Skip to main content
Top

2017 | OriginalPaper | Chapter

Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis

Authors : Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng

Published in: Computer Network Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cognitive radio networks (CRNs) is a promising technology that allows secondary users (SUs) extensively explore spectrum resource usage efficiency, while not introducing interference to licensed users. Due to the unregulated wireless network environment, CRNs are susceptible to various malicious entities. Thus, it is critical to detect anomalies in the first place. However, from the perspective of intrinsic features of CRNs, there is hardly in existence of an universal applicable anomaly detection scheme. Singular Spectrum Analysis (SSA) has been theoretically proven an optimal approach for accurate and quick detection of changes in the characteristics of a running (random) process. In addition, SSA is a model-free method and no parametric models have to be assumed for different types of anomalies, which makes it a universal anomaly detection scheme. In this paper, we introduce an adaptive parameter and component selection mechanism based on coherence for basic SSA method, upon which we built up a sliding window based anomaly detector in CRNs. Our experimental results indicate great accuracy of the SSA-based anomaly detector for multiple anomalies.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Adelantado, F., Verikoukis, C.: Detection of malicious users in cognitive radio ad hoc networks: a non-parametric statistical approach. Ad Hoc Netw. 11(8), 2367–2380 (2013)CrossRef Adelantado, F., Verikoukis, C.: Detection of malicious users in cognitive radio ad hoc networks: a non-parametric statistical approach. Ad Hoc Netw. 11(8), 2367–2380 (2013)CrossRef
2.
go back to reference Esch, J.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE 12(100), 3170–3171 (2012)CrossRef Esch, J.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE 12(100), 3170–3171 (2012)CrossRef
3.
go back to reference Basseville, M., Nikiforov, I.V., et al.: Theory and Application, vol. 104. Prentice Hall, Englewood Cliffs (1993) Basseville, M., Nikiforov, I.V., et al.: Theory and Application, vol. 104. Prentice Hall, Englewood Cliffs (1993)
4.
go back to reference Poor, H.V.: Hadjiliadis O Quickest detection, vol. 40. Cambridge University Press, Cambridge (2009) Poor, H.V.: Hadjiliadis O Quickest detection, vol. 40. Cambridge University Press, Cambridge (2009)
5.
go back to reference Rawat, A.S., Anand, P., Chen, H., Varshney, P.K.: Countering byzantine attacks in cognitive radio networks. In: IEEE (2010) Rawat, A.S., Anand, P., Chen, H., Varshney, P.K.: Countering byzantine attacks in cognitive radio networks. In: IEEE (2010)
6.
go back to reference Min, A.W., Shin, K.G., Hu, X.: Attack-tolerant distributed sensing for dynamic spectrum access networks. In: IEEE (2009) Min, A.W., Shin, K.G., Hu, X.: Attack-tolerant distributed sensing for dynamic spectrum access networks. In: IEEE (2009)
7.
go back to reference Wang, B., Wu, Y., Liu, K.R., Clancy, T.C.: An anti-jamming stochastic game for cognitive radio networks. IEEE J. Sel. Areas Commun. 29(4), 877–889 (2011)CrossRef Wang, B., Wu, Y., Liu, K.R., Clancy, T.C.: An anti-jamming stochastic game for cognitive radio networks. IEEE J. Sel. Areas Commun. 29(4), 877–889 (2011)CrossRef
8.
go back to reference Attar, A., Nakhai, M.R., Aghvami, A.H.: Cognitive radio game for secondary spectrum access problem. IEEE Trans. Wireless Commun. 8(4), 2121–2131 (2009)CrossRef Attar, A., Nakhai, M.R., Aghvami, A.H.: Cognitive radio game for secondary spectrum access problem. IEEE Trans. Wireless Commun. 8(4), 2121–2131 (2009)CrossRef
9.
go back to reference Cormio, C., Chowdhury, K.R.: Common control channel design for cognitive radio wireless ad hoc networks using adaptive frequency hopping. Ad Hoc Netw. 8(4), 430–438 (2010)CrossRef Cormio, C., Chowdhury, K.R.: Common control channel design for cognitive radio wireless ad hoc networks using adaptive frequency hopping. Ad Hoc Netw. 8(4), 430–438 (2010)CrossRef
