Skip to main content

2017 | OriginalPaper | Buchkapitel

Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis

verfasst von : Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng

Erschienen in: Computer Network Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cognitive radio networks (CRNs) is a promising technology that allows secondary users (SUs) extensively explore spectrum resource usage efficiency, while not introducing interference to licensed users. Due to the unregulated wireless network environment, CRNs are susceptible to various malicious entities. Thus, it is critical to detect anomalies in the first place. However, from the perspective of intrinsic features of CRNs, there is hardly in existence of an universal applicable anomaly detection scheme. Singular Spectrum Analysis (SSA) has been theoretically proven an optimal approach for accurate and quick detection of changes in the characteristics of a running (random) process. In addition, SSA is a model-free method and no parametric models have to be assumed for different types of anomalies, which makes it a universal anomaly detection scheme. In this paper, we introduce an adaptive parameter and component selection mechanism based on coherence for basic SSA method, upon which we built up a sliding window based anomaly detector in CRNs. Our experimental results indicate great accuracy of the SSA-based anomaly detector for multiple anomalies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Adelantado, F., Verikoukis, C.: Detection of malicious users in cognitive radio ad hoc networks: a non-parametric statistical approach. Ad Hoc Netw. 11(8), 2367–2380 (2013)CrossRef Adelantado, F., Verikoukis, C.: Detection of malicious users in cognitive radio ad hoc networks: a non-parametric statistical approach. Ad Hoc Netw. 11(8), 2367–2380 (2013)CrossRef
2.
Zurück zum Zitat Esch, J.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE 12(100), 3170–3171 (2012)CrossRef Esch, J.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE 12(100), 3170–3171 (2012)CrossRef
3.
Zurück zum Zitat Basseville, M., Nikiforov, I.V., et al.: Theory and Application, vol. 104. Prentice Hall, Englewood Cliffs (1993) Basseville, M., Nikiforov, I.V., et al.: Theory and Application, vol. 104. Prentice Hall, Englewood Cliffs (1993)
4.
Zurück zum Zitat Poor, H.V.: Hadjiliadis O Quickest detection, vol. 40. Cambridge University Press, Cambridge (2009) Poor, H.V.: Hadjiliadis O Quickest detection, vol. 40. Cambridge University Press, Cambridge (2009)
5.
Zurück zum Zitat Rawat, A.S., Anand, P., Chen, H., Varshney, P.K.: Countering byzantine attacks in cognitive radio networks. In: IEEE (2010) Rawat, A.S., Anand, P., Chen, H., Varshney, P.K.: Countering byzantine attacks in cognitive radio networks. In: IEEE (2010)
6.
Zurück zum Zitat Min, A.W., Shin, K.G., Hu, X.: Attack-tolerant distributed sensing for dynamic spectrum access networks. In: IEEE (2009) Min, A.W., Shin, K.G., Hu, X.: Attack-tolerant distributed sensing for dynamic spectrum access networks. In: IEEE (2009)
7.
Zurück zum Zitat Wang, B., Wu, Y., Liu, K.R., Clancy, T.C.: An anti-jamming stochastic game for cognitive radio networks. IEEE J. Sel. Areas Commun. 29(4), 877–889 (2011)CrossRef Wang, B., Wu, Y., Liu, K.R., Clancy, T.C.: An anti-jamming stochastic game for cognitive radio networks. IEEE J. Sel. Areas Commun. 29(4), 877–889 (2011)CrossRef
8.
Zurück zum Zitat Attar, A., Nakhai, M.R., Aghvami, A.H.: Cognitive radio game for secondary spectrum access problem. IEEE Trans. Wireless Commun. 8(4), 2121–2131 (2009)CrossRef Attar, A., Nakhai, M.R., Aghvami, A.H.: Cognitive radio game for secondary spectrum access problem. IEEE Trans. Wireless Commun. 8(4), 2121–2131 (2009)CrossRef
9.
Zurück zum Zitat Cormio, C., Chowdhury, K.R.: Common control channel design for cognitive radio wireless ad hoc networks using adaptive frequency hopping. Ad Hoc Netw. 8(4), 430–438 (2010)CrossRef Cormio, C., Chowdhury, K.R.: Common control channel design for cognitive radio wireless ad hoc networks using adaptive frequency hopping. Ad Hoc Netw. 8(4), 430–438 (2010)CrossRef
