Abstract

In a cloud radio access network, malicious users mitigate the attributes of primary users in order to occupy a specific idle spectrum band by sending false signals or carry out a denial of service attack. Moreover, with the increase in number of users and limited spectral and energy resources, the malicious users will compete for the spectrum with legitimate users, thus resulting in increase in spectrum scarcity problem. The most widely used defense approach against malicious users is the received signal strength method. However, harmful users can still imitate signal attributes and transmit powers of the primary users. Therefore, in order to elaborate the best method to tackle this vulnerability and hence make more spectrum available, the modified adaptive orthogonal matching pursuit localization algorithm is proposed to detect harmful users existing in the network. However, in order to elaborate the convergence speed of the proposed method, the regularized particle filter algorithm is applied to evaluate the performance of the modified adaptive orthogonal matching pursuit under real-time conditions. The restricted isometry property is used for the performance evaluation. Further, spectral and energy efficiencies are used in the simulation results for performance evaluation, in order to observe spectrum and energy utilization efficiencies. The simulation results show that the proposed method is better in terms of computational complexity, spectral efficiency, and energy efficiency compared to other matching pursuit approaches.

1. Introduction

1.1. Motivation

Spectrum shortage problem experienced by wireless communication network users can be addressed by cognitive radio (CR) technology. In a CR network, secondary users (SUs) sense spectrum and access white space without bringing about any harmful interference to the primary users (PUs) [1]. However, the SUs generally have no overall information about the network spectrum resource utilization because a CR network should not interact with a primary network. Therefore, security is an essential problem among all the main technical issues of CR networks; however, it is not well addressed. Conventional wireless networks face security threats such as primary user emulation attacks (PUEAs) which is one of the common and severe denial of service attacks [2]. In PUEAs, a malicious attacker can imitate the characteristics of a PU and then send a false signal or conduct a wireless channel attack in order to occupy a specific unused frequency band [3]. Besides, the access node may prevent the SU from accessing the spectrum under the pretext that there is no free resource, when the SU wants to access spectrum resources. PUEAs restrain other legal SUs from using the spectrum hole or causing harmful interference to PUs. Nevertheless, cloud radio access network (CRAN) faces serious challenges of security threats and trust problems because of its transmission nature and self-organizing feature. Therefore, due to limited spectral and energy resources and increased number of connected devices, the malicious users cause spectrum unavailability to legitimate users by competing for the available spectrum with the PUs [4]. Therefore, there is a need for security approaches to sense and remove attacks from the system without affecting spectral and energy utilization and causing delay. This paper focuses on detecting harmful users existing in a CRAN to guarantee the quality of experience of valid user.

1.2. Related Work

The received signal energy is used in most approaches in the literature to defend against PUEAs. An energy detection method and a cyclostationary calculation to indicate the features of the energy levels of a user have been proposed [5]. These features are then delivered into an artificial neural network. A new PUEA has been devised, a technique that estimates the invariance of the medium through which information is transmitted, and the variation of the PU received signal strength has been proposed [6]. This information is used to verify if it is a PU or a harmful user signal. Although the technique proves that the invariant of a medium is vital for PUEA prevention, if the PU received signal power is identical to the attacker’s signal power, it will not work. Moreover, the received signal strength was proposed as a method to detect the PUEA location [7]. A method to confirm a transmitter based on the received signal strength through prove of the signal attributes, the intensity of the energy of the received signal, and the localization of the signal source has been devised [8]. Although this method can effectively defeat the PUEA, it intensifies load on the network and is easily disturbed by obstacles. The power level and the direction of arrival of a received signal are used by a SU to compare the received signal with that of the PU in order to differentiate the actual primary signal from malicious user’s signal [9]. However, this method will fail if a harmful user is at a site where the direction of arrival and the received signal level are identical to the PU’s signal. Furthermore, a novel multipath cluster-assisted single station localization method based on a genetic algorithm-based improved salp swarm algorithm was proposed to improve localization accuracy in an outdoor propagation environment. The localization is based on geometrical properties of propagation paths, such as angle of arrival and time of arrival [10]. However, the salp swam optimization algorithm has some conceptual and mathematical errors, which the improved version in [10] has tackled [11].

Nevertheless, cryptographic approaches have been proposed for the PUEA detection. A technique that produces an authentication tag and inserts it in the PU’s signal has been presented [12]. This technique is noise sensitive, and thus, PU signals are distorted eventually. Moreover, the deployment of the advanced encryption standard at the transmitter, in order to prevent the PUEA without producing any change to the physical or system structure, has been proposed [13]. However, finding the location of the harmful user using the Taylor series necessitates a good initial value in order to give high-quality outcomes for the site of the intruder, and the accuracy of the method is low [14]. Nevertheless, in order to enable an SU to acquire authentic connection signatures of the helper node, a physical layer authentication scheme has been extensively studied. The signatures are acquired by placing a helper node near a PU, in order to verify whether the PU’s signal is true or not [15]. However, the SUs cannot identify the authenticity of the information of the cryptographic signature and the signature authentic link when the helper node is assaulted.

