Skip to main content
Erschienen in: Wireless Personal Communications 2/2021

31.03.2021

Fast and Accurate Detection of Malicious Users in Cooperative Spectrum Sensing Network

verfasst von: Jinsoo Hwang, Jeankyung Kim, Inje Sung, Duckwhan Yoo, Kichang Kim

Erschienen in: Wireless Personal Communications | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cooperative spectrum sensing allows users to detect available spectrum and utilize it. However, it is known that a few users can easily affect the cooperative decision at the fusion center by reporting falsified sensing data. The problem of detecting malicious users in cooperative spectrum sensing has been studied by numerous researchers. The basic approach is to compute the credibility of the reported data of each user and declare those with low credibility (below some threshold) as malicious. The computation of credibility can be based on several things such as pattern of historic behavior, entropy of the reported data, signal-to-noise ratio, etc. The credibility of the reported data of some user node can be expressed as an attack probability of that node. A node with higher attack probability will have lower credibility while a node with lower attack probability a higher credibility. Then, the problem of computing credibility of a node becomes the problem of computing attack probability of a node given a set of reported data. We can enumerate a list of all possible attack probability vectors for a set of nodes and the list of all possible energy level vectors of the channel for the observed time period, and compute which combination of attack probability and channel energy level vector can have the maximum probability to produce the reported channel energy level. However, the search space is quite large and grows exponentially as the number of user nodes and the number of time slots to observe increase. In this paper, we suggest algorithms that reduce the search space considerably and detect malicious users in linear time instead of exponential time. The suggested algorithms have been implemented and show promising results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
In actual cooperative sensing network, we have one more sign which is zero. That is each \(r_{k}\) can be positive, negative, or zero. In this case, the number of pr's is \(3^{K}\) for K users. However, to simplify the explanation, we assume there is no \(r_{k}\) whose value is zero.
 
2
We use Y[i][k] instead of \(y_{k}^{i}\) to express the algorithm in more clean way. Both of them represent the channel energy level reported by user k at time i.
 
3
There are 8 different pr's, so each pr covers roughly one eighth of the search space. Therefore each pr represents \(\frac{{11^{3} *1}}{8}\) cells for each h vector. Only 3 pr's and 5 h vectors have survived after the reduction. Therefore the size of the reduced search space is roughly 5*\(\frac{{11^{3} *3}}{8}\).
 
4
Table 9 omitted those cells that produce 0 probability to produce Y. Since pr = 110 for h = 00,010 from Table 8, we only compute probability to produce Y for r whose sign is positive, positive, and negative.
 
5
As explained before, there are three signs for the value of r: positive, zero, negative. In our experimentation, we take care of all three signs while in Sect. 4 and 5 we assumed only two kinds of sign, positive or negative, for the sake of argument.
 
