This letter proposes a higher order moments-based spectrum sensing method for detecting unauthorized accesses in underlay cognitive satellite communication networks. Exploiting the second, fourth and sixth-order moments of the received signal, an estimate of the hidden signal power is evaluated. Then, the power estimation of the unauthorized user is used as decision variable to distinguish among the presence or absence of an unauthorized transmission within the satellite communication network. The effectiveness of the proposed algorithm is assessed by simulation. The analyses have shown that it overcomes some recently published techniques failing in detecting hidden users in underlay cognitive satellite communications.
Benedetto, F., Giunta, G., Pallotta, L. (2021). Unauthorized Access Detection in Underlay Cognitive Satellite Networks. IEEE NETWORKING LETTERS, 3(4), 181-185 [10.1109/LNET.2021.3110662].
Unauthorized Access Detection in Underlay Cognitive Satellite Networks
Francesco Benedetto
;Gaetano Giunta;Luca Pallotta
2021-01-01
Abstract
This letter proposes a higher order moments-based spectrum sensing method for detecting unauthorized accesses in underlay cognitive satellite communication networks. Exploiting the second, fourth and sixth-order moments of the received signal, an estimate of the hidden signal power is evaluated. Then, the power estimation of the unauthorized user is used as decision variable to distinguish among the presence or absence of an unauthorized transmission within the satellite communication network. The effectiveness of the proposed algorithm is assessed by simulation. The analyses have shown that it overcomes some recently published techniques failing in detecting hidden users in underlay cognitive satellite communications.File | Dimensione | Formato | |
---|---|---|---|
62_Benedetto_NL_2021_Unauthorized_Access_Detection_in_Underlay.pdf
accesso aperto
Descrizione: Articolo principale
Tipologia:
Documento in Post-print
Licenza:
DRM non definito
Dimensione
674.05 kB
Formato
Adobe PDF
|
674.05 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.