Spectrum sensing falsification detection in dense cognitive radio networks
10812512 ยท 2020-10-20
Assignee
Inventors
Cpc classification
H04K1/04
ELECTRICITY
H04K3/65
ELECTRICITY
International classification
G08B23/00
PHYSICS
G06F12/14
PHYSICS
Abstract
Systems and associated methods for detecting a set of spectrum sensing falsification (SSF) attacks in a geographic database (GDB) driven cognitive radio (CR) system. Viewing the GDB as a type of non-orthogonal compressive sensing (CS) dictionary, the composite power spectral density (PSD) estimate at a candidate CR is approximated by a small number of sensor nodes listed in the GDB. In a dense CR network, the PSD estimate at a CR may contain a composite mixture of spectrally overlapping signals. An implementation of an optimized, greedy algorithm orthogonal matching pursuit (OMP) returns a set of sensor nodes which are suspected to be in the vicinity of the CR. A sufficient match between the PSD estimate reported by a candidate CR and the PSD that is sparsely approximated from the SNs in its area provides confidence (trust) metrics which may be used to detect potential SSF attacks.
Claims
1. A spectrum sensing falsification detection (SSFD) system characterized by a computer processor and by a non-transitory computer-readable storage medium comprising a plurality of instructions defining the system comprising an optimizing subsystem and a matching subsystem which, when executed by the computer processor, the system is configured to: record to a geographic database (GDB), using the optimizing subsystem, a respective spectrum report and a respective location associated with each of a plurality of trusted sensor nodes (SNs) each associated with a respective sensitivity region of a cognitive radio network (CRN); receive a spectrum request, using the optimizing subsystem, originating from a first subset of the plurality of trusted SNs, defined as local SNs, and associated with a candidate cognitive radio (CR), defined as one of a plurality of secondary user (SU) cognitive radio (CR) emitters each positioned within at least one of the plurality of sensitivity regions; record, using the matching subsystem, a respective SN identifier (ID) for each of the local SNs to define a set S.sub.TRUE; create, using the optimizing subsystem, a pseudorandom sensing matrix from the GDB; receive, using the optimizing subsystem, a compressed spectrum report comprising a local spectrum for the candidate CR as compressed using the pseudorandom sensing matrix, and originating from a second subset of the plurality of trusted SNs defined as test SNs; record, using the optimizing subsystem, a respective SN identifier (ID) for each of the test SNs to define a set S.sub.EST; detect, using the matching subsystem, match between the respective spectra associated with the set S.sub.TRUE and the set S.sub.EST as recorded in the GDB to identify a third subset of the plurality of trusted SNs defined as matched SNs; record, using the matching subsystem, a respective SN identifier (ID) for each of the matched SNs to define a set S.sub.MATCH; and determine, using the matching subsystem, a cardinality of the set S.sub.MATCH to define a matched sensors metric .sub.MATCH.
2. The system according to claim 1, where the plurality of instructions, when executed by the computer processor, further configure the system to determine, using the matching subsystem, a difference between a first reconstruction using S.sub.MATCH and a second reconstruction using S.sub.TRUE to define a reconstruction error metric .sub.RECON.
3. The system according to claim 2, where the plurality of instructions, when executed by the computer processor, further configure the system to: record, using the optimizing subsystem, a respective correlation sign for each of the set S.sub.EST; detect, using the matching subsystem, negative correlation events in the correlation signs associated with the set S.sub.MATCH as recorded in the GDB to identify a fifth subset of the plurality of trusted SNs to define a set S.sub.NEG; determine, using the matching subsystem, a cardinality of the set S.sub.NEG to define a negative correlations metric .sub.NEG; and divide, using the matching subsystem, the negative correlations metric .sub.NEG by the matched sensors metric .sub.MATCH to define a correlation sign metric .sub.SIGN.
4. The system according to claim 2, where the plurality of instructions, when executed by the computer processor, further define the system comprising a reporting subsystem and further configure the system to detect, using the matching subsystem, a location falsification condition in the matched sensors metric .sub.MATCH and the reconstruction error metric .sub.RECON, collectively, and to at least one of: reject, using the reporting subsystem, the spectrum request associated with the candidate CR; and flag, using the reporting subsystem, the spectrum request as a spectrum spoofing attack.
