Adaptive frequency-domain CFAR for robust spectrum sensing under jamming and administrator-controlled counter-access

自适应频域CFAR算法可在干扰和管理员控制的反接入条件下实现稳健的频谱感知

阅读:1

Abstract

Cognitive radio networks (CRN) enable secondary users (SUs) to opportunistically access underutilized licensed spectrum while protecting primary users (PUs) from interference. However, robust spectrum sensing under heterogeneous interference and noise uncertainty remains challenging. Conventional energy detection, matched filtering, and cyclostationary approaches either require extensive prior knowledge or degrade under interference, leading to excessive false alarms and service denial. We propose an adaptive frequency-domain constant false alarm rate (CFAR) spectrum sensing approach that dynamically sets frequency-specific thresholds based on neighboring spectral samples. This enhancement requires minimal prior knowledge. To address potential security risks from untrusted SUs exploiting this resilience, we introduce a centralized counter-access mechanism: an administrator-controlled jammer that defeats CFAR-equipped adversaries, preventing unauthorized access during emergencies. It safeguards primary communications by creating strategic frequency gaps that avoid known jammed PU channels. Using APCO Project 25 waveforms for PUs, Monte Carlo simulations evaluate cell-averaging (CA), greatest-of (GO), smallest-of (SO), order-statistics (OS), and censored CFAR variants across different channel models combined with multiple jamming scenarios. Results show OS and censored CFAR variants best stabilize false alarm rates and enhance detection in heterogeneous conditions, outperforming CA and GO/SO schemes. The comb-sweep jammer effectively denies service to CFAR-equipped SUs without impacting PUs, though at the expense of reduced spectrum availability. Sensitivity analysis confirms robustness across varied CFAR window configurations, precluding parameter-based evasion by unauthorized SUs. This work frames spectrum sensing and jamming in CRNs as a two-sided interaction between electronic protection for secondary users and administrative electronic attack for controlled denial.

特别声明

1、本页面内容包含部分的内容是基于公开信息的合理引用;引用内容仅为补充信息,不代表本站立场。

2、若认为本页面引用内容涉及侵权,请及时与本站联系,我们将第一时间处理。

3、其他媒体/个人如需使用本页面原创内容,需注明“来源:[生知库]”并获得授权;使用引用内容的,需自行联系原作者获得许可。

4、投稿及合作请联系:info@biocloudy.com。