Several studies propose the use of compressive sensing for detection. A sparse coding of the compressed received signal over a channel-dependent dictionary in order to detect primary user emulation and jamming attacks in CR using orthogonal matching pursuit (OMP) has been proposed [16]. Nevertheless, a Forward-Reverse OMP-Union-Subspace pursuit-based multiuser detection has been proposed, based on fused modified OMP-modified subspace pursuit algorithm to detect signal elements serially, in line with corresponding decrease in amplitude [17]. The use of one-class classification for detecting PUEA using sensing data collected at the fusion center in an infrastructure-based CR network has been investigated [18]. However, there are a number of drawbacks of one-class classification. There is a need to create complicated solutions that generalize well to more complex datasets. Besides, one-class classification cannot deal with adversarial data. Moreover, a deep network-based one-class classification approach is vulnerable to adversarial attacks. It is required to have a domain generalizable one-class classification. Further, it is hard to interpret decisions that one-class classification makes, and the proposed methods need to train one-class classifiers with distributed data [19]. A survey on various machine learning-based approaches in spectrum sensing, based on types of features extracted from PU signal has been conducted in the literature. It has been justified that supervised, unsupervised, and reinforcement machine learning algorithms are applicable in the cooperative spectrum sensing [20]. Moreover, in order to avoid the distributed denial of service attacks, a metaheuristic approach has been utilized to cluster the attack requests used on whale optimization algorithm-based clustering for distributed denial of service attack detection [21]. However, deep learning is costly, computationally extensive, and security-wise unreliable [22].

A number of studies were undertaken to investigate and utilize PUEA prediction methods. A joint Bayesian model and trilateration method is proposed in order to acquire a good approximation of a PU location using the received signal strength indicator [23]. Moreover, in order to reduce the impact of malicious attacks on a fading in wireless networks, a Neyman-Pearson composite hypothesis test-based analytical model was investigated in [24]. Furthermore, the PUEA in a CRN was considered, and Fenton’s approximation and Wald’s sequential probability ratio test were proposed to detect PUEAs without utilizing any location information [25]. However, the advantages between the Neyman-Pearson composite hypothesis test and Wald’s sequential probability ratio test were analyzed [26]. It has been found that the Neyman-Pearson composite hypothesis test is more efficient against certain PUEAs than Wald’s sequential probability ratio test analyzed, when the PUEA probability of signal loss is above a critical threshold. Moreover, both Neyman-Pearson composite hypothesis test and Wald’s sequential probability ratio test do not apply to all network types. An improved energy detection approach than the conventional energy detection approaches was proposed using “hard” fusion OR/AND decision method that supposed a PUEA assaults the network under a certain probability. [27]. However, costly hardware is required in situations where multiple transmitters or harmful users equipped with directional antenna exist [28].

Methods based on user position are stronger than the received signal strength- (RSS-) based defense techniques. The reason is that in most cases for RSS-based defense methods, harmful users are able to imitate the signal attributes and transmit powers of PUs. Therefore, if a harmful user is at a location where the direction of arrival and the received signal level are identical to the PU’s signal, the malicious user would not be detected [2, 13]. As a target localization technique, compressed sensing (CS) is a spectrum sensing approach because of its accuracy, smaller sensing period, and sampling frequency [28]. Among the various methods of CS theory for localization, OMP method is more desirable due to its fast convergence and good reconstruction performance [2]. However, OMP algorithm has to run until the number of iterations equals to the number operations based on the number of transmitters and users [29]. Since the number of operations is constant, accuracy cannot guarantee for all the time. Moreover, the number of detection targets variation has not been considered in the literature. Therefore, in order to achieve a better performance, when the transmitters are varying and unknown with time, a CS theory for localization of signal sources based on adaptive orthogonal matching pursuit (AOMP) algorithm has been proposed [2]. However, the number of measurements can still be high since the AOMP has to run until the average mean square error meets a predefined stopping criterion. The modified adaptive orthogonal matching pursuit (MAOMP) was proposed as a gesture recognition algorithm [29]. Nevertheless, MAOMP has been proposed to detect PUEAs in cognitive radio network heterogeneous-CRAN (H-CRAN) [30]. In order to decrease the number of measurements to some extent and improve accuracy, the MAOMP method adopts sparsity estimation along with adjustable step size [29]. However, it does not provide a clear prove of how the method is fast. Moreover, the motivation and significance of MAOMP in CR networks were not identified. In order to reduce the number of iterations, the MAOMP approach adopts a bigger step size at the beginning. The step size is then reduced slowly, in order to improve accuracy. However, the computational complexity of the initial estimation of sparsity is increased. Therefore, the choice of the initial step size matters. When the initial step size is smaller, the step size will reduce to 1 quickly. Moreover, it is slow to converge when the initial sparsity is not close to the real sparsity. Nevertheless, it has been shown that when the real sparsity is greater, the real sparsity is twice the initial sparsity for any value of the restricted isometric property (RIP) constant [31]. Therefore, there is a big gap between the initial sparsity and the real sparsity. Hence, more iterations are needed for the algorithm to converge. Therefore, in order to overcome these setbacks, an appropriate step size coefficient to adjust the step size has been proposed [29]. Hence, due to the smaller number of measurements, the MAOMP can be faster than the preceding methods and thus can give excellent performance in real-time system conditions.

