Skip to main content
Erschienen in: Wireless Personal Communications 2/2017

29.06.2017

A Multi-factor Trust Management Scheme for Secure Spectrum Sensing in Cognitive Radio Networks

verfasst von: Sumit Kar, Srinivas Sethi, Ramesh Kumar Sahoo

Erschienen in: Wireless Personal Communications | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cognitive radio (CR) is an emerging technology for efficient utilization of the limited and scarce radio spectrum resources. Spectrum sensing is a key task in CR system for detecting the unused radio spectrum or spectrum holes by the primary users. In this regard, collaborative spectrum sensing (CSS) has shown to as an efficient way to improve such spectrum holes detection in cognitive radio network (CRN). However, this cooperative nature makes it vulnerable to many types of security attacks. In this paper, we focus one of these potential CRN specific security attack called spectrum sensing data falsification attack or Byzantine attack. In which the malicious internal member of the network, reports false sensing results with a aim to increase the sensing errors. In order to ensure the security requirements of CRN, we proposed a novel trust management mechanism that evaluates the trustworthiness of each node participating in the CSS scheme called sensing reputation (SR). To reflect the complexity, the SR calculation involves multiple decision factors like history based trust factor, active factor, incentive factor and consistency factor. Based on this SR value, the suspicious users are identified and the malicious users are filtered out from the decision making process of the CSS scheme. We further introduce the concept of sensing reputation chain to record and track the future behavior of the identified suspicious users. Theoretical analysis and simulation results demonstrate the effectiveness of our proposed malicious user detection technique with a higher accuracy and lower false alarm rate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.CrossRef Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.CrossRef
2.
Zurück zum Zitat Spectrum Efficiency Working Group. (2002). Spectrum policy task force report, Federal Communications Commission. FCC ET Docket 02-135. Spectrum Efficiency Working Group. (2002). Spectrum policy task force report, Federal Communications Commission. FCC ET Docket 02-135.
3.
Zurück zum Zitat Chen, R., Park, J. M., & Bian, K. (2008). Robust distributed spectrum sensing in cognitive radio networks. In 27th IEEE International Conference on Computer Communications, INFOCOM 2008 (pp. 1876–1884). IEEE. Chen, R., Park, J. M., & Bian, K. (2008). Robust distributed spectrum sensing in cognitive radio networks. In 27th IEEE International Conference on Computer Communications, INFOCOM 2008 (pp. 1876–1884). IEEE.
4.
Zurück zum Zitat Cordeiro, C., Challapali, K., Birru, D., & Shankar, S. (2005). IEEE 802.22: The first worldwide wireless standard based on cognitive radios. In First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005 (pp. 328–337). Cordeiro, C., Challapali, K., Birru, D., & Shankar, S. (2005). IEEE 802.22: The first worldwide wireless standard based on cognitive radios. In First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005 (pp. 328–337).
5.
Zurück zum Zitat Chen, K.-C., Peng, Y.-J., Prasad, N. R., Liang, Y.-C., & Sun, S. (2008). Cognitive radio network architecture: Part I—general structure. In Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2008 (pp. 114–119). ACM. Chen, K.-C., Peng, Y.-J., Prasad, N. R., Liang, Y.-C., & Sun, S. (2008). Cognitive radio network architecture: Part I—general structure. In Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2008 (pp. 114–119). ACM.
6.
Zurück zum Zitat Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2006). Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer Networks, 50(13), 2127–2159.CrossRefMATH Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2006). Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer Networks, 50(13), 2127–2159.CrossRefMATH
7.
Zurück zum Zitat Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef
8.
Zurück zum Zitat Kaligineedi, P., Khabbazian, M., & Bhargava, V. K. (2010). Malicious user detection in a cognitive radio cooperative sensing system. IEEE Transactions on Wireless Communications, 9(8), 2488–2497.CrossRef Kaligineedi, P., Khabbazian, M., & Bhargava, V. K. (2010). Malicious user detection in a cognitive radio cooperative sensing system. IEEE Transactions on Wireless Communications, 9(8), 2488–2497.CrossRef
9.
Zurück zum Zitat Chen, R., Park, J.-M., Hou, Y. T., & Reed, J. H. (2008). Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine, 46(4), 50–55.CrossRef Chen, R., Park, J.-M., Hou, Y. T., & Reed, J. H. (2008). Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine, 46(4), 50–55.CrossRef
10.
