scispace - formally typeset
Search or ask a question
Author

Majid Khabbazian

Bio: Majid Khabbazian is an academic researcher from University of Alberta. The author has contributed to research in topics: Linear network coding & Wireless network. The author has an hindex of 20, co-authored 76 publications receiving 1404 citations. Previous affiliations of Majid Khabbazian include University of British Columbia & University of Winnipeg.


Papers
More filters
Proceedings ArticleDOI
19 May 2008
TL;DR: Techniques to identify malicious users and mitigate their harmful effect on the performance of the cooperative sensing system are presented.
Abstract: The most important task for a cognitive radio (CR) system is to identify the primary licensed users over a wide range of spectrum Cooperation among spectrum sensing devices has been shown to offer various benefits including decrease in sensitivity requirements of the individual sensing devices However, it has been shown in the literature that the performance of cooperative sensing schemes can be severely degraded due to presence of malicious users sending false sensing data In this paper, we present techniques to identify such malicious users and mitigate their harmful effect on the performance of the cooperative sensing system

241 citations

Journal ArticleDOI
TL;DR: In this article, the authors investigate schemes to identify the malicious users based on outlier detection techniques for a cooperative sensing system employing energy detection at the sensors, considering constraints imposed by the CR scenario such as the lack of information about the primary signal propagation environment and the small size of the sensing data samples.
Abstract: Reliable detection of primary users (PUs) is an important task for cognitive radio (CR) systems. Cooperation among a few spectrum sensors has been shown to offer significant gain in the performance of the CR spectrum-sensing system by countering the shadow-fading effects. We consider a parallel fusion network in which the sensors send their sensing information to an access point which makes the final decision regarding presence or absence of the PU signal. It has been shown in the literature that the presence of malicious users sending false sensing data can severely degrade the performance of such a cooperative sensing system. In this paper, we investigate schemes to identify the malicious users based on outlier detection techniques for a cooperative sensing system employing energy detection at the sensors. We take into consideration constraints imposed by the CR scenario such as the lack of information about the primary signal propagation environment and the small size of the sensing data samples. Considering partial information of the PU activity, we propose a novel method to identify the malicious users. We further propose malicious user detection schemes that take into consideration the spatial information of the CR sensors. The performance of the proposed schemes are studied using simulations.

193 citations

Journal ArticleDOI
TL;DR: This paper shows that a strategic placement of the wormhole when the nodes are uniformly distributed can disrupt/control on average 32% of all communications across the network and proposes a timing-based countermeasure that avoids the deficiencies of existing timing- based solutions.
Abstract: In this paper, we analyze the effect of the wormhole attack on shortest-path routing protocols for wireless ad hoc networks. Using analytical and simulation results, we show that a strategic placement of the wormhole when the nodes are uniformly distributed can disrupt/control on average 32% of all communications across the network. We also analyze a scenario in which several attackers make wormholes between each other and a case where two malicious nodes attack a target node in the network. We show how to evaluate the maximum effect of the wormhole attack on a given network topology. Then, we compute the maximum effect of the wormhole attack on grid topology networks and show that the attackers can disrupt/control around 40% to 50% of all communications when the wormhole is strategically placed in the network. Finally, to defend against the wormhole attack, we propose a timing-based countermeasure that avoids the deficiencies of existing timing-based solutions. Using the proposed countermeasure, the nodes do not need synchronized clocks, nor are they required to predict the sending time or to be capable of fast switching between the receive and send modes. Moreover, the nodes do not need one-to-one communication with all their neighbors and do not require to compute a signature while having to timestamp the message with its transmission time.

106 citations

Journal ArticleDOI
TL;DR: An efficient sender-based flooding algorithm based on 1-hop neighbor information that reduces the time complexity of computing forwarding nodes to O(n) and it is proved that the probability of two neighbor nodes broadcasting the same messageneighbor nodes broadcastingThe same message exponentially decreases when the distance between them decreases or when the node density increases.
Abstract: This paper presents two efficient flooding algorithms based on 1-hop neighbor information. In the first part of the paper, we consider sender-based flooding algorithms, specifically the algorithm proposed by Liu et al. In their paper, Liu et al. propose a sender-based flooding algorithm that can achieve local optimality by selecting the minimum number of forwarding nodes in the lowest computational time complexity O(n logn), where n is the number of neighbors. We show that this optimality only holds for a subclass of sender-based algorithms. We propose an efficient sender-based flooding algorithm based on 1-hop neighbor information that reduces the time complexity of computing forwarding nodes to O(n). In Liu's algorithm, n nodes are selected to forward the message in the worst case, whereas in our proposed algorithm, the number of forwarding nodes in the worst case is 11. In the second part of the paper we propose a simple and highly efficient receiver-based flooding algorithm. When nodes are uniformly distributed, we prove that the probability of two neighbor nodes broadcasting the same messageneighbor nodes broadcasting the same message exponentially decreases when the distance between them decreases or when the node density increases. The analytical results are confirmed using simulation.

82 citations

Journal ArticleDOI
TL;DR: The positive-the authors design a local broadcast algorithm in which the status of each node is decided "on-the-fly” and prove that the algorithm can achieve both full delivery and a constant approximation to the optimum solution.
Abstract: There are two main approaches, static and dynamic, to broadcast algorithms in wireless ad hoc networks. In the static approach, local algorithms determine the status (forwarding/nonforwarding) of each node proactively based on local topology information and a globally known priority function. In this paper, we first show that local broadcast algorithms based on the static approach cannot achieve a good approximation factor to the optimum solution (an NP-hard problem). However, we show that a constant approximation factor is achievable if (relative) position information is available. In the dynamic approach, local algorithms determine the status of each node "on-the-fly” based on local topology information and broadcast state information. Using the dynamic approach, it was recently shown that local broadcast algorithms can achieve a constant approximation factor to the optimum solution when (approximate) position information is available. However, using position information can simplify the problem. Also, in some applications it may not be practical to have position information. Therefore, we wish to know whether local broadcast algorithms based on the dynamic approach can achieve a constant approximation factor without using position information. We answer this question in the positive-we design a local broadcast algorithm in which the status of each node is decided "on-the-fly” and prove that the algorithm can achieve both full delivery and a constant approximation to the optimum solution.