Several works that exist in the literature propose methods to solve problems such as in the medical field and in road traffic control. The authors of [32] proposed a method to detect human health. Useful information about a given sample placed in a collimator is obtained from the difference between former and latter sensed optical spectrum. In [33], particle filtering algorithms combined with the optimal parameter search criterion are used for the accurate extraction of autoregressive model-based respiratory rate from pulse oximeter recordings over a broad range. The discrete wavelet transform and OMP techniques are used to extract different coefficients from the electroencephalographic signals for automatic seizure detection from the continuous electroencephalographic monitoring data [34]. A compressive sensing based on OMP method and a rigrsure adaptive soft threshold noise reduction based on discrete wavelet transform method are proposed to extract the respiratory and heartbeat signals in patients [35, 36].

Moreover, in [37], road images were used to detect and count vehicles in order to control traffic flow in an intelligent manner. Medium filters were used for foreground processing, while histogram oriented gradient was used for training cascade classifier. In order to set a priority of a road, selection algorithm is used. Further, a real-time state estimator and predictor are presented in [38]. The authors focused particularly on enabling of detector fault alarms and also its relation to queue-length-based traffic control using particle filter. Unlike the works in [3238], the proposed method in this paper uses previous RF channel state to predict the next channel state and then applies MAOMP to detect PUEAs existing in the network.

In the medical field, particle filtering gave accurate results [33]. Besides, the OMP has been proved to be specific, accurate, and sensitive in its results. Moreover, OMP combined with discrete wavelet transform effectively suppresses noise in remote monitoring of human vital signs [3437]. Furthermore, particle filters used in traffic control produce results that are satisfactory and promising for further work on developing a hybrid model that may be more practical to achieve automatic adaptation to changing system conditions [38]. The physical implementations of the studies in [3238] are different from the one in this paper. Particle filtering and sparse representation are used to solve problems in the medical field and road traffic control [3238]. In this paper, an optimized regularized particle filter (RPF) is used to predict the next state of an RF channel in a CRAN with cognitive radios. The RPF is fast and useful for real-time tracking [3941]. Moreover, MAOMP is a sparse representation method with improved accuracy and speed than OMP. Thus, it can give excellent performance in real-time system conditions [29]. Therefore, it is promising that more accurate and faster results can be obtained when RPF MAOMP is applied in both medical applications and road traffic control than the methods in [3238].

1.3. Contributions

In this paper, the RPF algorithm has been applied in order to evaluate the performance of MAOMP under real-time conditions. The proposed method consists of two parts: spectrum prediction and PUEA detection. Once the next state of the channel is predicted, the MAOMP algorithm is applied in order to detect and drop PUEAs existing on the network. Hence, this approach will contribute greatly in efficient spectral and energy resource utilization. The novelty of this study is as follows: (1)In order to identify the existence or absence of harmful users in the network, the MAOMP method is utilized when the RPF channel state prediction algorithm is used and when it is not used(2)In order to reduce the computational complexity, an appropriate step size coefficient is used to adjust the step size(3)To evaluate the performance of the MAOMP algorithm, the RIP is utilized. Spectral and energy efficiencies are used to evaluate the performance of the proposed algorithm. Moreover, the acquired detection results are compared with OMP, AOMP, and sparsity adaptive matching pursuit (SAMP) methods(4)The computational complexity of OMP, AOMP, SAMP, and MAOMP algorithms is calculated, and the results are illustrated in graphs

The organization of the remaining part of this paper is as follows. The proposed method is illustrated in Section 2. The problem formulations and algorithm are presented in Section 3. The simulation results are presented and discussed in Section 4. Lastly, the conclusion of this paper is presented in Section 5.