10.
11.
Zurück zum Zitat Rukhin, A.L.: Analysis of time series structure ssa and related techniques. Technometrics 44(3), 290–290 (2002)CrossRef Rukhin, A.L.: Analysis of time series structure ssa and related techniques. Technometrics 44(3), 290–290 (2002)CrossRef
12.
Zurück zum Zitat Yang, Z., Zhou, N., Polunchenko, A., Chen, Y.: Quick online detection of start time of disturbance in power grid. The IEEE GlobeCom 2015. Selected Areas in Communications Symposium, Smart Grid Communications Track, pp. 1–6. IEEE (2015) Yang, Z., Zhou, N., Polunchenko, A., Chen, Y.: Quick online detection of start time of disturbance in power grid. The IEEE GlobeCom 2015. Selected Areas in Communications Symposium, Smart Grid Communications Track, pp. 1–6. IEEE (2015)
13.
Zurück zum Zitat Wu, C., Chau, K.: Rainfall-runoff modeling using artificial neural network coupled with singular spectrum analysis. J. Hydrol. 399(3), 394–409 (2011)CrossRef Wu, C., Chau, K.: Rainfall-runoff modeling using artificial neural network coupled with singular spectrum analysis. J. Hydrol. 399(3), 394–409 (2011)CrossRef
14.
Zurück zum Zitat Oropeza, V., Sacchi, M.: Simultaneous seismic data denoising and reconstruction via multichannel singular spectrum analysis. Geophysics 76(3), V25–V32 (2011)CrossRef Oropeza, V., Sacchi, M.: Simultaneous seismic data denoising and reconstruction via multichannel singular spectrum analysis. Geophysics 76(3), V25–V32 (2011)CrossRef
15.
Zurück zum Zitat Moskvina, V., Zhigljavsky, A.: An algorithm based on singular spectrum analysis for change-point detection. Commun. Stat. Simul. Comput. 32(2), 319–352 (2003)MathSciNetCrossRefMATH Moskvina, V., Zhigljavsky, A.: An algorithm based on singular spectrum analysis for change-point detection. Commun. Stat. Simul. Comput. 32(2), 319–352 (2003)MathSciNetCrossRefMATH
16.
Zurück zum Zitat Chen, Z., Cooklev, T., Chen, C., Pomalaza-Ráez, C.: Modeling primary user emulation attacks and defenses in cognitive radio networks. IEEE (2009) Chen, Z., Cooklev, T., Chen, C., Pomalaza-Ráez, C.: Modeling primary user emulation attacks and defenses in cognitive radio networks. IEEE (2009)
17.
Zurück zum Zitat Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008)CrossRef Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008)CrossRef
18.
Zurück zum Zitat Mahamuni, S., Mishra, V.: Performance evaluation of spectrum detection in cognitive radio network. Int. J. Commun. Netw. Syst. Sci. 7(11), 485 (2014) Mahamuni, S., Mishra, V.: Performance evaluation of spectrum detection in cognitive radio network. Int. J. Commun. Netw. Syst. Sci. 7(11), 485 (2014)
19.
Zurück zum Zitat Marko Hoyhtya, S.P., Mammela, A.: Improving the performance of cognitive radios through classification, learning, and predictive channel selection. In: Advances in Electronics and Telecommunications (2011) Marko Hoyhtya, S.P., Mammela, A.: Improving the performance of cognitive radios through classification, learning, and predictive channel selection. In: Advances in Electronics and Telecommunications (2011)
20.
Zurück zum Zitat Rehmani, M.H., Viana, A.C., Khalife, H., Fdida, S.: Surf: a distributed channel selection strategy for data dissemination in multi-hop cognitive radio networks. Comput. Commun. 36(10), 1172–1185 (2013)CrossRef Rehmani, M.H., Viana, A.C., Khalife, H., Fdida, S.: Surf: a distributed channel selection strategy for data dissemination in multi-hop cognitive radio networks. Comput. Commun. 36(10), 1172–1185 (2013)CrossRef
21.
Zurück zum Zitat Sriram, K., Whitt, W.: Characterizing superposition arrival processes in packet multiplexers for voice and data. IEEE J. Sel. Areas Commun. 4(6), 833–846 (1986)CrossRef Sriram, K., Whitt, W.: Characterizing superposition arrival processes in packet multiplexers for voice and data. IEEE J. Sel. Areas Commun. 4(6), 833–846 (1986)CrossRef
Metadaten
Titel
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis
verfasst von
Qi Dong
Zekun Yang
Yu Chen
Xiaohua Li
Kai Zeng
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-65127-9_20