Skip to main content
Erschienen in: Wireless Personal Communications 4/2016

01.06.2016

Attack Detection Scheme Against Cooperative Spectrum Sensing Data Falsification on Common Control Channel in Cognitive Radio Networks

verfasst von: Yongxu Zou, Sang-Jo Yoo

Erschienen in: Wireless Personal Communications | Ausgabe 4/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cognitive radio is an intelligent technology designed to help secondary users (SUs) increase their opportunity to access unused spectrum channels while avoiding interference with the primary users. In cognitive radio networks (CRNs), to find the available channels, SUs execute cooperative spectrum sensing and exchange channels-related control information, namely an available channels list (ACL), on a common control channel (CCC) before determining which channels they may transmit. However, some SUs, defined as attackers, could create a security issue by sharing false ACL information with other SUs to increase their own utilization of the available channels, which significantly decreases the performance of CRNs. In this paper, we propose an efficient detection scheme for CCC security to identify any attacker among the cooperating SUs. In the proposed scheme, all SUs share their ACL information on the CCC, with an associated reputation, which is updated according to its own behavior in each cooperation round, to cooperatively identify attackers. An attacker will be excluded from cooperating group with the result that its updated reputation value exceeds a certain threshold. Simulation results show how to further improve the performance of the proposed scheme by choosing optimized thresholds. In addition, we also illustrate that the proposed scheme can achieve considerable performance improvement compared with a attack detection technique COOPON for secure ACL information exchange.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Select Areas in Communications, 23(2), 201–220.CrossRef Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Select Areas in Communications, 23(2), 201–220.CrossRef
2.
Zurück zum Zitat Yuan, Y., Bahl, P., Chandra, R., Moscibroda, T., & Wu, Y. (2007). KNOWS: Cognitive radio networks over white spaces. In Proceedigns of IEEE international symposium on new frontiers in dynamic spectrum access networks (DySPAN) (pp. 416–427). Yuan, Y., Bahl, P., Chandra, R., Moscibroda, T., & Wu, Y. (2007). KNOWS: Cognitive radio networks over white spaces. In Proceedigns of IEEE international symposium on new frontiers in dynamic spectrum access networks (DySPAN) (pp. 416–427).
3.
Zurück zum Zitat Xie, S., Liu, Y., & Zhang, Y. (2010). A parallel cooperative spectrum sensing in cognitive radio networks. IEEE Transactions on Vehicular Technology, 59(8), 4079–4092.CrossRef Xie, S., Liu, Y., & Zhang, Y. (2010). A parallel cooperative spectrum sensing in cognitive radio networks. IEEE Transactions on Vehicular Technology, 59(8), 4079–4092.CrossRef
4.
Zurück zum Zitat Chiang, J. T., Hu, Y. C., & Yadav, P. (2013). Secure cooperative spectrum sensing based on sybil-resilient clustering. In Proceedings of the IEEE global communications conference (GLOBALCOM) (pp. 1075–1081). Chiang, J. T., Hu, Y. C., & Yadav, P. (2013). Secure cooperative spectrum sensing based on sybil-resilient clustering. In Proceedings of the IEEE global communications conference (GLOBALCOM) (pp. 1075–1081).
5.
Zurück zum Zitat Ghurumuruhan, G., & Li, Y. (2007). Cooperative spectrum sensing in cognitive radio: Part II: Multiuser networks. IEEE Transactions on Wireless Communications, 6(6), 2214–2222.CrossRef Ghurumuruhan, G., & Li, Y. (2007). Cooperative spectrum sensing in cognitive radio: Part II: Multiuser networks. IEEE Transactions on Wireless Communications, 6(6), 2214–2222.CrossRef
6.
Zurück zum Zitat De Domenico, A., Calvanese Strinati, E., & Di Benedetto, M. (2012). A survey on MAC strategies for cognitive radio networks. IEEE Journal on Communications Surveys and Tutorials, 14(1), 21–44.CrossRef De Domenico, A., Calvanese Strinati, E., & Di Benedetto, M. (2012). A survey on MAC strategies for cognitive radio networks. IEEE Journal on Communications Surveys and Tutorials, 14(1), 21–44.CrossRef
7.
Zurück zum Zitat Jo, M., Han, L. Z., Kim, D., & Peter, H. (2013). Selfish attacks and detection in cognitive radio ad-hoc networks. IEEE Journal on Network, 27(3), 46–50.CrossRef Jo, M., Han, L. Z., Kim, D., & Peter, H. (2013). Selfish attacks and detection in cognitive radio ad-hoc networks. IEEE Journal on Network, 27(3), 46–50.CrossRef
8.
Zurück zum Zitat Yan, M., Du, L., Huang, L. F., & Xiao, L. (2011). Game-theoretic approach against selfish attacks in cognitive radio networks. In Proceedings of the IEEE/ACIS 10th international conference on computer and information science (ICIS) (pp. 58–61). Yan, M., Du, L., Huang, L. F., & Xiao, L. (2011). Game-theoretic approach against selfish attacks in cognitive radio networks. In Proceedings of the IEEE/ACIS 10th international conference on computer and information science (ICIS) (pp. 58–61).