2. Proposed Method

2.1. System Model

Consider a centralized CRAN setting in which baseband units (BBUs) and transmitters are connected by a common public radio interface (CPRI); the configuration is shown in Figure 1. Each BBU, located in the BBU pool, is assigned to each RRH. The BBU functions as a virtual base station to process baseband signals and optimize resource allocation of the network. In downlink, the RRHs transmit the radio frequency (RF) signals to user equipment (UE) while in uplink; they forward the baseband signals from UE to the BBU pool for further processing. A set of transmitters is assumed to serve users. Each transmitter is assumed to have its own capacity of channels. Suppose the total number of users assigned to be served by all transmitters is represented by the set . The configuration is shown in Figure 1. The users are uniformly distributed within the coverage area of each transmitter. All transmitters are expected to provide coverage to users that are located within their coverage area.

Consider that a cloud computing unit stores location information of free spectrum bands. The cloud is used to analyze the sensed information and store the locations of the free spectrum bands. Each spectrum sensor reports its sensing information to the cloud server. A location database is maintained in the server located in the cloud. The location database is used to store position information of free bands and SUs and update the information in real time.

Let us consider transmitters m1 and m2 in Figure 1 for simplicity. Suppose a set of SUs located within the coverage area of a transmitter, with demands greater than the available bandwidth, want to gain access to the transmitter. Due to the limited bandwidth, some SUs are deprived of gaining access to the spectrum on the transmitter. Therefore, they will monitor the spectrum on other neighboring transmitters to opportunistically gain access to those transmitters. Assume that some SUs at the edge of their transmitters act as adversary SUs by imitating the PUs. Hence, the PUEAs should be detected with accuracy and proper number of iterations. The links between the transmitter and the PUs, SUs, and PUEAs are shown in blue, green, and red colors, respectively, as illustrated in Figure 1.

Let us assume that the current state of a channel changes from the previous state based on the channel impulse response . Based on the current channel state, a user objective is obtained and denoted by at time episode . The function that links the state to the user objective is denoted by . Therefore, the system model is given by where and are additive white Gaussian noises with zero mean and unit variance.

Assuming that the SUs are uniformly distributed within the coverage area of the transmitters, the received power of the PUs and SUs depends on the pathloss, the shadow fading, and the transmit power of the transmitters. Therefore, the received power of user is calculated by where is the remote radio head (RRH) transmit power, is the shadow fading, and is the pathloss. The pathloss depends on the environment of the user. The fading channel between transmitter and user at time episode is modeled by the th order autoregression process () [39]. Therefore, the channel impulse response at time episode is given by where is the channel fading impulse for transmitter and user at time episode . and are the autoregression (AR) parameters, which assume that . is a zero order the Bessel function of the first kind, is the Doppler frequency, and is the coherence time of the channel. Suppose other users try to cause interference to user as they attempt to connect to the same channel with , the signal to noise plus interference ratio (SINR) is expressed by where is an interferer, is the power that the interfering user exchanges with other users communicating over channel , is a binary index that indicates whether channel is chosen by or not, and is the bandwidth of channel . Each user is permitted to choose one channel only. The power spectral density of noise, denoted by , is assumed equal for the entire spectrum. Thus, the total user rate over channel at time is given by

2.2. Channel State Prediction

This section discusses RPF algorithm, which is used to predict the channel state and the rate [40]. Suppose a channel state changes from to at time episode , the channel impulse response in equation (4) governs the channel’s state change. However, every user desires higher throughput. Therefore, the function that links the state to the objective is expressed in equation (5). In order to obtain the current channel state, likelihood equation is utilized. Consider a set of sample , drawn from a random distribution whose probability density function is parameterized by [40]. is assumed to be the population that contains all possible values of , where is the number of subcarriers. The likelihood equation is expressed by where is the variance. Further, the posterior probability uses the predicted channel state to predict the rate. Let us assume that each channel state is associated with its weight ; the weights are normalized such that . Using Bayesian assumption and given the importance density , the optimal channel weights can eventually be expressed by [40, 41].

Moreover, a kernel function is needed to smoothen the posterior density. Thus, the posterior density estimation is given by where

is the rescaled kernel density, is the kernel bandwidth, and is the dimension of the channel state . The kernel density and bandwidth are chosen to minimize the mean integrated square error between the actual posterior density and the corresponding regularized observation in equation (9). In a uniformly weighted sample, the optimal choice of the kernel is the Epanechnikov kernel [4043]. where is the volume of the unit hyper sphere in . Moreover, for a Gaussian with a unit covariance, the optimal kernel bandwidth is expressed by

Let us assume that is uniformly distributed and is the acceptance probability. The current channel state is moved to a new state based on the Metropolis-Hastings algorithm [40, 41]. The acceptance probability to move to the new state is given by

Therefore, the next channel state is given by where is the empirical covariance of the channel and is the channel impulse response drawn from the Epanechnikov kernel [41]. Therefore, the channel state is moved to the next state if according to (13); otherwise, the move is rejected.

