Towards A Large-Scale Cognitive Radio Network: Testbed, Intensive Computing, Frequency Agility, and Security (Invited Paper) Zhe Chen, Changchun Zhang, Feng Lin, Jingzhi Yu, Xia Li, Yu Song, Raghuram Ranganathan, Nan Guo and Robert C. Qiu Department of Electrical and Computer Engineering, Center for Manufacturing Research, Tennessee Technological University, Cookeville, TN Email: {zchen42, czhang42, flin43, jyu42, xli43, ysong21}@students.tntech.edu, {ranganathan, nguo, rqiu}@tntech.edu

Abstract— Cognitive radio (CR) is a promising technique for improving the efficiency of utilizing the precious radio spectrum. A cognitive radio network (CRN) testbed not only can verify concepts, algorithms, and protocols for CR, but also can reveal practical problems and guide future research. Vision, architecture, intensive computing, frequency band shifting, security, ultra-wideband receiver and potential applications are discussed in this paper. In support of our arguments, experiments and demonstrations are reported as well.

Cloud Computing

I. I NTRODUCTION The advent of cognitive radio (CR) is inevitable [1], [2]. CR is impacting the way of thinking on wireless communications. It is “intelligent” and able to “transform”. Multiple CR nodes can form a cognitive radio network (CRN). A CRN testbed not only can verify concepts, algorithms, and protocols for CR, but also can reveal practical problems and guide future research. In our understanding, a possible trend of CRN would be combining computing capability with generalized machine learning algorithms. Generalized machine learning algorithms refer to those algorithms based on any mathematical tools that can be used for learning purpose. Recent developments of mathematical tools, such as matrix completion and decomposition [3], [4], [5], kernel adaptive filtering [6], [7], [8], have the potentials to be applied to CRN. Moreover, convex optimization [9], [10] would be a must-have powerful tool for CRN. However, all of those tools requires significant computing resources, especially in a real-time environment. Recently, cloud computing has been proposed to provide computing services over the Internet [11]. As shown in Fig. 1, our vision is to connect all the nodes of CRN testbed to the cloud, and let the cloud run high-complexity and delaytolerated algorithms for the nodes of CRN testbed. In this way, the computing burden on the nodes will be greatly reduced. Moreover, algorithm developers are enabled to propose any novel algorithms and evaluate them on the CRN testbed, without having to consider their computing complexities, and implement and optimize them using low-level programming languages. In a word, connecting the nodes of CRN testbed to

Nodes of CRN testbed

Fig. 1.

CRN testbed combining with cloud computing.

Local Network

Fig. 2.

First-phase CRN testbed.

the cloud will reduce the effort in developing the nodes and let algorithm developers focus on inventing new algorithms. On the other hand, combining CRN testbed with cloud computing will form a cyber-physical system. The term cyber-physical system refers to the tight conjoining of and coordination between computational and physical resources [12]. In the first phase of building the CRN testbed, we may not be able to take advantage of cloud computing services over the

Internet. Instead, we connect all the nodes of the CRN testbed to a local network, as shown in Fig. 2. There are also some powerful computers connected to this local network. The local network can be an Ethernet network. In this architecture, the computers in the local network provide computing services to the nodes. Our current nodes of CRN testbed are developed based on wireless open-access research platform (WARP) [13], [14]. WARP is a stand-alone hardware platform. The on-board computing resource comes from a Xilinx Virtex-4 FX100 field programmable gate array (FPGA) with PowerPC processors embedded in the FPGA [15]. The WARP boards can be connected to the local network through standard interfaces, for instance, Gigabit Ethernet. The powerful computers in the local network run softwares like MATLAB [16], monitoring incoming traffic from the nodes, performing corresponding computing tasks, and sending results back to the nodes. From the point of view of the nodes, the computers are just like their hardware accelerators. Challenges in building the first-phase CRN testbed include but not limit to: 1) on-board FPGA coding and debugging for physical layer, 2) on-board FPGA and PowerPC coding for supporting an extra receiving radio frequency (RF) front-end, 3) design and implementation of large-scale CRN protocols, 4) synchronizations among the nodes, 5) connections between nodes and computers, and software supports, 6) quick implementation of algorithms in computers with least time delay, 7) reform of algorithms for supporting parallel computation, 8) system and network debugging and demonstration, 9) management and maintenance of tens of nodes. II. I NTEGRATION OF D ISTRIBUTED C OMPUTING E NGINES A. Motivation of Off-Board Computing Engine Current research on CR involves many novel but complex algorithms for spectrum sensing, cognitive routing, etc. Usually these novel algorithms are complex and not easy to be implemented in FPGA. To handle the computing problem, we propose a distributed computing architecture in which computing-intensive and delay-tolerated tasks are arranged to powerful off-board computing engines. In this architecture, hardware platforms will be responsible for physical layer data acquisition and time-critical tasks. MATLAB is chosen as such a computing engine based on the reasons below: 1) MATLAB is a friendly and easy-to-use tool for algorithm development and verification. 2) There are rich algorithm packages that can be reused to speed up development and verification. For example, CVX, a MATLAB-based modeling system for solving convex optimization problems [17]. 3) Algorithms developed in MATLAB can be directly used in CRN testbed. However, the main challenge of integrating MATLAB as computing engine is the time delay that consists of two parts: time spent on exchanging data between hardware platforms