5. The system according to claim 3, where the plurality of instructions, when executed by the computer processor, further define the system comprising a reporting subsystem and further configure the system to detect, using the matching subsystem, a negative correlation condition in the matched sensors metric .sub.MATCH, the reconstruction error metric .sub.RECON, and the correlation sign metric .sub.SIGN, collectively, and to at least one of: reject, using the reporting subsystem, the spectrum request associated with the candidate CR; and flag, using the reporting subsystem, the spectrum request as a spectrum inversion attack.
6. The system according to claim 2, where the plurality of instructions, when executed by the computer processor, further define the system comprising a reporting subsystem and further configure the system to detect, using the matching subsystem, a negative correlation condition in the matched sensors metric .sub.MATCH and the reconstruction error metric .sub.RECON, collectively, and to at least one of: reject, using the reporting subsystem, the spectrum request associated with the candidate CR; and flag, using the reporting subsystem, the spectrum request as a spectrum shifting attack.
7. A computer-implemented method of spectrum sensing falsification detection (SSFD) for use with a cognitive radio network (CRN) characterized by a plurality of trusted sensor nodes (SNs) each associated with a respective sensitivity region, and a plurality of secondary user (SU) cognitive radio (CR) emitters each positioned within at least one of the plurality of sensitivity regions; the method comprising: recording to a geographic database (GDB) a respective spectrum report and a respective location associated with each of the plurality of trusted SNs; receiving a spectrum request associated with one of the plurality of SU CR emitters defined as a candidate cognitive radio (CR) and originating from a first subset of the plurality of trusted SNs defined as local SNs; recording a respective SN identifier (ID) for each of the local SNs to define a set S.sub.TRUE; creating a pseudorandom sensing matrix from the GDB; receiving a compressed spectrum report comprising a local spectrum for the candidate CR as compressed using the pseudorandom sensing matrix, and originating from a second subset of the plurality of trusted SNs defined as test SNs; recording a respective SN identifier (ID) for each of the test SNs to define a set S.sub.EST; detecting match between the respective spectra associated with the set S.sub.TRUE and the set S.sub.EST as recorded in the GDB to identify a third subset of the plurality of trusted SNs defined as matched SNs; recording a respective SN identifier (ID) for each of the matched SNs to define a set S.sub.MATCH; and determining a cardinality of the set S.sub.MATCH to define a matched sensors metric .sub.MATCH.
8. The method according to claim 7, further comprising determining a difference between a first reconstruction using S.sub.MATCH and a second reconstruction using S.sub.TRUE to define a reconstruction error metric .sub.RECON.
9. The method according to claim 8, further comprising: recording a respective correlation sign for each of the set S.sub.EST; detecting negative correlation events in the correlation signs associated with the set S.sub.MATCH as recorded in the GDB to identify a fifth subset of the plurality of trusted SNs to define a set S.sub.NEG; determining a cardinality of the set S.sub.NEG to define a negative correlations metric .sub.NEG; and dividing the negative correlations metric .sub.NEG by the matched sensors metric .sub.MATCH to define a correlation sign metric .sub.SIGN.
10. The method according to claim 8, further comprising detecting a location falsification condition in the matched sensors metric .sub.MATCH and the reconstruction error metric .sub.RECON, collectively, and at least one of: rejecting the spectrum request associated with the candidate CR; and flagging the spectrum request as a spectrum spoofing attack.
11. The method according to claim 9, further comprising detecting a negative correlation condition in the matched sensors metric .sub.MATCH, the reconstruction error metric .sub.RECON, and the correlation sign metric .sub.SIGN, collectively, and at least one of: rejecting the spectrum request associated with the candidate CR; and flagging the spectrum request as a spectrum inversion attack.
12. The method according to claim 8, further comprising detecting a negative correlation condition in the matched sensors metric .sub.MATCH and the reconstruction error metric .sub.RECON, collectively, and at least one of: rejecting the spectrum request associated with the candidate CR; and flagging the spectrum request as a spectrum shifting attack.