Zurück zum Zitat Wang, W, Li, H, Sun, Y, & Han, Z. (2009). Attack-proof collaborative spectrum sensing in cognitive radio networks. In 43rd Annual Conference on Information Sciences and Systems, CISS 2009 (pp. 130–134). IEEE. Wang, W, Li, H, Sun, Y, & Han, Z. (2009). Attack-proof collaborative spectrum sensing in cognitive radio networks. In 43rd Annual Conference on Information Sciences and Systems, CISS 2009 (pp. 130–134). IEEE.
11.
Zurück zum Zitat Kaligineedi, P., Khabbazian, M., Bhargava, V. K. (2008). Secure cooperative sensing techniques for cognitive radio systems. In Proceedings of IEEE International Conference on Communication, ICC 2008 (pp. 3406–3410). IEEE. Kaligineedi, P., Khabbazian, M., Bhargava, V. K. (2008). Secure cooperative sensing techniques for cognitive radio systems. In Proceedings of IEEE International Conference on Communication, ICC 2008 (pp. 3406–3410). IEEE.
12.
Zurück zum Zitat Fragkiadakis, A. G., Tragos, E. Z., & Askoxylakis, I. G. (2013). A survey on security threats and detection techniques in cognitive radio network. IEEE Communications Surveys and Tutorials, 15(1), 428–445.CrossRef Fragkiadakis, A. G., Tragos, E. Z., & Askoxylakis, I. G. (2013). A survey on security threats and detection techniques in cognitive radio network. IEEE Communications Surveys and Tutorials, 15(1), 428–445.CrossRef
13.
Zurück zum Zitat Li, H., & Han, Z. (2010). Catching attacker(s) for collaborative spectrum sensing in cognitive radio systems: An abnormality detection approach. In IEEE Symposium on New Frontiers in Dynamic Spectrum (pp. 1–12). Li, H., & Han, Z. (2010). Catching attacker(s) for collaborative spectrum sensing in cognitive radio systems: An abnormality detection approach. In IEEE Symposium on New Frontiers in Dynamic Spectrum (pp. 1–12).
14.
Zurück zum Zitat Noon, E., & Li, H. (2010). Defending against hit-and-run attackers in collaborative spectrum sensing of cognitive radio networks: A point system. In Proceedings of the 71st IEEE Vehicular Technology Conference, VTC Spring 2010 (pp. 1–5). Noon, E., & Li, H. (2010). Defending against hit-and-run attackers in collaborative spectrum sensing of cognitive radio networks: A point system. In Proceedings of the 71st IEEE Vehicular Technology Conference, VTC Spring 2010 (pp. 1–5).
15.
Zurück zum Zitat Wang, W., Li, H., Sun, Y., & Han, Z. (2009). CatchIt: Detect malicious nodes in collaborative spectrum sensing. In Proceedings of the Global Communications Conference, GLOBECOM 2009 (pp. 1–6). IEEE. Wang, W., Li, H., Sun, Y., & Han, Z. (2009). CatchIt: Detect malicious nodes in collaborative spectrum sensing. In Proceedings of the Global Communications Conference, GLOBECOM 2009 (pp. 1–6). IEEE.
16.
Zurück zum Zitat Xu, S., Xu, Y., Ding, G., & Feng, S. (2013). A method of evaluating negative utility of information in presence of SSDF attack. In International Conference on Wireless Communications and Signal Processing, WCSP 2013 (pp. 1–5). IEEE. Xu, S., Xu, Y., Ding, G., & Feng, S. (2013). A method of evaluating negative utility of information in presence of SSDF attack. In International Conference on Wireless Communications and Signal Processing, WCSP 2013 (pp. 1–5). IEEE.
17.
Zurück zum Zitat Kalamkar, S. S., Banerjee, A., & Roychowdhury, R. (2012). Malicious user suppression for cooperative spectrum sensing in cognitive radio networks using Dixon’s outlier detection method. In Communications (NCC), 2012 National Conference on (pp. 1–5). IEEE. Kalamkar, S. S., Banerjee, A., & Roychowdhury, R. (2012). Malicious user suppression for cooperative spectrum sensing in cognitive radio networks using Dixon’s outlier detection method. In Communications (NCC), 2012 National Conference on (pp. 1–5). IEEE.
18.
Zurück zum Zitat Bansal, T., Chen, B., & Sinha, P. (2014). FastProbe: Malicious user detection in cognitive radio networks through active transmissions. In IEEE Conference on Computer Communications, INFOCOM, 2014 (pp. 2517–2525). Bansal, T., Chen, B., & Sinha, P. (2014). FastProbe: Malicious user detection in cognitive radio networks through active transmissions. In IEEE Conference on Computer Communications, INFOCOM, 2014 (pp. 2517–2525).
19.
Zurück zum Zitat Li, L., Li, F., & Zhu, F. (2013). A method to defense against cooperative SSDF attacks in cognitive radio networks, signal processing. In 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC) (pp. 1–6). Li, L., Li, F., & Zhu, F. (2013). A method to defense against cooperative SSDF attacks in cognitive radio networks, signal processing. In 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC) (pp. 1–6).
20.
Zurück zum Zitat Parvin, S., Han, S., Gao, L., Hussain, F., & Chang, E. (2010). Towards trust establishment for spectrum selection in cognitive radio networks. In 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010 (pp. 579–583). IEEE. Parvin, S., Han, S., Gao, L., Hussain, F., & Chang, E. (2010). Towards trust establishment for spectrum selection in cognitive radio networks. In 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010 (pp. 579–583). IEEE.