and MATLAB, and time spent on executing algorithms in MATLAB. Parallel and cloud computing technology can be easily integrated into MATLAB nowadays. Support for graphics processing unit (GPU) is available in MATLAB parallel computing toolbox [18]. MATLAB can also work with commercial cloud computing environment like Amazon Elastic Compute Cloud (Amazon EC2) [19]. MATLAB supports versatile data communications interfaces, including Ethernet, serial port, universal serial bus (USB), etc. The rest of this section mainly discusses the design and test utilizing two kinds of interfaces, i.e., Ethernet and USB/serial port, aiming at reducing the time delay for exchanging data. B. Ethernet Connection between Hardware Platform and MATLAB Ethernet is widely used in telecommunication computing platforms, especially in multi-blades platforms that require carrier grade computing capacity. MATLAB supports transmission control protocol (TCP) / internet protocol (IP) for data exchange, with built-in toolbox or third-party software package. Instrument Control Toolbox, provided by Mathworks Inc., is one of the widely used toolboxes enabling MATLAB and Simulink to support TCP/IP communications. Another similar toolbox called TCP/UDP/IP toolbox [20] is in light weight and still reliable. It provides Socket APIs for TCP or user datagram protocol (UDP) communications. Although this toolbox is developed by a third party, it is easy to be integrated into MATLAB. We use WARP to acquire radio data and implement functional modules of wireless physical layer, like modulation and demodulation. WARP is a full-functional hardware platform in which the Ethernet is used for communicating with MATLAB on personal computer (PC) server. On the WARP Board a 10/100/1000 Mbits Ethernet device is provided [13]. The system on chip (SOC) is implemented in the on-board Virtex-4 FPGA where Xilinx Tri-Mode EMAC Ethernet IP core can be integrated to support Gigabit Ethernet [13]. TCP/IP protocols can be supported by integrating a third-party TCP/IP stack or a self-developed protocol stack, with optimal design on data memory/first-in-first-out (FIFO). We propose a simple working model to implement the computing transaction base on the architecture described above: 1) Static IP addresses are configured on both WARP hardware platform and PC server. Meanwhile, a static route entry needs to be set at PC server. 2) In MATLAB, a TCP or UDP socket is created by the TCP/UDP/IP toolbox [20], to keep listening the input TCP/UDP message at a specified port. UDP is used in our experiment due to less time cost than that of TCP. 3) The computing request is initiated at WARP and sent to MATLAB with user data via UDP stack over the Ethernet interface. A randomly generated identification (ID) is used to label this computing transaction. 4) Once MATLAB receives the UDP data sent from WARP over the specified port, it extracts the data from the

PC USB

Fig. 3.

11

x 10

CP 2102

Serial Controller

Processor

Schematic of the evaluation system.

-3

FPGA detected latency 10

Matlab detected latency

9 8

Latency (s)

UDP packet and sends out a response, tagged with the transaction ID, to WARP over the specified UDP port. 5) The time cost is measured at WARP once it receives the response with expected transaction ID. Our measurement is focused on the time delay on data exchange. In MATLAB, no actual processing algorithm is performed. The test results show that 5 ms is the cost to transfer one full-length UDP packet of 1480 bytes to MATLAB and get the response. With increasing number of user data packets, the time cost increases approximately linearly, e.g., 6 UDP packets cost about 28 ms. The throughput of the data exchange is around 2 Mbps. There is still much space to improve the performance, as our current TCP/IP implementation based on WARP is not optimal. For example, current Ethernet IP core in the Virtex-4 SOC is designed to work in polling mode which has worse performance than interrupt mode.