13. A method of spectrum sensing falsification detection (SSFD), comprising: receiving a spectrum request associated with one of a plurality of SU CR emitters defined as a candidate cognitive radio (CR) and originating from a first subset of a plurality of trusted SNs defined as local SNs; defining a set S.sub.TRUE to comprise a respective SN identifier (ID) for each of the local SNs; creating a pseudorandom sensing matrix from a collection of a respective spectrum report and a respective location associated with each of the plurality of trusted SNs; receiving a compressed spectrum report comprising a local spectrum for the candidate CR as compressed using the pseudorandom sensing matrix, and originating from a second subset of the plurality of trusted SNs defined as test SNs; defining a set S.sub.EST to comprise a respective SN identifier (ID) for each of the test SNs; detecting match in the collection between the respective spectra associated with the set S.sub.TRUE and the set S.sub.EST to identify a third subset of the plurality of trusted SNs defined as matched SNs; defining a set S.sub.MATCH to comprise a respective SN identifier (ID) for each of the matched SNs; and determining a cardinality of the set S.sub.MATCH to define a matched sensors metric .sub.MATCH.
14. The method according to claim 13, further comprising: determining a difference between a first reconstruction using S.sub.MATCH and a second reconstruction using S.sub.TRUE to define a reconstruction error metric .sub.RECON.
15. The method according to claim 14, further comprising: detecting negative correlation events in a respective correlation signs associated with the set S.sub.MATCH to identify a fifth subset of the plurality of trusted SNs to define a set S.sub.NEG; determining a cardinality of the set S.sub.NEG to define a negative correlations metric .sub.NEG; and dividing the negative correlations metric .sub.NEG by the matched sensors metric .sub.MATCH to define a correlation sign metric .sub.SIGN.
16. The method according to claim 14, further comprising detecting a location falsification condition in the matched sensors metric .sub.MATCH and the reconstruction error metric .sub.RECON, collectively, and at least one of: rejecting the spectrum request associated with the candidate CR; and flagging the spectrum request as a spectrum spoofing attack.
17. The method according to claim 15, further comprising detecting a negative correlation condition in the matched sensors metric .sub.MATCH, the reconstruction error metric .sub.RECON, and the correlation sign metric .sub.SIGN, collectively, and at least one of: rejecting the spectrum request associated with the candidate CR; and flagging the spectrum request as a spectrum inversion attack.
18. The method according to claim 14, further comprising detecting a negative correlation condition in the matched sensors metric .sub.MATCH and the reconstruction error metric .sub.RECON, collectively, and at least one of: rejecting the spectrum request associated with the candidate CR; and flagging the spectrum request as a spectrum shifting attack.
19. An improved cognitive radio network (CRN) having spectrum sensing falsification detection (SSFD), comprising: a plurality of trusted sensor nodes (SNs) each associated with a respective sensitivity region of the CRN; a plurality of secondary user (SU) cognitive radio (CR) emitters each positioned within at least one of the plurality of sensitivity regions; and a fusion center (FC) having a computer processor and computer-implementable instructions, said computer-implementable instructions being stored on a non-transitory medium which, when executed by said computer processor, configure the FC to: record to a geographic database (GDB) a respective spectrum report and a respective location associated with each of the plurality of trusted SNs; receive a spectrum request associated with one of the plurality of SU CR emitters defined as a candidate cognitive radio (CR) and originating from a first subset of the plurality of trusted SNs defined as local SNs; record a respective SN identifier (ID) for each of the local SNs to define a set S.sub.TRUE; create a pseudorandom sensing matrix from the GDB; receive a compressed spectrum report comprising a local spectrum for the candidate CR as compressed using the pseudorandom sensing matrix, and originating from a second subset of the plurality of trusted SNs defined as test SNs; record a respective SN identifier (ID) for each of the test SNs to define a set S.sub.EST; detect match between the respective spectra associated with the set S.sub.TRUE and the set S.sub.EST as recorded in the GDB to identify a third subset of the plurality of trusted SNs defined as matched SNs; record a respective SN identifier (ID) for each of the matched SNs to define a set S.sub.MATCH; and determine a cardinality of the set S.sub.MATCH to define a matched sensors metric .sub.MATCH.
