Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access

Debarun Das, Taieb Znati, Martin B.H. Weiss

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Success of dynamic spectrum access depends on automated enforcement of spectrum access policies. To this end, we undertake a crowdsourced approach to spectrum monitoring. In this paper, we focus on robust and reliable detection of unauthorized spectrum access over prolonged intervals of time. For this purpose, we propose a framework that is primarily driven by efficient spectrum sampling and reputation management of crowdsourced spectrum monitoring agents. This is to ensure robustness and success in detecting and catching intruders consistently. Simulation results indicate that our proposed scheme performs successfully to catch intruders across all the spectrum monitoring epochs, against varying intruder profiles, sensing failure rates and trustworthiness of crowdsourced monitoring agents.

Original languageEnglish
Title of host publicationMILCOM 2022 - 2022 IEEE Military Communications Conference
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages729-734
Number of pages6
ISBN (Electronic)9781665485340
DOIs
Publication statusPublished - 2022
Externally publishedYes
Event2022 IEEE Military Communications Conference, MILCOM 2022 - Rockville, United States
Duration: Nov 28 2022Dec 2 2022

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM
Volume2022-November

Conference

Conference2022 IEEE Military Communications Conference, MILCOM 2022
Country/TerritoryUnited States
CityRockville
Period11/28/2212/2/22

Keywords

  • crowdsourced spectrum enforcement
  • dynamic spectrum access
  • reputation
  • spectrum sampling

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access'. Together they form a unique fingerprint.

Cite this