Literatur
1.
Zurück zum Zitat Akyildiz, I. F., Brandon, F. R., & Balakrishnan, R. (2011). Cooperative spectrum sensing in cognitive radio networks: A survey. Physical Communication, 4, 40–62.CrossRef Akyildiz, I. F., Brandon, F. R., & Balakrishnan, R. (2011). Cooperative spectrum sensing in cognitive radio networks: A survey. Physical Communication, 4, 40–62.CrossRef
2.
Zurück zum Zitat Chen, R., Park, J. M., & Bian, K. (2008). Robust distributed spectrum sensing in cognitive radio networks. In Proceedings of IEEE INFOCOM, (pp. 1876–1884). Chen, R., Park, J. M., & Bian, K. (2008). Robust distributed spectrum sensing in cognitive radio networks. In Proceedings of IEEE INFOCOM, (pp. 1876–1884).
3.
Zurück zum Zitat Chen, C., Song, M., Xin, C., & Alam, M. (2012). A robust malicious user detection scheme in cooperative spectrum sensing. In IEEE GLOBECOM. Chen, C., Song, M., Xin, C., & Alam, M. (2012). A robust malicious user detection scheme in cooperative spectrum sensing. In IEEE GLOBECOM.
5.
Zurück zum Zitat Du, H., Fu, S., & Chu, H. (2015). A credibility-based defense ssdf attacks scheme for the expulsion of malicious users in cognitive radio. International Journal of Hybrid Information Technology, 8, 9.CrossRef Du, H., Fu, S., & Chu, H. (2015). A credibility-based defense ssdf attacks scheme for the expulsion of malicious users in cognitive radio. International Journal of Hybrid Information Technology, 8, 9.CrossRef
6.
Zurück zum Zitat Fatemieh, O., Farhadi, A., Chandra, R., & Gunter, C. A. (2011). Using classification to protect the integrity of spectrum measurements in white space networks. Network & Distributed Systems Security Symposium (NDSS), San Diego, CA, Feb 2011. Fatemieh, O., Farhadi, A., Chandra, R., & Gunter, C. A. (2011). Using classification to protect the integrity of spectrum measurements in white space networks. Network & Distributed Systems Security Symposium (NDSS), San Diego, CA, Feb 2011.
7.
Zurück zum Zitat Kaligineedi, P., Khabbazian, M., & Bhargava, V. (2008). Secure cooperative sensing techniques for cognitive radio systems. In Proceedings of IEEE International Conference on Communications, ICC, (pp. 3406–3410). Kaligineedi, P., Khabbazian, M., & Bhargava, V. (2008). Secure cooperative sensing techniques for cognitive radio systems. In Proceedings of IEEE International Conference on Communications, ICC, (pp. 3406–3410).
8.
Zurück zum Zitat Kaligineedi, P., Khabbazian, M., & Bhargava, V. (2010). Malicious user detection in a cognitive radio cooperative sensing system. IEEE Transactions on Wireless Communications, 9(8), 2488–2497.CrossRef Kaligineedi, P., Khabbazian, M., & Bhargava, V. (2010). Malicious user detection in a cognitive radio cooperative sensing system. IEEE Transactions on Wireless Communications, 9(8), 2488–2497.CrossRef
9.
11.
Zurück zum Zitat Luo, Z., Zhao, S., Lu, Z., Xu, J., & Sagduyu, Y. E. (2019). When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing. arXiv:1905.01430v1. Luo, Z., Zhao, S., Lu, Z., Xu, J., & Sagduyu, Y. E. (2019). When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing. arXiv:1905.01430v1.
12.
Zurück zum Zitat Mishra, S., Sahai, A, & Brodersen, R. (2006). Cooperative sensing among cognitive radios. In Proceedings of IEEE ICC 2006, (vol. 4, pp. 1658–1663). Mishra, S., Sahai, A, & Brodersen, R. (2006). Cooperative sensing among cognitive radios. In Proceedings of IEEE ICC 2006, (vol. 4, pp. 1658–1663).
13.
Zurück zum Zitat Nguyen-Thanh, N., & Koo, I. (2009). An enhanced cooperative spectrum sensing scheme based on evidence theory and reliability source evaluation in cognitive radio context. IEEE Communications Letters, 13(7), 492–494.CrossRef Nguyen-Thanh, N., & Koo, I. (2009). An enhanced cooperative spectrum sensing scheme based on evidence theory and reliability source evaluation in cognitive radio context. IEEE Communications Letters, 13(7), 492–494.CrossRef
14.
Zurück zum Zitat Peng, Q., Zeng, K., Jun, W., and Li, S. (2006). A distributed spectrum sensing scheme based on credibility and evidence theory. In Proceeding of the IEEE 17th International symposium on Personal, Indoor and Mobile Radio Communication, (pp. 1–5), Helsinki, Finland. Peng, Q., Zeng, K., Jun, W., and Li, S. (2006). A distributed spectrum sensing scheme based on credibility and evidence theory. In Proceeding of the IEEE 17th International symposium on Personal, Indoor and Mobile Radio Communication, (pp. 1–5), Helsinki, Finland.
15.
Zurück zum Zitat Peng, T., Chen, Y., Xiao, J., Zheng, Y., & Yang, J. (2016). Improved soft fusion-based cooperative spectrum sensing defense against SSDF attacks. In Proceedings of the 2016 International Conference on Computer, Information and Telecommunication Systems, CITS. Peng, T., Chen, Y., Xiao, J., Zheng, Y., & Yang, J. (2016). Improved soft fusion-based cooperative spectrum sensing defense against SSDF attacks. In Proceedings of the 2016 International Conference on Computer, Information and Telecommunication Systems, CITS.
17.
Zurück zum Zitat Rajasegarar, S., Leckie, C., & Palaniswami, M. (2015). Pattern based anomalous user detection in cognitive radio networks. In IEEE ICASSP. Rajasegarar, S., Leckie, C., & Palaniswami, M. (2015). Pattern based anomalous user detection in cognitive radio networks. In IEEE ICASSP.
20.
Zurück zum Zitat Ye, F., Zhang, X., & Li, Y. (2017). Collaborative spectrum sensing algorithm based on exponential entropy in cognitive radio networks. Symmetry, 9, 36.CrossRef Ye, F., Zhang, X., & Li, Y. (2017). Collaborative spectrum sensing algorithm based on exponential entropy in cognitive radio networks. Symmetry, 9, 36.CrossRef
Metadaten
Titel
Fast and Accurate Detection of Malicious Users in Cooperative Spectrum Sensing Network
verfasst von
Jinsoo Hwang
Jeankyung Kim
Inje Sung
Duckwhan Yoo
Kichang Kim
Publikationsdatum
31.03.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08112-z

Weitere Artikel der Ausgabe 2/2021

Wireless Personal Communications 2/2021 Zur Ausgabe

Neuer Inhalt