20. The improved cognitive radio network (CRN) according to claim 19, where the plurality of instructions, when executed by the computer processor, further configure the FC to determine a difference between a first reconstruction using S.sub.MATCH and a second reconstruction using S.sub.TRUE to define a reconstruction error metric .sub.RECON.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The accompanying drawings provide visual representations which will be used to more fully describe various representative embodiments and can be used by those skilled in the art to better understand the representative embodiments disclosed and their inherent advantages. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the devices, systems, and methods described herein. In these drawings, like reference numerals may identify corresponding elements.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
DETAILED DESCRIPTION
(11) Specific embodiments of the disclosure will now be described in detail with reference to the accompanying figures. While this invention is susceptible of being embodied in many different forms, there is shown in the drawings and will herein be described in detail specific embodiments, with the understanding that the present disclosure is to be considered as an example of the principles of the invention and not intended to limit the invention to the specific embodiments shown and described. In the description below, like reference numerals may be used to describe the same, similar or corresponding parts in the several views of the drawings.
(12) The present disclosure relates generally to systems and associated methods of employing a variant of orthogonal matching pursuit (OMP) to detect spectrum sensing falsification (SSF) attacks in the reported spectrum of a requesting CR. The disclosed OMP variant may be used to de-mix the composite reported spectrum and to use spectrum reports from sensor nodes (SNs) with overlapped coverage regions to reconstruct the reported spectrum as a linear combination of SN reports. The number of trusted SNs utilized by the present method is taken to be much less than the total number of emitters in the coverage area of interest. Also, the Fusion Center (FC) is presumed to know the geographic location of the SNs (e.g. through GPS or other means).
(13) Sparsity in the context of this disclosure translates to the relatively few SNs that may be needed to approximate the reported spectrum of an honest CR. Traditional CS utilizes a randomly-generated sensing matrix to achieve the desired compression without distorting the orthonormal basis (ONB) dictionary. In certain embodiments of the present SSFD method, sensing matrix optimization may be applied which strives to orthogonalize the non-orthogonal GDB dictionary. In addition, the disclosed sensing matrix may be chosen with pseudorandom components, which may provide some level of anonymity for the candidate CR. The resulting disclosed sensing matrix may act to simultaneously deliver one or more of the following advantages:
(14) 1) Obfuscate the spectrum of a candidate CR from other users;
(15) 2) Compressively reduce the communications overhead of having to report the spectrum to the FC;
(16) 3) Reduce the computational burden of OMP; and
(17) 4) Optimally separate the non-orthogonal components of the GDB dictionary
(18) One embodiment of the present disclosure, for example, and without limitation, may comprise a software process that may operate in collaboration with FC control operations known in the art. A candidate CR may broadcast a spectrum request to a relatively small number of SNs in its area, which may collaboratively forward the request to the FC. Once the FC receives the spectrum request, the present computer-implemented method may then generate a pseudo-random sensing matrix and forward it to the candidate CR requesting the spectrum. The CR may sense its local spectrum, compress it using the sensing matrix from the FC, and send the compressed spectrum to the SNs which may then forward the compressed spectrum to the FC. The FC may then compare the reported spectrum to the spectrum in the GDB and ascertain if the latter matches up with the spectrum reported from the SNs that are local to the candidate CR. The extent to which the spectrum matches other local SNs may be interpreted as a trust metric for the candidate CR. If the spectrum matches with multiple other SNs in the coverage area far away from SNs which initially received the spectrum request, then the location of the candidate CR, as well as its intent, comes into question.
(19) Operating on a compressed PSD via multiplication with a pseudorandom matrix may advantageously reduce the PSD reconstruction complexity and reduce network traffic load while simultaneously providing some obfuscation of the GDB. Spectrum report obfuscation may advantageously protect against a third party inferring the users' spectrum. The method used to match spectrum reported from the candidate CR and SN spectrum must be robust to differences in frequency support due to possibly stale entries in the GDB, as well as the possible blockage of emitters to the CR via obstructions or terrain. Utilizing an optimal sensing matrix may advantageously increase the robustness of the disclosed method to such discrepancies.