7 6

C. Serial Port Connection between FPGA and MATLAB

5

In this subsection, a communication method based on serial port is proposed for the connection between FPGA and MATLAB when Ethernet is not available. 1) Hardware Environment: The hardware environment here consists of an FPGA, a MATLAB running PC and a data link between the two components. Based on the connection, MATLAB can receive data from FPGA and send them back after processing. The FPGA communicates with PC using RS-232 serial communication. Unlike other communication method like USB and Ethernet, RS-232 has native MATLAB direct access support. This support can make programming simpler compared to other communication methods, as other communication methods must use user-written drivers to support MATLAB access. Moreover, the corresponding serial transceiver in FPGA is simple. The maximum baud rate of basic RS-232 serial communication is 115200 bps. Some USB-to-universal-asynchronousreceiver/transmitter (UART) bridge controller like CP2102 from Silicon Laboratories can support a baud rate up to 912600 bps. The virtual COM port (VCP) device drivers provided by the chip manufacture allow the bridge controller to appear to MATLAB as a serial port. 2) Software Environment: In our architecture, MATLAB is selected as computing engine. The serial port direct access supported by MATLAB can simplify the design of data transaction. In order to send data to FPGA using serial port, MATLAB establishes an input buffer and an output buffer in PC memory to store the data received from and sent to serial port. Serial port hardware in PC executes the function of sending and receiving data. 3) Latency Detection: The latency of the data communication between MATLAB and FPGA is defined as the time elapsed during which one serial port command is executed by MATLAB and the corresponding serial port hardware finishes the operation. It is crucial because it determines how frequently the data in FPGA can be updated and how frequently MATLAB can get new data from FPGA. To evaluate the latency of the RS-232 serial communication, an evaluation

4 3 2

0

50

100

150

200

250

Trials

Fig. 4.

The latency measured by FPGA and MATLAB.

system is built. An FPGA evaluation board is connected to a MATLAB running PC through a USB connection. A CP2102 USB-to-UART bridge controller is used to convert USB signal to RS-232 serial signal. The baud rate between CP2102 and FPGA is 912600 bps. The schematic of the evaluation system is shown in Fig. 3. Serial controller and processor are modules implemented in FPGA. Other modules are hardware outside FPGA. The serial controller is used to convert serial signal to parallel signal, send them to processor and convert the parallel signal from processor to serial signal. In order to evaluate the latency, the processor simply receives data from serial controller and send them back. A MATLAB program is designed to constantly receive data from FPGA and send them back. There are two methods to detect the latency. One method is to use MATLAB command “tic” and “toc”. They can measure the time elapsed during one section of command lines using stopwatch timer. Another method is to use FPGA to measure the time interval of the starting points of two blocks of data. A finite state machine (FSM) controlled counter is used to detect the time interval. In the first test, a 2 by 2 matrix is transferred. Each entry of the matrix is in signed 8 bits. The serial data format is in 8 data bits, 1 stop bit, and 0 parity bit. The latency measured by FPGA and MATLAB is shown in Fig. 4. The difference of the results is trivial. The average latency is about 3 ms. The latency of the first transmission is larger than other transmissions. This may be due to the initialization of PC serial port. In the second test, a matrix

f

SU sender

Transmitter

Receiver

PU

Band A

Band B

t f

Working on Channel 4 before Band-Switching

SU receiver

Band A

Working on Channel 9 after Band-Switching Band B

t

Fig. 5.

A simple protocol for frequency band shifting in CRN.

with 2 by 160 entries is transferred. Because the difference of measured latencies using MATLAB and FPGA is trivial, only measured latency using MATLAB is reported here. The average latency is about 5.5 ms. When the data rate is 912600 bps, the latency caused by physical wire delay is 160 × 2 × 8 / 912600 = 2.8 ms. The latency caused by MATLAB processing is about 2.7 ms. This is coherent with the measured latency for the 2 by 2 matrix. As the size of the 2 by 2 matrix is small, the latency is almost the MATLAB processing delay, since the physical wire delay is trivial. III. F REQUENCY BAND S HIFTING A. A Simple Protocol for Frequency Band Shifting One of the features of CR is frequency band shifting, which means that CR users, i.e., secondary users (SUs), vacate their current working frequency band for primary users (PUs) and shift to another frequency band. Usually, SUs do not have their own dedicated frequency bands. So there is no common control channel among SUs for the purpose of coordination. Assume there are two SUs, one sender and one receiver. The problem is how the two SUs know which frequency band they should use when establishing a communication link, and when they should use this frequency band. To answer these two questions, we propose a simple protocol for frequency band shifting in CRN, based on our previous work in [21], [22]. Fig. 5 illustrates the proposed protocol. The key points of the proposed simple protocol are spectrum sensing at the sender and package error detection at the receiver. Assume both SUs are aware of a set of frequency bands, denoted as B. The SU sender performs spectrum sensing periodically during transmission, to detect if current frequency band is available. Once it detects current frequency band becomes unavailable (most likely because PUs start occupying this frequency band), it stops transmitting using this frequency band and starts to search for next available frequency band, according to the known set of frequency bands B. After it detects a new available frequency band, it

Fig. 6.

