Skip to main content
Top

2019 | OriginalPaper | Chapter

Identification and Elimination of Abnormal Information in Electromagnetic Spectrum Cognition

Authors : Haojun Zhao, Ruowu Wu, Hui Han, Xiang Chen, Yuyao Li, Yun Lin

Published in: Advanced Hybrid Information Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The electromagnetic spectrum is an important national strategic resource. Spectrum sensing data falsification (SSDF) is an attack method that destroys cognitive networks and makes them ineffective. Malicious users capture sensory nodes and tamper with data through cyber attacks, and make the cognitive network biased or even completely reversed. In order to eliminate the negative impact caused by abnormal information in spectrum sensing and ensure the desired effect, this thesis starts with the improvement of the performance of cooperative spectrum sensing, and constructs a robust sensing user evaluation reference system. At the same time, considering the dynamic changes of user attributes, the sensory data is identified online. Finally, the attacker identification and elimination algorithm is improved based on the proposed reference system. In addition, this paper verifies the identification performance of the proposed reference system through simulation. The simulation results show that the proposed reference system still maintain a good defense effect even if the proportion of malicious users in the reference is greater than 50%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Benjamin, R.: Security considerations in communications systems and networks. In: Communications Speech & Vision IEEE Proceedings I, vol. 137, no. 2, pp. 61–72, April 1990 Benjamin, R.: Security considerations in communications systems and networks. In: Communications Speech & Vision IEEE Proceedings I, vol. 137, no. 2, pp. 61–72, April 1990
2.
go back to reference Li, H., Han, Z.: Catch me if you can: an abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Trans. Wirel. Commun. 9(11), 3554–3565 (2010)CrossRef Li, H., Han, Z.: Catch me if you can: an abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Trans. Wirel. Commun. 9(11), 3554–3565 (2010)CrossRef
3.
go back to reference Rawat, S., Anand, P., Chen, H., et al.: Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Trans. Signal Process. 59(2), 774–786 (2011)MathSciNetCrossRef Rawat, S., Anand, P., Chen, H., et al.: Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Trans. Signal Process. 59(2), 774–786 (2011)MathSciNetCrossRef
4.
go back to reference Zeng, K., Paweczak, P., Cabri, D.: Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Commun. Lett. 14(3), 226–228 (2010)CrossRef Zeng, K., Paweczak, P., Cabri, D.: Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Commun. Lett. 14(3), 226–228 (2010)CrossRef
5.
go back to reference Chen, C., Song, M., Xin, C., et al.: A robust malicious user detection scheme in cooperative spectrum sensing. In: Proceedings of the IEEE Global Telecommunication Conference, pp. 4856–4861 (2012) Chen, C., Song, M., Xin, C., et al.: A robust malicious user detection scheme in cooperative spectrum sensing. In: Proceedings of the IEEE Global Telecommunication Conference, pp. 4856–4861 (2012)
6.
go back to reference Penna, F., Sun, Y., Dolecek, L., et al.: Detecting and counteracting statistical attacks in cooperative spectrum sensing. IEEE Trans. Signal Process. 60(4), 1806–1822 (2012)MathSciNetCrossRef Penna, F., Sun, Y., Dolecek, L., et al.: Detecting and counteracting statistical attacks in cooperative spectrum sensing. IEEE Trans. Signal Process. 60(4), 1806–1822 (2012)MathSciNetCrossRef
7.
go back to reference Urkowitz, H.: Energy detection of unknown deterministic signals. Proc. IEEE 55(4), 523–531 (1967)CrossRef Urkowitz, H.: Energy detection of unknown deterministic signals. Proc. IEEE 55(4), 523–531 (1967)CrossRef
8.
go back to reference Chen, R., Park, J.M., Bian, K.: Robust distributed spectrum sensing in cognitive radio networks. In: INFOCOM 2008, Phoenix, AZ, 13–18 April 2008 Chen, R., Park, J.M., Bian, K.: Robust distributed spectrum sensing in cognitive radio networks. In: INFOCOM 2008, Phoenix, AZ, 13–18 April 2008
9.
go back to reference He, X., Dai, H., Ning, P.: A byzantine attack defender in cognitive radio networks: the conditional frequency check. IEEE Trans. Wirel. Commun. 12(5), 2512–2523 (2013)CrossRef He, X., Dai, H., Ning, P.: A byzantine attack defender in cognitive radio networks: the conditional frequency check. IEEE Trans. Wirel. Commun. 12(5), 2512–2523 (2013)CrossRef
10.
go back to reference Solla, S.A., Winther, O.: Optimal perceptron learning: an on-line Bayesian approach. In: Saad, D. (ed.) On-Line Learning in Neural Networks, pp. 379–398. Cambridge University Press, Cambridge (1998) Solla, S.A., Winther, O.: Optimal perceptron learning: an on-line Bayesian approach. In: Saad, D. (ed.) On-Line Learning in Neural Networks, pp. 379–398. Cambridge University Press, Cambridge (1998)
11.
go back to reference Noh, G., Lim, S., Lee, S., et al.: Goodness-of-fit-based malicious user detection in cooperative spectrum sensing. In: Proceedings of the 76th IEEE Vehicular Technology Conference, pp. 1–5 (2012) Noh, G., Lim, S., Lee, S., et al.: Goodness-of-fit-based malicious user detection in cooperative spectrum sensing. In: Proceedings of the 76th IEEE Vehicular Technology Conference, pp. 1–5 (2012)
12.
go back to reference Althunibat, S., Denise, B.J., Granelli, F.: Identification and punishment policies for spectrum sensing data falsification attackers using delivery-based assessment. IEEE Trans. Veh. Technol. 65(9), 7308–7321 (2016)CrossRef Althunibat, S., Denise, B.J., Granelli, F.: Identification and punishment policies for spectrum sensing data falsification attackers using delivery-based assessment. IEEE Trans. Veh. Technol. 65(9), 7308–7321 (2016)CrossRef
13.
go back to reference Zhao, Y., Song, M., Xin, C.: A weighted cooperative spectrum sensing framework for infrastructure-based cognitive radio networks. Comput. Commun. 2011(34), 1510–1517 (2011)CrossRef Zhao, Y., Song, M., Xin, C.: A weighted cooperative spectrum sensing framework for infrastructure-based cognitive radio networks. Comput. Commun. 2011(34), 1510–1517 (2011)CrossRef
14.
go back to reference Jo, M., Han, L., Kim, D.: Selfish attacks and detection in cognitive radio ad-hoc networks. IEEE Network 27(3), 46–50 (2013)CrossRef Jo, M., Han, L., Kim, D.: Selfish attacks and detection in cognitive radio ad-hoc networks. IEEE Network 27(3), 46–50 (2013)CrossRef
Metadata
Title
Identification and Elimination of Abnormal Information in Electromagnetic Spectrum Cognition
Authors
Haojun Zhao
Ruowu Wu
Hui Han
Xiang Chen
Yuyao Li
Yun Lin
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-19086-6_9

Premium Partner