(20) The method presented herein matches a receiver's PSD to the joint frequency pattern sensed by a small number of local SNs close to the receiver. Many active transmitters may exist, but the number of spectrum reports from trusted nodes that are required to adequately approximate the candidate CRs estimated PSD is assumed sparse. The PSD reported over a finite set of channels (whether occupied by other SUs or the PU itself) may be used as a feature vector to assess the candidate CR.
(21) The block diagram of
(22) Continuing to refer to
(23) For example, and without limitation, the computerized instructions of the SSFD system 300 may be configured to implement an Optimizing Subsystem 310 which may be stored in the data store 213 and retrieved by the processor 212 for execution. The Optimizing Subsystem 310 may be operable to process, using sensing matrix optimization, spectrum requests received from the CRN 200, and to maintain a geographic database (GBD) as modified by the aforementioned processes. Also for example, and without limitation, the computerized instructions of the SSFD system 300 may be configured to implement a Matching Subsystem 320 which may be stored in the data store 213 and retrieved by the processor 212 for execution. The Matching Subsystem 320 may be operable to compare reported spectrum to spectrum in the GDB to compute trust metrics (e.g., quantifying the extent to which the spectrum matches that reported from SNs that are local to the candidate CR). Also for example, and without limitation, the computerized instructions of the SSFD system 300 may be configured to implement a Reporting Subsystem 330 which may be stored in the data store 213 and retrieved by the processor 212 for execution. The Reporting Subsystem 330 may be operable to flag and/or act upon the trust metrics for a given spectrum request (e.g., generate automatic denial and/or mitigation of suspected malicious activity).
(24) Those skilled in the art will appreciate that the present disclosure contemplates the use of computer instructions and/or systems configurations that may perform any or all of the operations involved in SSF detection in a CRN. The disclosure of computer instructions that include Optimizing Subsystem 310 instructions, Matching Subsystem 320 instructions, and Reporting Subsystem 330 instructions is not meant to be limiting in any way. Also, the disclosure of systems configurations that include Fusion Center 210 is not meant to be limiting in any way. Those skilled in the art will readily appreciate that stored computer instructions and/or systems configurations may be configured in any way while still accomplishing the many goals, features and advantages according to the present disclosure.
(25) Referring again to .sup.N.sup.
.sup.N.
(26) Define the number of RF emitters in the coverage area (CA) as N.sub.e. The power received at the candidate CR due to the i.sup.th emitter is denoted as L.sub.iP.sub.T,i where P.sub.T,i represents the power transmitted from the i.sup.th emitter and L.sub.i represents the signal loss incurred as the signal travels from the i.sup.th emitter to the candidate CR. Let N.sub.E,CR represent the number of emitters whose signal arrives at the candidate CR above a certain power threshold P.sub.thresh, where N.sub.E,CR<N.sub.e.
(27) The power measured at the candidate CR.sub.P.sub.
p.sub.CR=.sub.i=1.sup.N.sup.
where n is the noise vector for a zero-mean additive white Gaussian noise (AWGN) channel. The present disclosure assumes equal transmit power for all emitters.
(28) In a manner similar to that of the candidate CR, let P.sub.SN,j be a column vector containing digital RSS measurements made by the j.sup.th SN at a sampling rate of F.sub.S. Define P.sub.SN,j.sup.N.sup.
.sup.N. For M SNs scattered throughout the CA, j[1, M].
(29) The system collaboratively forwards each spectrum report to the FC where all M channelized spectrum profiles .sub.j are collected into a matrix .sub.j.sup.NM representing the GDB 412. The j.sup.th column of is .sub.j and represents the channelized power spectrum measured at the j.sup.th SN
=[.sub.1 . . . .sub.M].
(30) The disclosed approach involves sparsely approximating the channelized spectrum profile x from the candidate CR (i.e., linearly combining a small fraction of the total number of SN spectrum profiles .sub.j to approximate x). The approximation of x is denoted {circumflex over (x)} and can be represented as
{circumflex over (x)}=s,
where s is a k-sparse vector of coefficients, whose magnitude and locations are to be estimated. The approach is to find the best k-term approximation of x in terms of the sparsity of the coefficient s and the Euclidean distance to x. The optimization is formulated as
(31)
(32) Referring now to
(33)
(34) The effective (or projected dictionary) is the compressed dictionary given by A=. The Gram matrix of the effective dictionary is
G.sub.A=A.sup.T A.