21.
Zurück zum Zitat Feng, J., Zhang, Y., Lu, G., & Zhang, L. (2013). Defend against collusive SSDF attack using trust in cooperative spectrum sensing environment. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 1656–1661). Feng, J., Zhang, Y., Lu, G., & Zhang, L. (2013). Defend against collusive SSDF attack using trust in cooperative spectrum sensing environment. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 1656–1661).
22.
Zurück zum Zitat Taghavi, E. M., & Abolhassani, B. (2011). A two step secure spectrum sensing algorithm using fuzzy logic for cognitive radio networks. International Journal of Communications, Network and System Sciences, 4(8), 507–513.CrossRef Taghavi, E. M., & Abolhassani, B. (2011). A two step secure spectrum sensing algorithm using fuzzy logic for cognitive radio networks. International Journal of Communications, Network and System Sciences, 4(8), 507–513.CrossRef
23.
Zurück zum Zitat Pei, Q., Yuan, B., Li, L., & Li, H. (2013). A sensing and etiquette reputation-based trust management for centralized cognitive radio networks. Neurocomputing, 101, 129–138.CrossRef Pei, Q., Yuan, B., Li, L., & Li, H. (2013). A sensing and etiquette reputation-based trust management for centralized cognitive radio networks. Neurocomputing, 101, 129–138.CrossRef
24.
Zurück zum Zitat Parvin, S., Hussain, F. K., & Hussain, O. K. (2013). Conjoint trust assessment for secure communication in cognitive radio networks. Mathematical and Computer Modelling, 58(5–6), 1340–1350.CrossRef Parvin, S., Hussain, F. K., & Hussain, O. K. (2013). Conjoint trust assessment for secure communication in cognitive radio networks. Mathematical and Computer Modelling, 58(5–6), 1340–1350.CrossRef
25.
Zurück zum Zitat Li, J., Feng, Z., Wei, Z., & Zhang, P. (2014). Security management based on trust determination in cognitive radio networks. EURASIP Journal on Advances in Signal Processing, 2014, 1–16.CrossRef Li, J., Feng, Z., Wei, Z., & Zhang, P. (2014). Security management based on trust determination in cognitive radio networks. EURASIP Journal on Advances in Signal Processing, 2014, 1–16.CrossRef
26.
Zurück zum Zitat Han, Y., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 98(10), 1755–1772.CrossRef Han, Y., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 98(10), 1755–1772.CrossRef
27.
Zurück zum Zitat Shameek, B., Debroy, S., Chatterjee, M. (2011). Trust computation through anomaly monitoring in distributed cognitive radio networks. In IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2011 (pp. 593–597). Shameek, B., Debroy, S., Chatterjee, M. (2011). Trust computation through anomaly monitoring in distributed cognitive radio networks. In IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2011 (pp. 593–597).
28.
Zurück zum Zitat Rawat, A. S., Anand, P., Chen, H., & Varshney, P. K. (2010). Countering byzantine attacks in cognitive radio networks. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 (pp. 3098–3101). Rawat, A. S., Anand, P., Chen, H., & Varshney, P. K. (2010). Countering byzantine attacks in cognitive radio networks. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 (pp. 3098–3101).
29.
Zurück zum Zitat Li, X., Zhou, F., & Yang, X. (2011). A multi-dimensional trust evaluation model for large-scale P2P computing. Journal of Parallel and Distributed Computing, 71(6), 837–847.CrossRefMATH Li, X., Zhou, F., & Yang, X. (2011). A multi-dimensional trust evaluation model for large-scale P2P computing. Journal of Parallel and Distributed Computing, 71(6), 837–847.CrossRefMATH
30.
Zurück zum Zitat Walpole, R. E., Myers, R. H., Myers, S. L., & Ye, K. (2012). Probability and statistics for engineers and scientists (9th ed.). Englewood Cliffs: Prentice Hall.MATH Walpole, R. E., Myers, R. H., Myers, S. L., & Ye, K. (2012). Probability and statistics for engineers and scientists (9th ed.). Englewood Cliffs: Prentice Hall.MATH
31.
Zurück zum Zitat Wang, F., Huang, C., Zhao, J., & Rong, C. (2008). IDMTM: A novel intrusion detection mechanism based on trust model for ad hoc networks. In 22nd International Conference on Advanced Information Networking and Applications, AINA 2008 (pp. 978–984). IEEE. Wang, F., Huang, C., Zhao, J., & Rong, C. (2008). IDMTM: A novel intrusion detection mechanism based on trust model for ad hoc networks. In 22nd International Conference on Advanced Information Networking and Applications, AINA 2008 (pp. 978–984). IEEE.
Metadaten
Titel
A Multi-factor Trust Management Scheme for Secure Spectrum Sensing in Cognitive Radio Networks
verfasst von
Sumit Kar
Srinivas Sethi
Ramesh Kumar Sahoo
Publikationsdatum
29.06.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4621-5

Weitere Artikel der Ausgabe 2/2017

Wireless Personal Communications 2/2017 Zur Ausgabe

Neuer Inhalt