3. Problem Formulations and Algorithm

Suppose the locations of the connected transmitters are represented in matrix ; in order to attain a sparse coefficient , the minimization is used to obtain the number of nonzero components. The sparse coefficient is expressed by [44, 45]

Many methods for solving the minimization problem in equation (15) are available. However, in this paper, the least square method is used to solve it.

Some of the SUs at the edges of the transmitters are assumed to imitate the signal characteristics of PUs of the neighboring transmitters with stronger signal power. Eventually, this causes PUEAs on those particular neighboring transmitters. The nonzero elements in apparently indicate the PUEAs that exist in the network, since the rest of the elements with values equal to zero represent the sites of the PUs.

3.1. Localization

Although the number of users as well as their demands varies, it is crucial to know the positions of active users and RRHs they are connected to. Thus, let denote user sites, which is represented by where each is an vector with an element for a particular user connected to transmitter , while the rest of the elements are equal to zero. Therefore, is -sparse.

Consider a Rayleigh energy decay model expressed by [2] where is the power density of transmitter and is the pathloss exponent determined by the environment. The energy decay for the transmitters is represented by [2]

Therefore, the energy fading in (17) can also be expressed by

Consider an arrangement of measurement entities for each BBU. Therefore, a measurement matrix of size is represented by

Each element of matrix is of the size . Let us suppose that represents the index of the transmitter to which the measurement entity is connected. Moreover, assume that element of the vector is connected to transmitter . Let us assume for transmitter m, that “” (“”) = 1, while the rest of the elements equal to zero. The value of for transmitter , while the rest of the elements equal to zero. Suppose the measurement entities receive new user demands as

The measurement matrix is used as a recovery matrix. We can see that is common in (19) and (21). Thus, substituting (19) in (21) gives us

A particular number of transmitters are used to localize equation (15) accurately for number of measurements as represented in equation (22). Let ; therefore, the compressive measurement can be expressed by

Thus, the noisy measurement of matrix can be added in order to improve robustness, which eventually is expressed by [2] where is an additive white Gaussian noise.

3.2. Performance Evaluation

In order to evaluate equation (23), the RIP is utilized. The goal is to reconstruct the matrix in order to obtain a guaranteed unique solution provided that it obeys the RIP as expressed in [30, 31, 40] where is the RIP constant. The noisy measurement is categorized based on the minimum residual error.

3.3. The MAOMP Algorithm

Suppose the reference for the sparsity estimation is denoted by and the initial sparsity by . The MAOMP requires the usage of the theoretical sparsity . However, MAOMP examines a match in order to estimate . A projection set containing the residual error and the corresponding sets that represent the transmitters and the respective user is computed. The th largest value in is selected, and the index of the selected transmitter and the corresponding set are obtained. The corresponding set is the support set of the selected transmitter. The support set is denoted by at time , and its length is obtained from the estimated value, which satisfies the condition of the match. The indices of are kept in index set . The th largest value is chosen among the elements in the projection set , where denotes the residual error. The corresponding index values of the th largest values are kept in . Subsequently, the values in and are updated as and , respectively. Then, the residuals are updated as [29]

The stage and the variable step size are used to adjust the filtered values, in order to achieve a better sparse representation of . The MAOMP is a scheme that utilizes step size coefficient in order to obtain variable step size. Initially, a larger step size is adopted in order to lower the number of measurements and then slowly decrease the step size, and therefore, accuracy is increased. The step size denoted by can be expressed by [29] where is the number of iterations and is the step size coefficient. In every iteration, the estimated sparsity is computed by

According to (27), the step size is greater at the beginning of the iteration, but it reduces gradually to 1. This implies that if the theoretical sparsity and initial sparsity are not close to one another, the convergence of the estimated value to the theoretical sparsity is slow. Therefore, since the initial step size is greater, the sparsity estimation would converge to the theoretical sparsity quickly. Nevertheless, in order to have accurate sparsity estimation, a smaller step size is used, such that the estimated sparsity may not be deficient or overestimated. The OMP method is utilized to solve equation (15). The th greatest value in the projection set in step 8 of Algorithm 1 is selected based on the correlation between the sensing matrix and the residual error [29]. The MAOMP steps are shown in Algorithm 1.

