location Distinction J. Zhang, M. H. Firooz, N. Patwari, S. K. Kasera MobiCom’ 08 Presenter: Yuan Song.
1 Cross-Layer Design for Wireless Communication Networks Ness B. Shroff Center for Wireless Systems and Applications (CWSA) School of Electrical and Computer.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
Performance Analysis of Energy Detector in Relay Based Cognitive Radio Networks Saman Atapattu Chintha Tellambura Hai Jiang.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Monday March 12, 2007 Acknowledgement:
A FREQUENCY HOPPING SPREAD SPECTRUM TRANSMISSION SCHEME FOR UNCOORDINATED COGNITIVE RADIOS Xiaohua (Edward) Li and Juite Hwu Department of Electrical and.
Data Selection In Ad-Hoc Wireless Sensor Networks Olawoye Oyeyele 11/24/2003.
Cooperative spectrum sensing in cognitive radio Aminmohammad Roozgard.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
1 Techniques to control noise and fading l Noise and fading are the primary sources of distortion in communication channels l Techniques to reduce noise.
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
Effect of Power Control in Forwarding Strategies for Wireless Ad-Hoc Networks Supervisor:- Prof. Swades De Presented By:- Aditya Kawatra 2004EE10313 Pratik.
1 Nikolajs Bogdanovs Riga Technical University, Lomonosova iela 1, LV-1019, Riga, Latvia, phone: , Two Layer Model.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Simulation Of A Cooperative Protocol For Common Control Channel Implementation Prepared by: Aishah Thaher Shymaa Khalaf Supervisor: Dr.Ahmed Al-Masri.
Cognitive Radio Networks
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Copyright © 2010 National Institute of Information and Communications Technology. All Rights Reserved 1 R&D and Standardization Activities on Distributed.
Tarun Bansal, Bo Chen and Prasun Sinha
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
3 Introduction System Model Distributed Data Collection Simulation and Analysis 5 Conclusion 2.
Cell Zooming for Cost-Efficient Green Cellular Networks
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
RADAR: an In-building RF-based user location and tracking system
4 Introduction Semi-Structure Routing Framework System Model Performance Analytical Framework Simulation 6 Conclusion.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
Cognitive Radio: Next Generation Communication System
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Static Spectrum Allocation
Cognitive Radio
Zaid A. Shafeeq Mohammed N. Al-Damluji Al-Ahliyya Amman University Amman - Jordan September
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Spectrum Sensing In Cognitive Radio Networks
Dynamic Spectrum Access/Management Models Exclusive-Use Model Shared-Use Model.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
A framework for spectrum reuse based on primary-secondary cooperation Omar Bakr Ben Wild Mark Johnson Professor Kannan Ramchandran.
Unit 4 Cellular Telephony
Overcoming the Sensing-Throughput Tradeoff in Cognitive Radio Networks ICC 2010.
1 A Throughput Enhancement Handover Algorithm for WiMAX Network Architecture Hao-Ming Chang and Gwo-Jong Yu Graduate School of Mathematical Sciences, Aletheia.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Phd Proposal Investigation of Primary User Emulation Attack in Cognitive Radio Networks Chao Chen Department of Electrical & Computer Engineering Stevens.
The University of Adelaide, School of Computer Science
SPECTRUM SHARING IN COGNITIVE RADIO NETWORK
Wireless Sensor Network Architectures
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
Presented by Prashant Duhoon
Cognitive Radio Networks
Presented by Mohamad Haidar, Ph.D. May 13, 2009 Moncton, NB, Canada
Spectrum Sharing in Cognitive Radio Networks
Protocols.
Protocols.
Presentation transcript:

Cloud Applications in Cognitive Radio Shameek Bhattacharjee COP 5611 Project Presentation

Introduction Cognitive Radio Basics - Opportunistic spectrum access : Unlicensed wireless devices (secondary) operate on frequencies not currently being used by the licensed users (primaries). For. e.g. a TV band, cellular network etc. - Regulatory aspect : Individual devices have to sense the vacancy of channel before they can access a channel. The empty/non empty opinion on a channel is known as spectrum occupancy. - Cooperative Spectrum Sensing: Due to noise, signal fading, multi-path shadowing effects individual devices cannot correctly conjecture the true spectrum occupancy. Multiple radio’s spectrum occupancy reports are taken into account and fused for a robust spectrum decision on a channel. - Fusion – usually takes place in a secondary Base Station (BS), or individual node’s in ad hoc cognitive network. Security Issues - There is no incentive to truthfully report occupancy. - Malicious nodes in the network may be present who lie about spectrum occupancy. -The final report may be different from the actual case for many channels on different locations.

Challenges Motivation behind using cloud services Convenience of data access from any site connected to the internet. Power consumption is still a limiting factor in hand - held mobile devices and tablets. The cognitive radio nodes are already burdened with the task of spectrum sensing and channel access. Further computations for security issues is an added burden. Particularly calculation of trust metrics, maintenance and update of history of trust for a large network is a particularly compute and data intensive. Hence it makes sense to delegate this responsibility to a third party compute infrastructure like the cloud services. Due to the temporal and spatial aspects of spectrum occupancy, the area of global spectrum decision is usually small. Hence there are large number of networks and hence more network and resource management. With cloud and our proposed algorithm a single compute entity will be able to capture spatial aspects of spectrum occupancy for a larger network (concept of rings). Hence we reduce network management and spectrum decision costs.