Change of channel number.

resumes transmitting using the new frequency band. As for the SU receiver, it counts the number of consecutive incorrectly decoded received packages during reception. Once the number exceeds a preset threshold, say T , the SU receiver shifts to next frequency band in set B, and resumes receiving. The advantage of the proposed protocol for frequency band shifting is that it is simple and easy to implement. It is meaningful for a quick demonstration using our CRN testbed. Its disadvantage is also obvious. It takes time for the SU receiver to track the frequency band after the SU sender shifts to another frequency band. The receiver probably misses some data transmitted by the sender during this period, as marked in Fig. 5. But this may not be a big deal for transmitting non-critical data like video streams, since missing some data usually only cause a few mosaicked video frames. Moreover, this problem can be fixed by applying upper-layer protocols. More sophisticated protocols will be studied and demonstrated in our CRN testbed in the future. B. Demonstration of Band-Shifting In this demonstration, we use wireless baby monitor as PU, and two WARP nodes working in 2.4 GHz frequency band as SU. The wireless baby monitor works in frequencyhopping mode in industrial, scientific and medical (ISM) 2.4 GHz frequency band, totally covering about a bandwidth of 70 MHz, from about 2.4 GHz to about 2.47 GHz. In CR, once PU is detected, SU should vacate the frequency band for PU as soon as possible. We propose to use carrier sensing busy frequency (CSBF) to detect PUs. CSBF is defined as the number of consecutive carrier busy status. In current physical-layer design of WARP, carrier sensing is executed at transmitter at a frequency of 10 MHz. Two WARP nodes communicate with each other in carrier sensing multiple access (CSMA) mode, and all data are packetized and transmitted when the channel is unoccupied. In our demonstration, initially two WARP nodes transmit video stream using Wi-Fi channel 4. After the baby monitor is powered on, the transmitting node vacates channel 4 and shifts to a temporary channel, i.e., channel 2. The reason we use channel 2 will be discussed

Wi-Fi signals in channel 1

WARP signals in channel 4 before Band-Switching

WARP Node #1

WARP signals in channel 9 after Band-Switching

Fig. 7.

Wi-Fi signals in channel 11

Change of frequency spectrum on spectrum analyzer.

in next paragraph. Based on our observation, the time interval for vacating the channel after the PU appears is usually less than 2 seconds. At the receiver side, we check consecutive physical-layer cyclic redundancy check (CRC) bad packets to see if the transmitter is on current channel or not, as described in Section III-A. If the transmitter shifts 2 channels away from original working channel, e.g., shifts from channel 4 to channel 2, a weaker copy of signal from channel 2 appearing in original working channel 4 will cause consecutive bad packets at the receiver. If the number of consecutive bad packets at the receiver exceeds the threshold T , the receiver will shift to the backup channel 9. Backups channel are a set of channels prepared in advance for band shifting. In this demonstration, channel 1, 6, and 11 are usually occupied by Wi-Fi based on our measurements using spectrum analyzer. Channel 4 and 9 are idle. So we choose channel 4 as the working channel and channel 9 as the backup channel, with least impact on Wi-Fi users. Once both SUs shift to channel 9, data transmission between them will resume at once. The channel number indicators on the two WARPs are shown in Fig. 6. As we can see, initially the two WARP nodes use channel 4. After the baby monitor is powered on, they perform band shifting and move to channel 9. The changes of frequency spectrum are shown in Fig. 7. The central frequency of the spectrum analyzer is set to 2.437 GHz with a span of 200 MHz. In our radio environment, channel 1 and 11 are occupied by Wi-Fi. The spectrum of the baby monitor is not shown in Fig. 7. IV. S ECURITY IN CRN T ESTBED Security is an important part of CR [1], [2]. With our CRN testbed, algorithms and schemes for security can be implemented and demonstrated. A. Machine Learning for Anomaly Detection It is possible to use machine learning algorithm to distinguish normal data and anomaly data. Research on how to classify signals using different signal features have gotten great attention in software defined radio (SDR) in recent years. It is important to determine what features should be used

Interference Sources

Fig. 8.

