Weitere Artikel dieser Ausgabe durch Wischen aufrufen
The authors declare that they have no competing interests.
Spectrum sensing is one of the most essential components of cognitive radio since it detects whether the spectrum is available or not. However, spectrum sensing accuracy is often degraded due to path loss, interference, and shadowing. Cooperative spectrum sensing (CSS) is one of the proposed solutions to overcome these challenges. It is a key function for dynamic spectrum access that can increase largely the reliability in cognitive radio networks. In fact, several users cooperate to detect the availability of a wireless channel by exploiting spatial diversity. However, cooperative sensing is also facing some series of security threats. In this paper, we focus on two major problems. The first problem is the localization preservation of the secondary users. In fact, malicious users can exploit spatial diversity to localize a secondary user by linking his location-dependent sensing report to his physical position. The existing solutions present a high level of complexity which decreases the performance of the systems. The second problem is the data injection attack, in which malicious CR users may affect the decisions taken by the cognitive users by providing false information, introducing spectrum sensing data falsification (SSDF). In fact, they can submit false sensing reports containing power measurements much larger (or smaller) than the true value to inflate (or deflate) the final average, in which case the fusion center may falsely determine that the channel is busy (or vacant) which increases the false alarm and miss detection probabilities. In this paper, we propose a novel scheme to overcome these problems: iterative per cluster malicious detection (IPCMD). It utilizes applied cryptographic techniques to allow the fusion center (FC) to securely obtain the aggregated result from various secondary users without learning each individual report. IPCMD combines the aggregated sensing reports with their reputation scores during data fusion. The proposed scheme is based on a new algorithm for key generation which can significantly reduce the key management complexity and consequently increase the system performance. Therefore, it can enable secure cooperative spectrum sensing and improve the secondary user location privacy.
MA McHenry, NSF spectrum occupancy measurements project summary. shared spectrum co. report (2005).
H Soy, Z Özdemir, M Bayrak, R Hamila, N Al-Dhahir, Decentralized multiuser diversity with opportunistic packet transmission in MIMO wireless sensor networks. ELSEVIER AEU Int. J. Electron. Commun. 76(1), 910–925 (2013). CrossRef
IJ Mitola, in Nationa Telesystems Conference, 1992. NTC-92.l. Software radios—survey, critical evaluation and future directions, (1992), pp. 13–151323, doi: 10.1109/NTC.1992.267870.
A Bhowmick, SD Roy, S Kundu, in Twenty First National Conference on Communications (NCC), 2015. A hybrid cooperative spectrum sensing for cognitive radio networks in presence of fading, (2015), pp. 1–6, doi: 10.1109/NCC.2015.7084887.
A Sahai, N Hoven, R Tandra, in Proceedings of Allerton Conference on Communications, Control and Computing. Some fundamental limits in cognitive radio, (2004).
AE Shafie, N Al-Dhahir, R Hamila, in 2015 IEEE Wireless Communications and Networking Conference, WCNC 2015, New Orleans, LA, USA, March 9–12, 2015. Exploiting sparsity of relay-assisted cognitive radio networks, (2015), pp. 1153–1158, doi: 10.1109/WCNC.2015.7127632. http://dx.doi.org/10.1109/WCNC.2015.7127632.
AC Sumathi, R Vidhyapriya, in International Conference on Intelligent Systems Design and Applications (ISDA), 2012 12th. Security in cognitive radio networks—a survey, (2012), pp. 114–118, doi: 10.1109/ISDA.2012.6416522.
R Saeed, in Mosharaka International Conference on Communications, Computers and Applications, 2008. MIC-CCA 2008. Cognitive radio and advanced spectrum management, (2008), doi: 10.1109/MICCCA.2008.4669836.
A Celik, R Saifan, AE Kamal, in International Conference on Computing, Networking and Communications (ICNC), 2015. Sensing strategies for channel discovery in cognitive radio networks, (2015), pp. 637–641, doi: 10.1109/ICCNC.2015.7069419.
M Cardenas-Juarez, U Pineda-Rico, E Stevens-Navarro, M Ghogho, in International Conference on Electronics, Communications and Computers (CONIELECOMP), 2015. Sensing-throughput optimization for cognitive radio networks under outage constraints and hard decision fusion, (2015), pp. 80–86, doi: 10.1109/CONIELECOMP.2015.7086929.