51 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The state-of-the-art survey of cooperative sensing is provided to address the issues of cooperation method, cooperative gain, and cooperation overhead.

1,800 citations

Book ChapterDOI
01 Jan 1997
TL;DR: In this paper, a nonlinear fractional programming problem is considered, where the objective function has a finite optimal value and it is assumed that g(x) + β + 0 for all x ∈ S,S is non-empty.
Abstract: In this chapter we deal with the following nonlinear fractional programming problem: $$P:\mathop{{\max }}\limits_{{x \in s}} q(x) = (f(x) + \alpha )/((x) + \beta )$$ where f, g: R n → R, α, β ∈ R, S ⊆ R n . To simplify things, and without restricting the generality of the problem, it is usually assumed that, g(x) + β + 0 for all x ∈ S,S is non-empty and that the objective function has a finite optimal value.

797 citations

Journal ArticleDOI
28 Apr 2009
TL;DR: These new metrics are used to show that fading uncertainty forces the WPAR performance of single-radio sensing algorithms to be very low for small values of F HI, even for ideal detectors.
Abstract: ldquoSpectrum holesrdquo represent the potential opportunities for noninterfering (safe) use of spectrum and can be considered as multidimensional regions within frequency, time, and space. The main challenge for secondary radio systems is to be able to robustly sense when they are within such a spectrum hole. To allow a unified discussion of the core issues in spectrum sensing, the ldquoweighted probability of area recoveredrdquo (WPAR) metric is introduced to measure the performance of a sensing strategy; and the ldquofear of harmful interferencerdquo F HI metric is introduced to measure its safety. These metrics explicitly consider the impact of asymmetric uncertainties (and misaligned incentives) in the system model. Furthermore, they allow a meaningful comparison of diverse approaches to spectrum sensing unlike the traditional triad of sensitivity, probability of false-alarm P FA, and probability of missed-detection P MD. These new metrics are used to show that fading uncertainty forces the WPAR performance of single-radio sensing algorithms to be very low for small values of F HI, even for ideal detectors. Cooperative sensing algorithms enable a much higher WPAR, but only if users are guaranteed to experience independent fading. Lastly, in-the-field calibration for wide-band (but uncertain) environment variables (e.g., interference and shadowing) can robustly guarantee safety (low F HI) even in the face of potentially correlated users without sacrificing WPAR.

496 citations

Journal ArticleDOI
TL;DR: An optimal power loading algorithm for an OFDM-based cognitive radio (CR) system is investigated and shows that for a given interference threshold, the proposed optimal scheme allows CR base station to transmit more power in order to achieve a higher transmission rate than the classical loading algorithms.
Abstract: In this paper, we investigate an optimal power loading algorithm for an OFDM-based cognitive radio (CR) system. The downlink transmission capacity of the CR user is thereby maximized, while the interference introduced to the primary user (PU) remains within a tolerable range. We also propose two suboptimal loading algorithms that are less complex. We also study the effect of a subcarrier nulling mechanism on the performance of the different algorithms under consideration. The performance of the optimal and suboptimal schemes is compared with the performance of the classical power loading algorithms, e.g., water-filling and uniform power but variable rate loading schemes that are used for conventional OFDM-based systems. Presented numerical results show that for a given interference threshold, the proposed optimal scheme allows CR base station (BS) to transmit more power in order to achieve a higher transmission rate than the classical loading algorithms. These results also show that although the proposed suboptimal schemes have certain degradation in performance compared to the optimal scheme, they outperform the classical loading algorithms. We also present numerical results for nulling mechanism. Finally, we investigate the effect of imperfect channel gain information at the transmitter.

440 citations

Journal ArticleDOI
TL;DR: The scope of this work is to give an overview of the security threats and challenges that cognitive radios and cognitive radio networks face, along with the current state-of-the-art to detect the corresponding attacks.
Abstract: With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. The allocation of the Industrial, Medical and Scientific (ISM) band has enabled the explosion of new technologies (e.g. Wi-Fi) due to its licence-exempt characteristic. The widespread adoption of Wi-Fi technology, combined with the rapid penetration of smart phones running popular user services (e.g. social online networks) has overcrowded substantially the ISM band. On the other hand, according to a number of recent reports, several parts of the static allocated licensed bands are under-utilized. This has brought up the idea of the opportunistic use of these bands through the, so-called, cognitive radios and cognitive radio networks. Cognitive radios have enabled the opportunity to transmit in several licensed bands without causing harmful interference to licensed users. Along with the realization of cognitive radios, new security threats have been raised. Adversaries can exploit several vulnerabilities of this new technology and cause severe performance degradation. Security threats are mainly related to two fundamental characteristics of cognitive radios: cognitive capability, and reconfigurability. Threats related to the cognitive capability include attacks launched by adversaries that mimic primary transmitters, and transmission of false observations related to spectrum sensing. Reconfiguration can be exploited by attackers through the use of malicious code installed in cognitive radios. Furthermore, as cognitive radio networks are wireless in nature, they face all classic threats present in the conventional wireless networks. The scope of this work is to give an overview of the security threats and challenges that cognitive radios and cognitive radio networks face, along with the current state-of-the-art to detect the corresponding attacks. In addition, future challenges are addressed.

434 citations