(35) A single measure of atomic separation often used is the Frobenius norm of the off-diagonal elements of the effective dictionary's Gram matrix. While various iterative schemes known in the art have been proposed to find an optimal for a given , a useful known method has derived a general closed-form expression for the optimal sensing matrix in terms of the singular values and left-singular vectors of the dictionary
(36)
where U.sup.mxm, V.sub.11.sup.T
.sup.
(37) In one embodiment of applying optimal sensing matrix design to the GDB 412, the FC 210 may generate a pseudo-random orthonormal matrix U, and then perform a singular-value decomposition (SVD) on the GDB 412. The singular values and left-singular vectors returned may then be used to compute an optimal sensing matrix for the GDB 412 which may then be passed to a candidate CR. The candidate CR may then sense its local spectrum, compute the spectrum profile, and transform it by the optimal sensing matrix. The candidate CR then may forward the compressed and obfuscated measurements to the FC 210. With this approach, the SUs channel usage information may be masked in two ways: 1) Pseudo-random Matrix Multiplication, and 2) Non-Invertible Dimensionality Reduction.
(38) Certain methods known in the art for optimal sensing matrix design use a common so-called pre-processing step that acts to orthogonalize the effective dictionary A=. The pre-processing calls for first finding the Moore-Penrose pseudoinverse of A, denoted as A.sup.+. Next an orthogonal basis is found for the range of A.sup.T. Next, the effective matrix is pre-multiplied by T=QA.sup.+, where Q=orth(A.sup.T).sup.T. The processed effective matrix is then
A.sub.proc=TA=QA.sup.+.
(39) When orthogonalized, the compressed measurements y=Ax become
y=A.sub.procAx
=QA.sup.+Ax
=Qx.
(40) Now the rows of Q form an orthogonal basis and therefore Q satisfies the restricted isometry property (RIP).
(41) Still referring to
(42) For example, and without limitation, let the IDs of the SNs in the vicinity of the candidate CR 202 that received the initial spectrum request be collected in a set denoted as S.sub.TRUE 230. Let the set of IDs returned from the OMP process be represented by S.sub.EST415. The matched sensor set S.sub.MATCH 423 may be defined as the intersection 422 of the set S.sub.TRUE 230 and S.sub.EST 415 and may be written as
S.sub.MATCH=S.sub.TRUES.sub.EST.
(43) The cardinality 424 of the matched set 423 may then be defined as
.sub.MATCH=# (S.sub.MATCH).
(44) The quantity .sub.MATCH 440 may be used as a primary detection metric. This matched sensors metric .sub.MATCH 440 may represent the number of SN IDs that lie in the intersection of the sets S.sub.TRUE 230 and S.sub.EST 415.
(45) Building upon .sub.MATCH 440, a second SSF detection metric may be formed by ascertaining whether the reported spectrum correlates positively or negatively with the atoms in the GDB 412. Even if S.sub.MATCH 423 contains relatively many SN IDs, indicating a relatively high correlation, an inverted SSF attack may be occurring.
(46) If a high .sub.MATCH 440 is observed under the condition that many of the matches were made under a negative correlation, then this may indicate the presence of an inverted spectrum attack. To detect spectrum inversion, the second metric, the reconstruction error metric (.sub.RECON) 450, may be computed. .sub.RECON 450 may be found by comparing a first reconstruction 432 formed from the atoms identified in the matching process (as listed in S.sub.MATCH 423) with a second reconstruction 434 formed from the atoms (SNs) in the GDB 412 that are known to be local to the CR (as identified in S.sub.TRUE 230). The difference 436 between the reconstructed SN spectrum 432 (returned from OMP) and the true spectrum 434 (reported by the trusted SNs known to be in the immediate vicinity of the CR), is the reconstruction error metric (.sub.RECON) 450 and may be used as a detection metric for both spectrum shifting and location falsification.