KK Chauhan, AKS Sanger, in International Conference on Electronics and Communication Systems (ICECS), 2014. Survey of security threats and attacks in cognitive radio networks, (2014), pp. 1–5, doi: 10.1109/ECS.2014.6892537.
S Li, H Zhu, Z Gao, X Guan, K Xing, X Shen, in IEEE Proceedings INFOCOM, 2012. Location privacy preservation in collaborative spectrum sensing, (2012), pp. 729–737, doi: 10.1109/INFCOM.2012.6195818.
O Fatemieh, A Farhadi, R Chandra, C Gunter, in 18th Annual Network & Distributed System Security Symposium (NDSS). Using classification to protect the integrity of spectrum measurements in white space networks (Internet Society, 2011). http://research.microsoft.com/apps/pubs/default.aspx?id=141605.
S Althunibat, BJ Denise, F Granelli, in Globecom Workshops (GC Wkshps), 2014. Secure cluster-based cooperative spectrum sensing against malicious attackers, (2014), pp. 1284–1289, doi: 10.1109/GLOCOMW.2014.7063610.
W Wang, L Chen, KG Shin, L Duan, in INFOCOM, 2014 Proceedings IEEE. Secure cooperative spectrum sensing and access against intelligent malicious behaviors, (2014), pp. 1267–1275, doi: 10.1109/INFOCOM.2014.6848059.
L Khalid, A Anpalagan, in Personal Indoor and Mobile Radio Communications (PIMRC), 2011 IEEE 22nd International Symposium On. A weighted fusion scheme for cooperative spectrum sensing based on past decisions, (2011), pp. 354–358, doi: 10.1109/PIMRC.2011.6139981.
R Zhang, J Zhang, Y Zhang, C Zhang, in IEEE Proceedings INFOCOM, 2013. Secure crowdsourcing-based cooperative spectrum sensing, (2013), pp. 2526–2534, doi: 10.1109/INFCOM.2013.6567059.
SJ Shellhammer, SSND Tandra, J Tomcik, Performance of power detector sensors of DTV signals in IEEE 802.22 WRANs. 2000 5th Int. Symp. Antennas Propag. EM Theory. ISAPE 2000 (IEEE Cat. No.00EX417) (2006). doi: 10.1145/1234388.1234392.
K Siwiak, Radiowave Propagation and Antennas for Personal Communications, Second Edition, 2nd edn (Artech House, Inc., Norwood, 1998).
TS Rappaport, Wireless communications: principles and practice, second edition, 2nd edn (Pearson Education, Singapore, 2002).
F Penna, Y Sun, L Dolecek, D Cabric, in IEEE Global Telecommunications Conference (GLOBECOM 2011), 2011. Joint spectrum sensing and detection of malicious nodes via belief propagation, (2011), pp. 1–5, doi: 10.1109/GLOCOM.2011.6133986.
F Hu, S Wang, Z Cheng, in IEEE Military Communications Conference, 2009. MILCOM 2009. Secure cooperative spectrum sensing for cognitive radio networks, (2009), pp. 1–7, doi: 10.1109/MILCOM.2009.5379961.
M Zhou, J Shen, H Chen, L Xie, in IEEE Wireless Communications and Networking Conference (WCNC), 2013. A cooperative spectrum sensing scheme based on the Bayesian reputation model in cognitive radio networks, (2013), pp. 614–619, doi: 10.1109/WCNC.2013.6554634.
R Chen, J-M Park, K Bian, in The 27th Conference on Computer Communications. IEEE INFOCOM 2008. Robust distributed spectrum sensing in cognitive radio networks, (2008), doi: 10.1109/INFOCOM.2008.251.
AW Min, KG Shin, X Hu, in 17th IEEE International Conference on Network Protocols, 2009. ICNP 2009. Attack-tolerant distributed sensing for dynamic spectrum access networks, (2009), pp. 294–303, doi: 10.1109/ICNP.2009.5339675.
- Location privacy preservation in secure crowdsourcing-based cooperative spectrum sensing
- Springer International Publishing
EURASIP Journal on Wireless Communications and Networking
Elektronische ISSN: 1687-1499
Neuer Inhalt/© ITandMEDIA