WARP Nodes

Layout of the demonstration.

for classification. The classifier in unsupervised learning is easy to be manipulated by others in the procedure of forming the classifier. Thus the results may vary widely. Supervised learning utilizes prior knowledge of data pattern, and it is more robust in terms of classification than unsupervised learning. With our CRN testbed, all kinds of data can be collected from all the nodes. Machine learning can be applied to deal with the collected huge amount of data, extract meaningful features from the data, and use the features to detect anomaly data. Algorithms are under development at Tennessee Technological University. B. Demonstration of Interference to CRN To pursue “cognitive” characteristic, various algorithms have been proposed for CRN. In fact, an assumption has been taken for granted that all or most of nodes are cooperative and trustworthy, which implies that there is no attack to stop basic transmission/reception in the whole networking system. To practically demonstrate potential attacks to CRN nodes, interference recurrence and verification experiments are performed using our current CRN testbed. The layout of the demonstration is illustrated in Fig. 8. Three sets of CRN nodes are involved in this demonstration. Each set of CRN node consists of a WARP connecting to a powerful host computer. Video stream is transmitted from one WARP to another. All the WARPs use the same 2.4 GHz frequency band. There are two cases for this demonstration: Case 1: A deliberate interference, named I#1, is generated by a laptop computer and a Wi-Fi router (model: CISCO Linksys WRT54GL). The laptop and the Wi-Fi router use the same frequency band as the WARP nodes. They are kept busy with a large throughput, so they can occupy the channel with maximum durations. When I#1 starts to work, it can be observed that at the receiving node the quality of received video and audio degrades: mosaics appear frequently on video and lag time increases

sharply. However, since I#1 works based on carrier sense multiple access (CSMA), the channel is usually not thoroughly occupied by I#1 all the time. So the transmitting node can still find chances to transmit video streams. Case 2: Another deliberate interference, named I#2, is generated by the frequency-hopping 2.4 GHz baby monitor (model: Summer 02644) mentioned in Section III-B. When I#2 is powered on, it is observed that the transmission is degraded significantly for video service. This may be because the baby monitor works in wider-band frequencyhopping mode and it is not easy for the transmitting node to find an available channel for transmission using received signal strength indication (RSSI) detection. At the same time, the baby monitor may interfere the reception at the receiving node. It has been shown that interferences may play a determinative role affecting the CRN testbed in this demonstration. It will help us to study the features of interferences considering security in wireless communications. The study of interferences on our CRN testbed can be extended to other application domains. V. C ONCLUSION A CRN testbed is being built and to be connected to cloud computing services for extensive computing resources. In the first phase, computing engines on powerful computers are connected to standalone WARP nodes. MATLAB running on PC is employed as computing engine, since programming in MATLAB is easier and MATLAB provides plenty of supporting tools, e.g., the toolbox for supporting GPU. The connections between WARP and computer through Ethernet and serial port have been implemented and evaluated. Moreover, two important aspects of CR, i.e., frequency band shifting and security have been introduced and demonstrated. More researches in the two directions are on the way. For ultra-wideband and time-critical algorithms, like ultrawideband spectrum sensing, an ultra-wideband receiver is proposed as below. The potential applications of CRN testbed is also discussed.

ADC and Clock SPIs

Clock Distribution ADC_A (3Gsps, 8-bits) ADC083000 ADC_B (3Gsps, 8-bits) ADC083000

ADC_A (3Gsps, 8-bits) ADC083000 ADC_B (3Gsps, 8-bits) ADC083000

A 8-bits B 8-bits C 8-bits D 8-bits DDR LVDS 375 MHz A 8-bits B 8-bits C 8-bits D 8-bits DDR LVDS 375 MHz

A 8-bits B 8-bits C 8-bits D 8-bits DDR LVDS 375 MHz A 8-bits B 8-bits C 8-bits D 8-bits DDR LVDS 375 MHz

Demux 1:2

DDR2 Memory

Data Router

Sensing Algorithms

PCI Express core DDR2 Memory

Demux 1:2

PXI Interface

PXI Express Bus

Control Registers Demux 1:2

DDR2 Memory

Data Router

Decision Making

Sensing Algorithms

Demux 1:2

DDR2 Memory

Interfaces

FPGA 2

ADC_A (3Gsps, 8-bits) ADC083000 ADC_B (3Gsps, 8-bits) ADC083000

ADC_A (3Gsps, 8-bits) ADC083000 ADC_B (3Gsps, 8-bits) ADC083000

ADC_A (3Gsps, 8-bits) ADC083000 ADC_B (3Gsps, 8-bits) ADC083000

Fig. 9.

