• DocumentCode
    17103
  • Title

    Opportunistic spectrum access: from stochastic channels to non-stochastic channels

  • Author

    Kui Ren ; Qian Wang

  • Author_Institution
    State Univ. of New York At Buffalo, Buffalo, NY, USA
  • Volume
    20
  • Issue
    3
  • fYear
    2013
  • fDate
    Jun-13
  • Firstpage
    128
  • Lastpage
    135
  • Abstract
    Opportunistic spectrum access (OSA), which is considered as the core technology of hierarchical access model of dynamic spectrum access (DSA), has been extensively researched recently. Most of the existing OSA protocols, albeit theoretically sound with almost optimal performance, have to require the preknowledge of static known distributions under stochastic channels. These assumptions, however, make them impractical for more general application scenarios where channel statistics may not be readily available a priori and channel availabilities cannot be modeled as a stochastic process due to malicious jamming. More seriously, the existing OSA protocols are subject to malicious jamming attacks. That is, a cognitive jammer can always disrupt the legitimate network communication by leveraging the publicly-available channel statistic information to effectively jam the channels and thus lead to serious spectrum underutilization. In this article, we first present an in-depth overview of the existing spectrum sensing and access protocols under stochastic channels, achieving almost optimal performance in jamming- free scenarios. We then analyze the vulnerabilities of these protocols to malicious jamming attacks. Finally, we discuss spectrum sensing and access protocols under non-stochastic channels and show their robustness and resilience against various malicious jamming attacks.
  • Keywords
    access protocols; cognitive radio; stochastic processes; telecommunication security; wireless channels; DSA; OSA protocols; access protocols; channel statistics; cognitive jammer; cognitive radio; core technology; dynamic spectrum access; jamming free scenarios; legitimate network communication; malicious jamming attacks; nonstochastic channels; opportunistic spectrum access; optimal performance; spectrum sensing protocols; spectrum underutilization; static known distributions; stochastic channels; stochastic process; Access protocols; Radio spectrum management; Receivers; Sensors; Stochastic processes; Throughput;
  • fLanguage
    English
  • Journal_Title
    Wireless Communications, IEEE
  • Publisher
    ieee
  • ISSN
    1536-1284
  • Type

    jour

  • DOI
    10.1109/MWC.2013.6549292
  • Filename
    6549292