9.
Zurück zum Zitat MacKenzie, A. B., & Wicker, S. B. (2001). Game theory and the design of self-configuring, adaptive wireless networks. IEEE Journal on Communication Magazine, 39(11), 126–131.CrossRef MacKenzie, A. B., & Wicker, S. B. (2001). Game theory and the design of self-configuring, adaptive wireless networks. IEEE Journal on Communication Magazine, 39(11), 126–131.CrossRef
10.
Zurück zum Zitat MacKenzie, A. B., & Wicker, S. B. (2003). Stability of multipacket slotted aloha with selfish users and perfect information. In Proceedings of the IEEE computer and communications (Vol. 3, no. 3). MacKenzie, A. B., & Wicker, S. B. (2003). Stability of multipacket slotted aloha with selfish users and perfect information. In Proceedings of the IEEE computer and communications (Vol. 3, no. 3).
11.
Zurück zum Zitat Yu, W., & Liu, K. J. R. (2002). Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Transactions on Mobile Computing, 6(5), 507–521.CrossRef Yu, W., & Liu, K. J. R. (2002). Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Transactions on Mobile Computing, 6(5), 507–521.CrossRef
12.
Zurück zum Zitat Nisan, N., & Ronen, A. (1999). Algorithmic mechanism design. In Proceedings of the thirty-first annual ACM symposium on theory of computing (pp. 129-140). Nisan, N., & Ronen, A. (1999). Algorithmic mechanism design. In Proceedings of the thirty-first annual ACM symposium on theory of computing (pp. 129-140).
13.
Zurück zum Zitat Howa, K. C., Maa, M., & Qin, Y. (2012). An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors. Computer Networks, 56(7), 2068–2079.CrossRef Howa, K. C., Maa, M., & Qin, Y. (2012). An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors. Computer Networks, 56(7), 2068–2079.CrossRef
14.
Zurück zum Zitat Wang, W. K., Li, H. S., & Letaief, K. B. (2007). Cluster-based cooperative spectrum sensing in cognitive radio systems. In Proceedings of the IEEE international conference on communications (ICC) (pp. 2511–2515). Wang, W. K., Li, H. S., & Letaief, K. B. (2007). Cluster-based cooperative spectrum sensing in cognitive radio systems. In Proceedings of the IEEE international conference on communications (ICC) (pp. 2511–2515).
15.
Zurück zum Zitat Wang, W. K., Li, H. S., Sun, Y., & Han, Z. (2009). CatchIt: Detect malicious users in collaborative spectrum sensing. In Proceedings of the IEEE global telecommunications conference (GLOBECOM) (pp. 1–6). Wang, W. K., Li, H. S., Sun, Y., & Han, Z. (2009). CatchIt: Detect malicious users in collaborative spectrum sensing. In Proceedings of the IEEE global telecommunications conference (GLOBECOM) (pp. 1–6).
16.
Zurück zum Zitat Safdar, G. A., & O‘Neill, M. (2009). Common control channel security framework for cognitive radio networks. In Proceedings of the IEEE 69th vehicular technology conference (pp. 1–5). Safdar, G. A., & O‘Neill, M. (2009). Common control channel security framework for cognitive radio networks. In Proceedings of the IEEE 69th vehicular technology conference (pp. 1–5).
17.
Zurück zum Zitat Kyasanur, P., & Vaidya, N. H. (2005). Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing, 4(5), 502–516.CrossRef Kyasanur, P., & Vaidya, N. H. (2005). Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing, 4(5), 502–516.CrossRef
18.
Zurück zum Zitat Pawelczak, P., Pollin, S., & So, H. S. (2005). Performance analysis of multichannel medium access control algorithms for opportunistic spectrum access. IEEE Transactions on Vehicular Technology, 58(6), 3014–3031.CrossRef Pawelczak, P., Pollin, S., & So, H. S. (2005). Performance analysis of multichannel medium access control algorithms for opportunistic spectrum access. IEEE Transactions on Vehicular Technology, 58(6), 3014–3031.CrossRef
19.
Zurück zum Zitat Ma, L. P., Han, X. F., & Shen, C. C. (2005). Dynamic open spectrum sharing mac protocol for wireless ad hoc networks. In Proceedings of the IEEE international symposium on new frontiers in dynamic spectrum access neworks (DySPAN) (pp. 203–213). Ma, L. P., Han, X. F., & Shen, C. C. (2005). Dynamic open spectrum sharing mac protocol for wireless ad hoc networks. In Proceedings of the IEEE international symposium on new frontiers in dynamic spectrum access neworks (DySPAN) (pp. 203–213).
20.
Zurück zum Zitat Pawelczak, P., Prasad, V., & Li, X. (2005). Cognitive radio emergency networks–requirements and design. In Proceedings of the IEEE international symposium on new frontiers in dynamic spectrum access neworks (DySPAN) (pp. 601–606). Pawelczak, P., Prasad, V., & Li, X. (2005). Cognitive radio emergency networks–requirements and design. In Proceedings of the IEEE international symposium on new frontiers in dynamic spectrum access neworks (DySPAN) (pp. 601–606).