A 8-bits B 8-bits C 8-bits D 8-bits DDR LVDS 375 MHz A 8-bits B 8-bits C 8-bits D 8-bits DDR LVDS 375 MHz

A 8-bits B 8-bits C 8-bits D 8-bits DDR LVDS 375 MHz A 8-bits B 8-bits C 8-bits D 8-bits DDR LVDS 375 MHz

A 8-bits B 8-bits C 8-bits D 8-bits DDR LVDS 375 MHz A 8-bits B 8-bits C 8-bits D 8-bits DDR LVDS 375 MHz

Demux 1:2

DDR2 Memory

Data Router

Sensing Algorithms

Demux 1:2

DDR2 Memory

Demux 1:2

DDR2 Memory

Reconfiguration

Host Computer (CPU with GPU) Data Router

Sensing Algorithms

Demux 1:2

DDR2 Memory

Demux 1:2

DDR2 Memory

Communication

Data Router Demux 1:2

Sensing Algorithms

Flash

CPLD DDR2 Memory

Multiple FPGA Boards

Architecture of the digital multi-channel wideband receiver.

2) Multiple Multi-GHz Digitizer with FPGA Array: The implemented digital multi-channel wideband receiver is based on commercially available high-performance hardware modules and self-designed flexible software modules. The design architecture is illustrated in Fig. 9. There are totally 10 analogto-digital converters (ADCs) each with 3 Gs/s sampling rate and 8-bit resolution, an array of Xilinx high performance FPGA for digital processing and a bunch of 1 GByte double data rate 2 (DDR2) memory banks for data storage and buffer. All these devices are integrated in a National Instrument (NI) peripheral component interconnect (PCI) eXtensions for instrumentation express (PXIe) hybrid 3U peripheral module. Inside the FPGAs, one digital clock management (DCM) per ADC clock is used to ensure good capture of data. Spectrum sensing algorithms can be implemented in these FPGAs in real-time. The whole system also has potentials to be attached to external computing resources, like general purpose graphic processing units (GPGPUs).

A. Ultra-Wideband Receiver for CRN Testbed

B. Potential Applications of CRN Testbed

The proposed receiver consists of two major blocks: multichannel multi-GHz wideband RF frontend, and multiple multiGHz digitizers with FPGA array. 1) Multi-Channel Wideband RF Frontend: The RF frontend can be built using some off-the-shelf products. Key parameters for each channel include a bandwidth of at least 500 MHz, and a dynamic range of at least 60 dB. The proposed RF frontend has a frequency span ranging from 400 MHz to 5.4 GHz, divided into 10 RF bands. Each band can be further divided into a number of subbands in digital domain. All the frequency bands can be sampled and processed at the same time. The digital processing bandwidth is 500 MHz for each RF band, which does not put too much pressure on data conversion modules and digital backend.

The CRN testbed is ideal for verifying algorithms and protocols for CR and CRN. It can also be used for Smart Grid [1], [2], [23] and sensor network [24], [25]. In Smart Grid, nodes of CRN testbed can be spread over for monitoring the states of power grid. The nodes can be used for transferring the information flow in Smart Grid. In sensor network, each node works as a sensor. All the nodes together can be used to sense objects. Sensing data at each node can be transmitted to a center node for further processing. Intrusion and Anomaly Detection in CR-based Smart Grid Network: The salient features of CR, namely, frequency agility, transmission speed, and range, are ideal for application to the Smart Grid [2], [23]. In this regard, a CRN can serve as a robust and efficient communications infrastructure that

