Efficient utilisation and sharing of limited spectrum resources in an autonomous fashion is one of the primary goals of cognitive radio. However, decentralised spectrum sharing can lead to interference scenarios that must be detected and characterised to help achieve the other goal of cognitive radio—reliable service for the end user. Interference events can be treated as unusual and therefore anomaly detection algorithms can be applied for their detection. Two complementary algorithms based on information theoretic measures of statistical distribution divergence and information content are proposed. The first method is applicable to signals with periodic structures and is based on the analysis of Kullback-Leibler divergence. The second utilises information content analysis to detect unusual events. Results from software and hardware implementations show that the proposed algorithms are effective, simple, and capable of processing high-speed signals in real time. Additionally, neither of the algorithms require demodulation of the signal. 1. Introduction Cognitive radio (CR) is the term used to describe smart, reconfigurable wireless communications devices that are capable of automatically adjusting their operating characteristics in order to adapt to changes in the radio environment. The purpose of such a system is to enable efficient use of the available radio spectrum and provide reliable service to the end user [2]. The motivation for efficient spectrum utilisation arises from the fact that it is a very limited resource. Although the electromagnetic spectrum is (for all intents and purposes) infinite, only a small fraction of it is usable for personal wireless communications as we know it today. Furthermore, while the spectrum available remains fixed, the number of wide-band wireless systems contending for access keeps growing—further compounding the spectrum scarcity problem. Traditionally, the radio spectrum has been divided into a number of usable bands by regulatory bodies such as the Federal Communications Commission (FCC) in the USA and the Office of Communications (Ofcom) in the UK. Each of the bands is then assigned for exclusive access by a particular operator or service. A notable exception is of course the set of bands known as the industrial, scientific and medical (ISM) bands where emission from unlicensed consumer electronic devices is tolerated. While this restrictive approach to sharing the radio spectrum succeeds at providing a certain degree of interference protection, it is an inefficient use of the available resources since it is
References
[1]
H. Shimazaki and S. Shinomoto, “A method for selecting the bin size of a time histogram,” Neural Computation, vol. 19, no. 6, pp. 1503–1527, 2007.
[2]
S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201–220, 2005.
[3]
S. Haykin, D. J. Thomson, and J. H. Reed, “Spectrum sensing for cognitive radio,” Proceedings of the IEEE, vol. 97, no. 5, pp. 849–877, 2009.
[4]
D. Cabric, S. M. Mishra, and R. W. Brodersen, “Implementation issues in spectrum sensing for cognitive radios,” in Proceedings of the Asilomar Conference on Signals, Systems and Computers, vol. 1, pp. 772–776, IEEE, Pacific Grove, Calif, USA, November 2004.
[5]
D. Cabric, A. Tkachenko, and R. W. Brodersen, “Spectrum sensing measurements of pilot, energy, and collaborative detection,” in Proceedings of the IEEE Military Communications Conference (MILCOM '06), pp. 1–7, Washington, DC, USA, October 2006.
[6]
M. ?ner and F. Jondral, “Air interface recognition for a software radio system exploiting cyclostationarity,” in Proceedings of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '04), vol. 3, pp. 1947–1951, Barcelona, Spain, 2004.
[7]
C. Krügel, T. Toth, and E. Kirda, “Service specific anomaly detection for network intrusion detection,” in Proceedings of the ACM Symposium on Applied Computing, pp. 201–208, ACM, Madrid, Spain, March 2002.
[8]
J. Lin, E. Keogh, A. Fu, and H. Van Herle, “Approximations to magic: finding unusual medical time series,” in Proceedings of the 18th IEEE Symposium on Computer-Based Medical Systems, pp. 329–334, IEEE, Dublin, Ireland, June 2005.
[9]
R. J. Bolton and D. J. Hand, “Statistical fraud detection: a review,” Statistical Science, vol. 17, no. 3, pp. 235–255, 2002.