Assumptions Mobile devices may use cellular wireless network to access the cloud, while communication over a Wi-Fi channel is based on an infrastructure cognitive radio network. Completely low power devices may employ a multi-hop mechanism to reach the cellular tower which has a backhaul link to internet thus connecting the end CR devices with cloud. Malicious nodes modify spectrum occupancy information sensed at its location. It is called Spectrum sensing data falsification (SSDF). The fraction of malicious nodes are less than the honest nodes and are uniformly distributed. The malicious nodes vary their attack intensities in order to disguise their behavior. Similar pattern or high attack intensities are easier to detect. Each primary tower transmits on a single channel denoted by k. Locations of each primary tower is known to the cloud computing infrastructure. Since the network is large, the opinion on a same channel for two honest nodes may be different with some probability of error. Secondary cognitive nodes don’t share locations. The cellular towers detect location using triangulation and communicate with the cloud. It avoids location falsification. Location change is communicated to cloud only when there is a change.

Cloud Black Box The cloud inputs - The locations of secondary nodes whose trusts need to computed. - The advertised binary spectrum occupancy report of each node. - The locations of primary towers and the channels on which it transmits. The cloud output - Trusts of each node which is a value between 0 and 1. - A history of trust of each node. Procedure o Get the predicted decision around the geographical region of a secondary node on each channel k ( around a primary tower). o Compare it with the actual advertisement of that node on that channel. If same record a success else record a failure. o Repeat the same for all channels.

Concept of rings around primary towers

Predict a decision for a node on a channel Based on signal attenuation properties we conceptualize N circular rings, around each primary tower denoted by where. E.g. The ring 1 radius = Each ring has number of nodes. The cloud computes distance between each node i in a ring and the primary tower If distance include node i in Ring 1, else if, in ring 2 and so on. We have a majority voting status for channel k on each ring around - votes for decision zero - votes for decision one Where is the status channel k reported by the i-th node. The above equation given the majority voting criterion.

Accumulation of trust evidence Match each with ( the majority ring decision matched with individual decision) – If it’s a match, treat as a success to achieve trust and increment success count – Else treat as a failure to achieve trust and increment failure count We get success or failure count against each node on channel k around primary transmitting on channel k. Repeat the same procedure for all primary towers and get total number of success and failure counts on all the channels of the operating spectrum.

Trust Metric and Update The trust of any given node i in the network on time slot is given as The trusts are updated as Where is an exponentially decaying factor is the trust from the previous time slot

Implementation We implement the algorithm with Amazon ec2 and S3 service with worker instances that generates trust evidence and master instances that accumulates observations from workers and combines them and processes the final trust map. We use SPMD –single program multiple data concept, where we partition the input data on which the program/algorithm works. Hence the program is same for each cloud instance and the input data is different. We simulate 200 nodes and 36 nodes being malicious. Each worker instance is responsible for calculation of 1/4 th of the total number of channels. We consider 80 channels and 4 worker instances so each gets a share of k=20 channels. Each worker instance generates match and mismatch observation counts based on the algorithm for 100 time slots, where in each time slot the malicious nodes behave differently by attacking the system with a different intensity of attack. The observation/trust evidence accumulated is merged, and trusts are calculated for each node and on every slot. Eventually we plot the average trusts of honest and malicious nodes

Problem Partitioning K = total channels Instance 1 Instance 2 Instance 3Instance 4 0 to K/4K/4 to K/2 K/2 to 3K/43K/4 to K

Cloud Implementation Architecture

Program Name in each worker instance – main_mal3.c File name in each instance – for_compute*.txt – the file which contains the data unique to instance no *. Contains information primaries that relevant to instance *. Other data files like locations of primary towers, secondary nodes, intensity of attack on each slot are common for all worker instance The worker’s number * generate results named out_node*.txt which are stored in s3 bucket. The controller/master instance gathers all the outputs from the s3 bucket, and combines the observations using combine_observations.c. Final_trust.c generates trusts on each slots for each node. Plot_node.c differentiate between honest nodes trust values and malicious node trust values. Reverse SCP the final two outputs of average trust of honest and malicious nodes and plot it with matlab.

Trust Distribution between Malicious and Honest Nodes

Instantaneous trusts on each slot – for malicious node

Application of trusts metrics Based on the trust metrics the channel allocation authority may deny allocation of channels to those nodes whose trusts are less than some threshold. This improves spectrum utilization and goodput. The trustworthiness can be used as a routing metric in a multi-hop ad hoc network. The ad-hoc networks generally have devices with low power, and in regions with lesser cellular infrastructure. Hence it is often impractical for nodes to reach the tower for backhaul to the internet. However, reports on locally sensed spectrum may be relayed in a multi-hop manner to nodes nearer to the tower. In this way the nodes are able to communicate with cloud. The cloud provides an immediate trust neighborhood of each node, which can be used for routing.

Future work Increase the number of nodes Keep the number of nodes same and increase the fraction of malicious nodes

QUESTIONS?