(47) Lastly, looking only at the correlation sign of the atoms that are matched during the CS-OPT process 414 may advantageously detect the presence of spectrum inversion. For example, and without limitation, the CS-OPT algorithm 414 may be configured to capture the sign 417 of the correlation and to reliably detect such spectral inversion attacks using OMP. OMP algorithms employed in designs known in the art typically use the absolute value or square of the correlation, which disregards the sign of the correlation. In order to capture the negativity of the correlation made during OMP, the optimized OMP algorithm 414 of the present disclosure may be modified to store the sign 417 of the correlation made during the OMP matching process. The result is that for each index returned in S.sub.EST 415, there is a corresponding binary number indicating the sign S.sub.SIGN 417 that the correlation took when the index was selected during the optimized OMP process 414. However, instead of operating on S.sub.EST 415, the present disclosure is concerned only with those indices that are known to match the set of true SN indices, and therefore work with those in the matched index set S.sub.MATCH 423. A metric .sub.SIGN 460 to measure the number of negatively correlated atoms selected during OMP may be formulated by counting the total number of negative correlations 426 occurring in S.sub.MATCH 423 and comparing it to the cardinality of the index set, calculated as
(48)
where S.sub.MATCH 423 and .sub.MATCH 440 are as defined above.
(49) It will be appreciated that the systems and methods described above are set forth by way of example and not of limitation. Absent an explicit indication to the contrary, the disclosed steps may be modified, supplemented, omitted, and/or re-ordered without departing from the scope of this disclosure. Numerous variations, additions, omissions, and other modifications will be apparent to one of ordinary skill in the art. In addition, the order or presentation of method steps in the description and drawings above is not intended to require this order of performing the recited steps unless a particular order is expressly required or otherwise clear from the context.
(50) Embodiments disclosed herein may include computer program products comprising computer-executable code or computer-usable code that, when executing on one or more computing devices, performs any and/or all of the steps thereof. The code may be stored in a non-transitory fashion in a computer memory, which may be a memory from which the program executes (such as random-access memory associated with a processor), or a storage device such as a disk drive, flash memory or any other optical, electromagnetic, magnetic, infrared or other device or combination of devices. In another implementation, any of the systems and methods described above may be embodied in any suitable transmission or propagation medium carrying computer-executable code and/or any inputs or outputs from same.
DRAWING NUMBER KEY
(51) 100 Front-end Processing Chain 102 Radio Frequency (RF) Front End 104 Analog-to-Digital Converter (ADC) 106 Spectrum Estimation Component 108 Combining & Thresholding Component 115 Receiving (Rx) Antenna 125 Spectrum Report 200 Cognitive Radio Network (CRN) 202 Candidate Cognitive Radio (CR) 204 Secondary User (SU) CR Emitter 206 Trusted Sensor Node (SN) 208 SN Sensitivity Region 210 Fusion Center (FC) 212 Processor 213 Data Store 219 Network Interface 220 Set: All Spectrum Reports In Coverage Area 230 Set: IDs of SNs Sensing Spectrum Request (S.sub.TRUE) 300 Spectrum Sensing Falsification Detection (SSFD) System 310 Optimizing Subsystem 320 Matching Subsystem 330 Reporting Subsystem 400 Functional Schematic DiagramSSFD Deployment 402 Sensor Node (SN) Request Reporting (SN IDs) 412 Geographical Database (GDB) 414 Compressive Sensing (CS) with Optimized Sensing Matrix 415 Set: IDs of SNs Returned From CS-OPT (S.sub.EST) 417 Set: Signs of SNs Returned From CS-OPT (S.sub.SIGN) 422 Operation: Intersection of S.sub.TRUE and S.sub.EST 423 Set: From Intersection of S.sub.TRUE and S.sub.EST (S.sub.MATCH) 424 Operation: Cardinality of S.sub.MATCH 426 Operation: Count Negative Correlations In S.sub.MATCH 432 Operation: Reconstruction of SNs In S.sub.MATCH 434 Operation: Reconstruction of SNs In S.sub.TRUE 436 Operation: Difference Of S.sub.MATCH & S.sub.TRUE Reconstructions 440 Scalar: From Cardinality of S.sub.MATCH (.sub.MATCH) 450 Scalar: From Difference Of Reconstructions (.sub.RECON) 460 Scalar: From Negatives Count In S.sub.MATCH (.sub.SIGN) 500 Graph: Spectrum Inversion Example 600 Graph: Spectrum Shifting Example