1. Input:, , .
2. Output: and .
3. Initialization: step = step size, S0,, , .
4. Compute projective set Y.
5. Test RIP, If true then .
6. Compute , Set stage and count to 1, .
7. Calculate , choose highest value in Y, update and .
8. Compute , choose greatest value, update and , update .
9. If , go to 2.
10. If previous , , go to step 6. Else update , go to step 6.

Algorithm 2 shows the proposed method for detecting PUEAs that exist in the network. This method predicts the next state of a channel then detects the malicious users that illegally use spectrum. Eventually, the PUEAs will not be granted access to the spectrum, leaving more available spectrum.

1. Establish network topology (RRHs and their respective users).
2. Obtain channel values and calculate the rate per RRH.
3. Predict the next channel state of RRH users using RPF algorithm.
4. Apply MAOMP (in Algorithm 1).
5. Drop detected PUEAs in 4.
6. Calculate the rate based on legitimate users.
7. Evaluate SE and EE based on equations (29) and (30).
3.4. Spectral and Energy Efficiencies

Let us assume a set of malicious users, where denotes a PUEA. Suppose the total bandwidth used by all active users including the PUEAs is denoted by and the bandwidth occupied by the PUEAs is ; the spectral efficiency (SE) in b/s/Hz with active RRHs and BBUs is expressed by where is the rate at transmitter at time stamp . Consequently, energy efficiency (EE) in b×s/Joule can be obtained by

4. Results and Discussion

This paper proposes an RPF MAOMP method to detect PUEAs existing in a network. The PUEAs are detected based on the predicted channel state. Given the previous state of channel , the current state is predicted based on the current impulse response in equation (4). In order to get user objective , the function in equation (5) links to as shown in equations (1) and (2).

In order to enhance spectral and energy efficiencies, the main idea is to accurately detect PUEAs present on the network. Therefore, a sparse representation of the detected transmitter is required. For a system of linear equations represented by , the problem is formulated as subject to . The minimization looks for a sparse solution for a problem; hence, it is used to obtain the sparse representation . However, produces a unique solution with smooth fitting. Therefore, based on the channel state and user objective , the MAOMP is used to detect the PUEAs present in the network using the minimization. The RIP is used to characterize matrices which are linearly orthogonal [46]. Therefore, the RIP is used to evaluate the performance in order to obtain a guaranteed unique solution to the sparse matrix .

4.1. Simulation Setup

This paper considers a CRAN with 9 RRHs operating at 5.25 GHz frequency with 20 MHz band and 23 dBm transmit power for each RRH. Small-scale fading and large-scale fading are considered as the radio propagation channel models. Assume user is located at a distance of meters away from transmitter , and a line of sight (LOS) connection is considered between RRH communicating with user in an urban environment. The pathloss model is obtained by [40]

However, the pathloss model for outdoor users is given by the nonline of sight (NLOS) model: where denotes the frequency in GHz and is the large-scale variability of signal against the distance in a straight path.

A user rate of 1 Mbps and a predefined stopping error of are considered in the simulation environment. In order to calculate the optimal kernel bandwidth, the dimension of channel is one (1), and the volume of a unit sphere is . The RIP constant and step size coefficient obviously affect the number of measurements and sparsity estimation. Therefore, in order to reduce the number of iterations and avoid over estimation, the RIP constant is set to , and the step size coefficient is [29]. The number of steps for both SAMP and MAOMP algorithms is equal to . However, the number of operations for OMP and AOMP algorithms is equal to and , respectively [2, 29].

The simulation is run 10 times, each at various user capacities of up to 50 users per RRH, using MATLAB software. Up to ten PUEAs are set randomly for each RRH. However, at most three randomly selected PUEAs are successful in emulating PUs of a particular transmitter. For simplicity, the transmitter whose PUEA has the highest RSS is chosen and used for performance evaluation. Thus, the SE and EE values are based on the throughput of the selected transmitter in the support set. Figures 27 show results for the performance comparison between OMP, AOMP, SAMP, and MAOMP without and with RPF-based channel state prediction [40]. The RPF has been proven to be fast and useful for real-time tracking of channels [39]. Therefore, in this study, MAOMP is simulated with and without applying RPF algorithm in order to evaluate its performance. The computational complexity and the spectral and energy efficiencies are used to evaluate the performance of MAOMP.