can address both the current and future energy management needs of the Smart Grid. The CRN can be deployed as a large scale wireless regional area network (WRAN) in a Smart Grid. In this manner, a CRN testbed for the Smart Grid would serve as an ideal platform to not only address various issues related to the Smart Grid, such as security, information flow and power flow management, etc., but also reveal more practical problems for further research. From both the power and information flow standpoint, it is imperative to detect any abnormalities in the received data, before processing. These abnormalities could result from intentional intrusion by unauthorized personnel, smart meter miscalibration or failure, in addition to communication errors due to noise, network congestion, or outages. Recently, anomaly detection algorithms for astronomical data was presented in [26], [27]. These algorithms can be readily applied to the CRN based Smart Grid for intrusion and anomaly detection. ACKNOWLEDGMENT This work is funded by National Science Foundation through two grants (ECCS-0901420 and ECCS-0821658), and Office of Naval Research through two grants (N00010-10-10810 and N00014-11-1-0006). R EFERENCES [1] R. C. Qiu, Z. Chen, N. Guo, Y. Song, P. Zhang, H. Li, and L. Lai, “Towards a real-time cognitive radio network testbed: architecture, hardware platform, and application to smart grid,” in Proceedings of the fifth IEEE Workshop on Networking Technologies for Software-Defined Radio and White Space, June 2010. [2] R. C. Qiu, Z. Hu, Z. Chen, N. Guo, R. Ranganathan, S. Hou, and G. Zheng, “Cognitive radio network for the Smart Grid: Experimental system architecture, control algorithms, security, and Microgrid testbed,” to appear in IEEE Transactions on Smart Grid. [3] E. J. Candes and B. Recht, “Exact matrix completion via convex optimization,” Foundations of Computational Mathematics, vol. 9, no. 6, pp. 717–772, 2009. [4] E. J. Candes and Y. Plan, “Matrix completion with noise,” Proceedings of the IEEE, vol. 98, no. 6, pp. 925–936, 2010. [5] V. Chandrasekaran, S. Sanghavi, P. A. Parrilo, and A. S. Willsky., “Ranksparsity incoherence for matrix decomposition,” 2009, arxiv preprint arXiv:0906.2220. [6] W. Liu, J. C. Principe, and S. Haykin, Kernel Adaptive Filtering: A Comprehensive Introduction. Wiley Publishing, 2010. [7] Y. Engel, S. Mannor, and R. Meir, “The kernel recursive least-squares algorithm,” IEEE Transactions on Signal Processing, vol. 52, no. 8, pp. 2275–2285, 2004. [8] P. P. Pokharel, W. Liu, and J. C. Principe, “Kernel LMS,” in Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, 2007. [9] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, 2004. [10] S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, “Distributed optimization and statistical learning via the alternating direction method of multipliers,” November 2010, working draft. [11] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” University of California, Berkeley, Tech. Rep., 2009. [12] National Science Foundation (2011, May). [Online]. Available: http://www.nsf.gov [13] Rice University WARP Project (2011, May). [Online]. Available: http://warp.rice.edu [14] K. Amiri, Y. Sun, P. Murphy, C. Hunter, J. R. Cavallaro, and A. Sabharwal, “WARP, a unified wireless network testbed for education and research,” in Proceedings of IEEE International Conference on Microelectronic Systems Education, 2007, pp. 53 – 54.

[15] Z. Chen, N. Guo, and R. C. Qiu, “Building a cognitive radio network testbed,” in Proceedings of IEEE Southeastcon, March 2011, pp. 91–96. [16] MathWorks Inc. (2011, May). [Online]. Available: http://www.mathworks.com [17] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming, version 1.21,” Apr. 2011. [Online]. Available: http://cvxr.com/cvx [18] Mathworks. Inc. (2011) Parallel Computing Toolbox. [Online]. Available: http://www.mathworks.com [19] MathWorks, Inc., Parallel computing with MATLAB on Amazon elastic compute cloud (EC2), 2008. [Online]. Available: http://www.mathworks.com [20] P. Rydesater. (2008) TCP/UDP/IP Toolbox 2.0.6. [Online]. Available: http://www.mathworks.com [21] Z. Chen, N. Guo, Z. Hu, and R. C. Qiu, “Experimental validation of channel state prediction considering delays in practical cognitive radio,” IEEE Transactions on Vehicular Technology, vol. 60, no. 4, pp. 1314– 1325, May 2011. [22] Z. Chen and R. C. Qiu, “Prediction of channel state for cognitive radio using higher-order hidden Markov model,” in Proceedings of the IEEE SoutheastCon, March 2010, pp. 276 – 282. [23] R. Ranganathan, R. C. Qiu, Z. Hu, S. Hou, M. P. Revilla, G. Zheng, Z. Chen, and N. Guo, “Cognitive radio for Smart Grid: Theory, algorithms, and security,” to appear in International Journal of Digital Multimedia Broadcasting. [24] R. C. Qiu, M. C. Wicks, L. Li, Z. Hu, S. Hou, P. Chen, , and J. P. Browning, “Wireless tomography, part I: A novel approach to remote sensing,” in Proceedings of IEEE 5th International Waveform Diversity & Design Conference, 2010. [25] R. C. Qiu, Z. Hu, M. C. Wicks, S. Hou, L. Li, , and J. L. Garry, “Wireless tomography, part II: A system engineering approach,” in Proceedings of IEEE 5th International Waveform Diversity & Design Conference, 2010. [26] L. Xiong, B. Poczos, A. Connolly, and J. Schneider, “Anomaly detection for astronomical data,” December 2010. [Online]. Available: http://www.ml.cmu.edu [27] L. Xiong, B. Poczos, and J. Schneider, “Hierarchical probabilistic models for group anomaly detection,” in Proceedings of International Conference on Artifcial Intelligence and Statistics, April 2011.

Towards A Large-Scale Cognitive Radio Network

Towards A Large-Scale Cognitive Radio Network: Testbed, Intensive Computing, Frequency Agility, and Security. (Invited Paper). Zhe Chen, Changchun Zhang, ...