10.
11.
go back to reference Rukhin, A.L.: Analysis of time series structure ssa and related techniques. Technometrics 44(3), 290–290 (2002)CrossRef Rukhin, A.L.: Analysis of time series structure ssa and related techniques. Technometrics 44(3), 290–290 (2002)CrossRef
12.
go back to reference Yang, Z., Zhou, N., Polunchenko, A., Chen, Y.: Quick online detection of start time of disturbance in power grid. The IEEE GlobeCom 2015. Selected Areas in Communications Symposium, Smart Grid Communications Track, pp. 1–6. IEEE (2015) Yang, Z., Zhou, N., Polunchenko, A., Chen, Y.: Quick online detection of start time of disturbance in power grid. The IEEE GlobeCom 2015. Selected Areas in Communications Symposium, Smart Grid Communications Track, pp. 1–6. IEEE (2015)
13.
go back to reference Wu, C., Chau, K.: Rainfall-runoff modeling using artificial neural network coupled with singular spectrum analysis. J. Hydrol. 399(3), 394–409 (2011)CrossRef Wu, C., Chau, K.: Rainfall-runoff modeling using artificial neural network coupled with singular spectrum analysis. J. Hydrol. 399(3), 394–409 (2011)CrossRef
14.
go back to reference Oropeza, V., Sacchi, M.: Simultaneous seismic data denoising and reconstruction via multichannel singular spectrum analysis. Geophysics 76(3), V25–V32 (2011)CrossRef Oropeza, V., Sacchi, M.: Simultaneous seismic data denoising and reconstruction via multichannel singular spectrum analysis. Geophysics 76(3), V25–V32 (2011)CrossRef
15.
go back to reference Moskvina, V., Zhigljavsky, A.: An algorithm based on singular spectrum analysis for change-point detection. Commun. Stat. Simul. Comput. 32(2), 319–352 (2003)MathSciNetCrossRefMATH Moskvina, V., Zhigljavsky, A.: An algorithm based on singular spectrum analysis for change-point detection. Commun. Stat. Simul. Comput. 32(2), 319–352 (2003)MathSciNetCrossRefMATH
16.
go back to reference Chen, Z., Cooklev, T., Chen, C., Pomalaza-Ráez, C.: Modeling primary user emulation attacks and defenses in cognitive radio networks. IEEE (2009) Chen, Z., Cooklev, T., Chen, C., Pomalaza-Ráez, C.: Modeling primary user emulation attacks and defenses in cognitive radio networks. IEEE (2009)
17.
go back to reference Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008)CrossRef Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008)CrossRef
18.
go back to reference Mahamuni, S., Mishra, V.: Performance evaluation of spectrum detection in cognitive radio network. Int. J. Commun. Netw. Syst. Sci. 7(11), 485 (2014) Mahamuni, S., Mishra, V.: Performance evaluation of spectrum detection in cognitive radio network. Int. J. Commun. Netw. Syst. Sci. 7(11), 485 (2014)
19.
go back to reference Marko Hoyhtya, S.P., Mammela, A.: Improving the performance of cognitive radios through classification, learning, and predictive channel selection. In: Advances in Electronics and Telecommunications (2011) Marko Hoyhtya, S.P., Mammela, A.: Improving the performance of cognitive radios through classification, learning, and predictive channel selection. In: Advances in Electronics and Telecommunications (2011)
20.
go back to reference Rehmani, M.H., Viana, A.C., Khalife, H., Fdida, S.: Surf: a distributed channel selection strategy for data dissemination in multi-hop cognitive radio networks. Comput. Commun. 36(10), 1172–1185 (2013)CrossRef Rehmani, M.H., Viana, A.C., Khalife, H., Fdida, S.: Surf: a distributed channel selection strategy for data dissemination in multi-hop cognitive radio networks. Comput. Commun. 36(10), 1172–1185 (2013)CrossRef
21.
go back to reference Sriram, K., Whitt, W.: Characterizing superposition arrival processes in packet multiplexers for voice and data. IEEE J. Sel. Areas Commun. 4(6), 833–846 (1986)CrossRef Sriram, K., Whitt, W.: Characterizing superposition arrival processes in packet multiplexers for voice and data. IEEE J. Sel. Areas Commun. 4(6), 833–846 (1986)CrossRef
Metadata
Title
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis
Authors
Qi Dong
Zekun Yang
Yu Chen
Xiaohua Li
Kai Zeng
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-65127-9_20

Premium Partner