4.2. Simulation Results
4.2.1. Number of Operations

Figure 2 shows the number of operations for OMP, AOMP, SAMP, and MAOMP algorithms, respectively, based on the number of users and the number of transmitters that have been considered in this paper. Figure 2(a) considers a small number of users per transmitter, while Figure 2(b) includes larger number of users for each transmitter. Thus, Figure 2(a) is the zooming of Figure 2(b) for small number of users. It has been shown in Figure 2(a) that the number of operations is 50, 100-200, 400-500, and 600-1350 for OMP, MAOMP, AOMP, and SAMP, respectively. According to Figure 2(a), OMP converges faster than the other three algorithms, while SAMP is slow to converge. However, Figure 2(b) shows that the convergence of both MAOMP and SAMP improves when the number of users in a transmitter is high. Thus, AOMP is the slowest, while MAOMP is the fastest to converge when the number of users in a transmitter is high.

4.2.2. Average Number of Measurements

In order for AOMP, SAMP, and MAOMP algorithms to stop running, the residual error has to meet a predefined stopping criterion. In case of AOMP algorithm, the average mean square error has to be nearest to the predefined stopping criterion for the iteration to stop. However, MAOMP algorithm adopts sparsity estimation along with adjustable step size. Since the step size is adjustable, the number of iterations that MAOMP algorithm can run is reduced compared to AOMP. Figure 3 shows the number of measurements for OMP, AOMP, SAMP, and MAOMP, respectively. It can be seen in Figure 3 that for all scenarios, the number of iterations is 52-60 for OMP, 14 for AOMP, and 3 for both SAMP and MAOMP, respectively. Since the number of measurements for both SAMP and MAOMP is the same, Figure 3(b) is for clarification. It is clear that the number of measurements for OMP is the highest; thus, it is the slowest. Moreover, Figure 3 shows that both SAMP and MAOMP are the fastest. However, since the number of operations of MAOMP is smaller than the number of operations of SAMP, according to Figure 2, MAOMP is the fastest.

4.2.3. Spectral Efficiency

Figure 4 shows the SE performance of MAOMP compared to OMP, AOMP, and SAMP without RPF channel state prediction. Noticeably, the SE values for OMP and AOMP are the same in all scenarios. The SE values range between 0.03 and 0.10 b/s/Hz, 0.03-0.12 b/s/Hz, 0.34-1.2 b/s/Hz, and 0.35-1.15 b/s/Hz for OMP, AOMP, SAMP, and MAOMP, respectively, when RPF is not applied as shown in Figure 4.

The SE performance of the proposed method is presented in Figure 5, when RPF prediction is utilized. The SE values for OMP and AOMP are the same in all scenarios. Figures 5(a) and 5(b) are shown in order to clarify that both AOMP and SAMP methods give similar SE values. It can be seen in Figures 5(a) and 5(b) that the SE values range between 0.15 and 0.22 b/s/Hz for OMP, AOMP, and SAMP and between 1.45 and 2.25 b/s/Hz for MAOMP algorithms, respectively, when RPF is applied. The SE for the proposed method is higher than that of the OMP, AOMP, and SAMP methods. It can clearly be seen in all scenarios that the SE of MAOMP is higher than that of the OMP, AOMP, and SAMP.

4.2.4. Energy Efficiency

Figure 6 shows the EE performance of MAOMP compared to OMP, AOMP, and SAMP without RPF channel state prediction. The EE values for OMP and AOMP are similar in all scenarios. Since both OMP and AOMP produce the same graph, Figures 6(a) and 6(b) are presented for clarification. Figure 6 shows that the values of EE range between and  b×s/Joule for both OMP and AOMP, and  b×s/Joule for SAMP, and and  b×s/Joule for MAOMP, respectively, when RPF method is not applied. It is evident from Figure 6 that the EE for MAOMP is higher than that of the OMP and AOMP. However, MAOMP is less energy efficient than SAMP when RPF is not applied.

The EE values for the proposed method are presented in Figure 7. It can be observed from Figure 7 that the range of the EE values for OMP, AOMP, and SAMP is very similar for all scenarios. The EE values range between and  b×s/Joule for OMP, AOMP, and SAMP and between and  b×s/Joule for MAOMP, respectively, when the RPF is used. It can be seen that, for all methods, the EE curve is higher with smaller number of users, and it drops gradually as the number of users increases.

4.3. Discussions

This section provides the discussion for the simulation results obtained in Section 4.2. The purpose of the study is to assess the performance of MAOMP algorithm in real-time conditions. Since RPF has been proved to be fast and useful for real-time tracking of channels [40], in this study, MAOMP is simulated with and without applying RPF in order to evaluate its performance. The spectral and energy efficiencies are used to evaluate the performance of MAOMP.