723KB Sizes 1 Downloads 172 Views

Recommend Documents

Towards A Real-time Cognitive Radio Network Testbed
defined radio (SDR) reflects this trend. Still, the combina- ... security—the central challenge in smart grid. .... This trend is catalyzed by recent hardware advance ...

Building A Cognitive Radio Network Testbed
There have been some wireless network testbeds, such as the open access research testbed for next-generation wireless networks (ORBIT) [13] and the ...

Building A Cognitive Radio Network Testbed
We are building a CRN testbed at Tennessee Technological. University. ... with 48 nodes [15], which is an exciting advance in this area. ..... Education, 2007, pp.

Building A Cognitive Radio Network Testbed
Mar 10, 2011 - Testbed. Presenter: Zhe Chen. Department of Electrical and Computer Engineering ... USRP2 needs a powerful host computer. 9. 3/10/2011 ...

Cognitive Radio Infrastructure using Spectrum ...
Abstract: Cognitive radio is an amazing technology that allows low cost voice and data services by identifying opportunities in spectrum, space, code and time.

A Two-Tiered Cognitive Radio System for Interference ...
scheme; the number of device types to be detected; and ... The wireless communication industry has grown rapidly .... Bluetooth devices, cordless phones, and.

Towards a novel integrated neuro-cognitive ...
sub-systems via a learning memory modeling approach. The strength of INCA ... derived from a top-down, analytical AI approach operating on abstract symbols ...... P. Wang, B. Goertzel, and S. Franklin, Eds. Amsterdam: IOS Press,. 2008, pp.

Robust Beamforming in Cognitive Radio
commission (FCC) [1], spectrum utilization depends very much upon place and time and yet most ... exploited by CR [5], but higher spectrum utilization is antici- pated if coexistence between the primary (PU) and ... achieve various objectives, such a

Towards a Cognitive Science of New Religious ...
cognitive science including computer modeling can help in this regard. Introduction & Background .... He quit the clerical job that his father had procured for him in a Sialkot court after ... activist Ahl-e-Hadith outlook with the traditional Islami

Towards a developmental cognitive neuroscience of numerical and ...
from other published studies with infants (Brannon, Libertus, Meck, & Woldorff, 2008; Hyde,. Boas, Blair, & Carey ... Towards a developmental cognitive neuroscience of numerical and mathematical cognition.pdf. Towards a developmental cognitive neuros

Towards A Unified Modeling and Verification of Network and System ...
be created by users or services running on top of hosts in the network. The services in our model can also transform a request into another one or more requests ...

Interprocessor Communication : Towards Cache Integrated Network ...
Institute of Computer Science (ICS) – member of HiPEAC. Foundation for Research ... Configure the degree of cache associativity. ♢ Communication intensive ...

A Cognitive Network Approach to Educing Shared ...
This approach to investigating political identity in Macedonia is novel, as it presents an opportunity to .... numbers of open-ended or unstructured interviews.

radio network optimization pdf
Download. Connect more apps... Try one of the apps below to open or edit this item. radio network optimization pdf. radio network optimization pdf. Open. Extract.

Interprocessor Communication : Towards Cache Integrated Network ...
RDMA for bulk transfers. ▫ post descriptors in cache-lines. – Queues for small explicit transfers. ▫ specify destination, size and payload. ▫ send queues ...

Towards Reproducible Performance Studies Of Datacenter Network ...
Data Storage Institute ... codes for our simulation set- ups are publicly available at http://code.google.com/p/ntu-dsi- dcn/. ... fully functional datacenter network of 50,000 servers [5], with .... such as as higher network capacity and graceful pe

Demonstration of Real-time Spectrum Sensing for Cognitive Radio
form factor (SFF) software defined radio (SDR) development platform (DP) [7] is ..... [5] Y. Tachwali, M. Chmeiseh, F. Basma, and H. Refai, “A frequency agile.

On Outage and Interference in 802.22 Cognitive Radio ...
interference free transmission. This is .... Or an alternative definition can be given as,. PP N ... tually generated by MATLAB simulation of expression derived in.

Joint Scheduling and Flow Control for Multi-hop Cognitive Radio ...
Cognitive Radio Network with Spectrum Underlay ... multi-hop CRN overlay with a primary network in [2]. .... network can support in sense that there exists a.

reconfigurable antennas for sdr and cognitive radio
and WiMAX (again, several bands are proposed). Many of these systems will be required to operate simultaneously. Multi-mode, multi-band operation presents a formidable challenge to mobile phone designers, particularly for the RF parts. Of these, the

pdf-175\cognitive-radio-and-networking-for-heterogeneous-wireless ...
... apps below to open or edit this item. pdf-175\cognitive-radio-and-networking-for-heterogeneo ... visions-for-the-future-signals-and-communication-t.pdf.