[10]
V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: a survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 1–58, 2009.
[11]
T. M. Cover and J. A. Thomas, Elements of Information Theory, Wiley Series in Telecommunications, edited by D. L. Schilling, John Wiley & Sons, New York, NY, USA, 1st edition, 1991.
[12]
J. G. Proakis, Digital Communications, McGraw-Hill Higher Education, New York, NY, USA, 4th edition, 2000.
[13]
J. Robertson, E. W. Tallman, and C. H. Whiteman, “Forecasting using relative entropy,” FRB of Atlanta Working Paper No. 2002-22, November 2002, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=355460.
[14]
H. Nakahara and S.-I. Amari, “Information-geometric measure for neural spikes,” Neural Computation, vol. 14, no. 10, pp. 2269–2316, 2002.
[15]
D. D. Falconer, F. Adachi, and B. Gudmundson, “Time division multiple access methods for wireless personal communications,” IEEE Communications Magazine, vol. 33, no. 1, pp. 50–56, 1995.
[16]
A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: existing solutions and latest technological trends,” Computer Networks, vol. 51, no. 12, pp. 3448–3470, 2007.
[17]
M. Markou and S. Singh, “Novelty detection: a review—part 1: statistical approaches,” Signal Processing, vol. 83, no. 12, pp. 2481–2497, 2003.
[18]
M. Markou and S. Singh, “Novelty detection: a review—part 2: neural network based approaches,” Signal Processing, vol. 83, no. 12, pp. 2499–2521, 2003.
[19]
A. Lazarevic, L. Ert?z, V. Kumar, A. Ozgur, and J. Srivastava, “A comparative study of anomaly detection schemes in network intrusion detection,” in Proceedings of the SIAM International Conference on Data Mining, pp. 25–36, San Francisco, Calif, USA, May 2003.
[20]
Z. A. Bakar, R. Mohemad, A. Ahmad, and M. M. Deris, “A comparative study for outlier detection techniques in data mining,” in Proceedings of the IEEE Conference on Cybernetics and Intelligent Systems, pp. 1–6, IEEE, Bangkok, Thailand, June 2006.
[21]
S. Basu and M. Meckesheimer, “Automatic outlier detection for time series: an application to sensor data,” Knowledge and Information Systems, vol. 11, no. 2, pp. 137–154, 2007.
[22]
M. J. Desforges, P. J. Jacob, and J. E. Cooper, “Applications of probability density estimation to the detection of abnormal conditions in engineering,” Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, vol. 212, no. 8, pp. 687–703, 1998.
[23]
D.-Y. Yeung and C. Chow, “Parzen-window network intrusion detectors,” in Proceedings of the International Conference on Pattern Recognition, vol. 4, pp. 385–388, IEEE, Quebec City, Canada, 2002.
[24]
W. Lee and D. Xiang, “Information-theoretic measures for anomaly detection,” in Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 130–143, IEEE, Los Alamitos, Calif, USA, May 2001.
[25]
M. Basseville, “Distance measures for signal processing and pattern recognition,” Signal Processing, vol. 18, no. 4, pp. 349–369, 1989.
[26]
R. Krichevsky and V. Trofimov, “The performance of universal encoding,” IEEE Transactions on Information Theory, vol. 27, no. 2, pp. 199–207, 1981.
[27]
D. H. Johnson, C. M. Gruner, K. Baggerly, and C. Seshagiri, “Information-theoretic analysis of neural coding,” Journal of Computational Neuroscience, vol. 10, no. 1, pp. 47–69, 2001.
[28]
H. Haas and S. McLaughlin, Eds., Next Generation Mobile Access Technologies: Implementing TDD, Cambridge University Press, Cambridge, UK, 2008.
[29]
Y. Benjamini and Y. Hochberg, “Controlling the false discovery rate: a practical and powerful approach to multiple testing,” Journal of the Royal Statistical Society. Series B, vol. 57, no. 1, pp. 289–300, 1995.