The number of measurements of OMP is the highest as illustrated in Figure 3. However, in order to improve accuracy, MAOMP algorithm has to run a number of times until a predefined stopping criterion is met, before the execution is passed on to the next iteration. Likewise, AOMP algorithm has to run until the average mean square error meets the predefined stopping criterion, leading to a higher number of iterations. Unlike MAOMP, which adopts adjustable step size in order to reduce the number of iterations, AOMP algorithm can run for a number of iterations before it outputs the detected PUEAs. The number of measurements in Figure 3 shows the number of times AOMP, SAMP, and MAOMP algorithms can run before moving on to the next iteration, respectively. When the number of users is small, OMP is the fastest because it runs once and does not have the subiteration for accuracy test that AOMP, MAOMP, and SAMP algorithms have. However, the convergence of both MAOMP and SAMP improves when the number of users in a transmitter is high. AOMP is the slowest to converge, while MAOMP is the fastest to converge when the number of users in a transmitter is high. It is clear in Figure 2 that MAOMP outperforms OMP, AOMP, and SAMP. This is because the sparsity estimation for MAOMP is adopted along with an adjustable step size in order to reduce the number of measurements to some extent and improve accuracy [28, 47].

In Figures 4 and 5, the SE performance of the proposed method is the best compared to that of OMP, AOMP, and SAMP methods due to the improved accuracy for MAOMP [29]. Moreover, the number of operations of MAOMP is small and thus can detect more PUEAs leading to more available spectrum. Additionally, MAOMP can be faster and thus can give excellent performance in real-time system conditions for dense networks. It is worth noting that, due to RPF’s real-time high capability of tracking and high performance even when the number of users is high and also when small dynamical noise is expected, RPF predicts the next state of a channel and allocates users to the best channels [29, 40]. Therefore, it can be seen in Figure 5 that the SE for all of the algorithms increases greatly compared to Figure 4.

The simulation results for the EE are shown in Figure 7. According to equation (30), as SE increases, the EE should increase as well. However, the EE will decrease with increase in power of active users. Therefore, it can be seen in Figure 7 that the EE increases generally for all of the algorithms when RPF is applied.

It has been shown in the simulation results that the SE of MAOMP is 91.2-91.6% and 90-91.2% greater than the SE of OMP and AOMP, respectively, when RPF is not applied. However, the SE for MAOMP is less than that of the SAMP method by 2.9% when the number of users is small then increases up to -2.9-4.2% as the number of users increases. Although the performance of all OMP, AOMP, SAMP, and MAOMP methods increases when RPF algorithm is applied, the proposed method outperforms the other methods by 89.6-90.2% and 85-87.5% in SE and EE, respectively. The SE and EE of MAOMP are increased by 46.6-76.5% and 83-88.3%, respectively, when RPF is applied.

5. Conclusions

It has been shown in the simulation results that the performance of OMP, AOMP, SAMP, and MAOMP algorithms is generally improved when RPF is used. MAOMP is faster than the other three methods as its number of operations is low. Due to the inability of OMP, AOMP, and SAMP to detect some PUEAs as a result of their lower speed when the RPF is utilized, outstanding spectral and energy efficient results have been shown for MAOMP method. The SE and EE of the proposed method are 89.6-90.2% and 85-87% higher than that of the OMP, AOMP, and SAMP methods, respectively, when RPF algorithm is applied. Moreover, the SE and EE of MAOMP method are increased by 46.6-76.5% and 83-88.3%, respectively, when RPF is applied. The EE is very small, that is, in mb×s/Joule. Therefore, in the future, more study is needed to improve EE.

Abbreviations

AOMP:Adaptive orthogonal matching pursuit
AR:Autoregression
:th order autoregression process
BBU:Baseband unit
CPRI:Common public radio interface
CR:Cognitive radio
CRAN:Cloud radio access network
CS:Compressed sensing
dBm:Decibel meter
EE:Energy efficiency
GHz:Gigahertz
H-CRAN:Heterogeneous-CRAN
LOS:Line of sight
MAOMP:Modified adaptive orthogonal matching pursuit
MHz:Megahertz
Mbps:Megabits per second
NLOS:Nonline of sight
OMP:Orthogonal matching pursuit
PUEAs:Primary user emulation attacks
PUs:Primary users
RF:Radio frequency
RIP:Isometric property
RPF:Regularized particle filter
RRH:Remote radio head
RSS:Received signal strength
SAMP:Sparsity adaptive matching pursuit
SE:Spectral efficiency
SINR:Signal to noise plus interference ratio
SUs:Secondary users
UE:User equipment.

Data Availability

The code data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflict of interest.

Acknowledgments

This work is supported by the Foshan Science and Technology Innovation Special Fund Project (No. BK22BF004); part of the work is supported by the National Key R&D Program of China (No. 2020YFB1807900).