21.
Zurück zum Zitat Konorski, J. (2001). Protection of fairness for multimedia traffic streams in a non-cooperative wireless LAN setting. Lecture notes in computer science protocols for multimedis systems (pp. 116–129). Konorski, J. (2001). Protection of fairness for multimedia traffic streams in a non-cooperative wireless LAN setting. Lecture notes in computer science protocols for multimedis systems (pp. 116–129).
22.
Zurück zum Zitat Konorski, J. (2002). Multiple access in ad-hoc wireless LANs with noncooperative stations. Lecture notes in computer science for networking technologies (pp. 1141–1146). Konorski, J. (2002). Multiple access in ad-hoc wireless LANs with noncooperative stations. Lecture notes in computer science for networking technologies (pp. 1141–1146).
23.
Zurück zum Zitat Zou, Y. X., & Yoo, S. J. (2015). A cooperative attack detection scheme for common control channel security in cognitive radio networks. In The senventh international conference on ubiquitous and future networks (Unpublished but acceptted). Zou, Y. X., & Yoo, S. J. (2015). A cooperative attack detection scheme for common control channel security in cognitive radio networks. In The senventh international conference on ubiquitous and future networks (Unpublished but acceptted).
24.
Zurück zum Zitat Ding, L., Melodia, T., Batalama, S. N., Matyjas, J. D., & Medley, M. J. (2010). Cross-layer routing and dynamic spectrum allocation in cognitive radio ad hoc networks. IEEE Transaction on Vehicular Technology, 59(4), 1969–1979.CrossRef Ding, L., Melodia, T., Batalama, S. N., Matyjas, J. D., & Medley, M. J. (2010). Cross-layer routing and dynamic spectrum allocation in cognitive radio ad hoc networks. IEEE Transaction on Vehicular Technology, 59(4), 1969–1979.CrossRef
25.
Zurück zum Zitat Savas, O., Ahn, G. S., & Deng, J. (2014). Securing cognitive radio networks against belief manipulation attacks via trust management. In Proceedings of the IEEE 2014 international conference on collaboration technologies and system (CTS) (pp. 158–165). Savas, O., Ahn, G. S., & Deng, J. (2014). Securing cognitive radio networks against belief manipulation attacks via trust management. In Proceedings of the IEEE 2014 international conference on collaboration technologies and system (CTS) (pp. 158–165).
26.
Zurück zum Zitat Huang, X. G., Zou, Y. X., Shen, B., & Chen, Q. B. (2014). Dynamic suspicious reputation based collaborative sensing in cognitive radio networks. In Proceedings of the IEEE international symposium on communications and information technologies (ISCIT) (pp. 112–116). Huang, X. G., Zou, Y. X., Shen, B., & Chen, Q. B. (2014). Dynamic suspicious reputation based collaborative sensing in cognitive radio networks. In Proceedings of the IEEE international symposium on communications and information technologies (ISCIT) (pp. 112–116).
27.
Zurück zum Zitat Li, S., Zhu, H. J., Yang, B., Chen, C., & Guan, X. P. (2011). Believe yourself: A user-centric misbehavior detection scheme for secure collaborative spectrum sensing. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1–5). Li, S., Zhu, H. J., Yang, B., Chen, C., & Guan, X. P. (2011). Believe yourself: A user-centric misbehavior detection scheme for secure collaborative spectrum sensing. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1–5).
28.
Zurück zum Zitat Rao, S. (2009). Engineering optimization: Theory and practice. New York: Wiley.CrossRef Rao, S. (2009). Engineering optimization: Theory and practice. New York: Wiley.CrossRef
29.
Zurück zum Zitat Shlens, J. (2007). Notes on Kullback–Leibler divergence and likelihood theory. La Jolla: Systems Neurobiology Laboratory, Salk Institute for Biological Studies. Shlens, J. (2007). Notes on Kullback–Leibler divergence and likelihood theory. La Jolla: Systems Neurobiology Laboratory, Salk Institute for Biological Studies.
30.
Zurück zum Zitat Hyder, C. S., Grebur, B., Li, X., & Ellison, M. (2014). ARC: Adaptive reputation based clustering against spectrum sensing data falsification attacksD. IEEE Transaction on Mobile Computing, 13(8), 1707–1719.CrossRef Hyder, C. S., Grebur, B., Li, X., & Ellison, M. (2014). ARC: Adaptive reputation based clustering against spectrum sensing data falsification attacksD. IEEE Transaction on Mobile Computing, 13(8), 1707–1719.CrossRef
Metadaten
Titel
Attack Detection Scheme Against Cooperative Spectrum Sensing Data Falsification on Common Control Channel in Cognitive Radio Networks
verfasst von
Yongxu Zou
Sang-Jo Yoo
Publikationsdatum
01.06.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3216-x

Weitere Artikel der Ausgabe 4/2016

Wireless Personal Communications 4/2016 Zur Ausgabe

Neuer Inhalt