Skip to main content
Log in

Research on spectrum sensing data falsification attack detection algorithm in cognitive Internet of Things

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) is a new paradigm for connecting various heterogeneous networks. Cognitive radio (CR) adopts cooperative spectrum sensing (CSS) to realize the secondary utilization of idle spectrum by unauthorized IoT devices, allowing IoT objects can effectively use spectrum resources. However, the abnormal IoT devices in the cognitive Internet of Things will disrupt the CSS process. For this attack, we propose a spectrum sensing strategy based on weighted combining of the hidden Markov model. The method uses the hidden Markov model to detect the probability of malicious attacks at each node and reports to the Fusion Center (FC), which evaluates the submitted observations and assigns reasonable weight to improve the accuracy of the sensing results. Simulation results show that the algorithm proposed has a higher detection probability and a lower false alarm probability than other algorithms, which can effectively resist spectrum sensing data falsification (SSDF) attacks in cognitive Internet of Things and improve the performance of IoT devices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availibility

Data can be shared and is available on request. Data can be requested by sending an email to the main author.

References

  1. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.

    Article  Google Scholar 

  2. Diène, B., Rodrigues, J. J. P. C., Diallo, O., Ndoye, E. L. H. M., & Korotaev, V. V. (2020). Data management techniques for internet of things. Mechanical Systems and Signal Processing, 138, 106564.

    Article  Google Scholar 

  3. Xing, L. (2020). Reliability in internet of things: Current status and future perspectives. IEEE Internet of Things Journal, 7(8), 6704–6721.

    Article  Google Scholar 

  4. Lu, W., Hu, S., Liu, X., He, C., & Gong, Y. (2019). Incentive mechanism based cooperative spectrum sharing for OFDM cognitive IoT network. IEEE Transactions on Network Science and Engineering, 7(2), 662–672.

    Article  Google Scholar 

  5. Chatterjee, P. S. (2021). Systematic survey on SSDF attack and detection mechanism in cognitive wireless sensor network. 1–5.

  6. Joshi, G. P., Nam, S. Y., & Kim, S. W. (2013). Cognitive radio wireless sensor networks: Applications, challenges and research trends. Sensors, 13(9), 11196–11228.

    Article  Google Scholar 

  7. Niu, Z., Ma, T., Shu, N., & Shan, H. (2020). Interference sources localization and communication relationship inference with cognitive radio IoT networks. IEEE Access, 8, 103062–103072.

    Article  Google Scholar 

  8. Zhang, M., Zhao, H., Zheng, R., Wu, Q., & Wei, W. (2012). Cognitive internet of things: Concepts and application example. International Journal of Computer Science Issues (IJCSI), 9(6), 151.

    Google Scholar 

  9. Wu, Q., Ding, G., Xu, Y., Feng, S., Du, Z., Wang, J., & Long, K. (2014). Cognitive internet of things: A new paradigm beyond connection. IEEE Internet of Things Journal, 1(2), 129–143.

    Article  Google Scholar 

  10. Ploennigs, J., Ba, A., & Barry, M. (2017). Materializing the promises of cognitive IoT: How cognitive buildings are shaping the way. IEEE Internet of Things Journal, 5(4), 2367–2374.

  11. Tarek, D., Benslimane, A., Darwish, M., & Kotb, A. M. (2020). A new strategy for packets scheduling in cognitive radio internet of things. Computer Networks, 178, 107292.

  12. Tarek, D., Benslimane, A., Darwish, M., & Kotb, A. M. (2020). Survey on spectrum sharing/allocation for cognitive radio networks internet of things. Egyptian Informatics Journal

  13. Kumar, V., Jha, R. K., & Jain, S. (2020). NB-IoT security: A survey. Wireless Personal Communications, 113(4), 2661–2708.

    Article  Google Scholar 

  14. Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014). IoT security: Ongoing challenges and research opportunities. In 2014 IEEE 7th international conference on service-oriented computing and applications (pp. 230–234). IEEE.

  15. Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures. In 2015 10th international conference for internet technology and secured transactions (ICITST) (pp. 336–341). IEEE.

  16. Meneghello, F., Calore, M., Zucchetto, Daniel, Polese, Michele, & Zanella, Andrea. (2019). IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal, 6(5), 8182–8201.

    Article  Google Scholar 

  17. Akyildiz, I. F., Lo, B. F., & Balakrishnan, R. (2011). Cooperative spectrum sensing in cognitive radio networks: A survey. Physical Communication, 4(1), 40–62.

  18. Wu, J., Li, P., Chen, Y., Tang, J., Wei, C., Xia, L., & Song, T. (2020). Analysis of Byzantine attack strategy for cooperative spectrum sensing. IEEE Communications Letters, 24(8), 1631–1635.

  19. Cao, Y., & Pan, H. (2020). Energy-efficient cooperative spectrum sensing strategy for cognitive wireless sensor networks based on particle swarm optimization. IEEE Access, 8, 214707–214715.

  20. Zhang, L., Ding, G., Wu, Q., Zou, Y., Han, Z., & Wang, J. (2015). Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 17(3), 1342–1363.

  21. Chatterjee, P. S., & Roy, M. (2015). A regression based spectrum-sensing data-falsification attack detection technique in CWSN. In 2015 International Conference on Information Technology (ICIT) (pp. 48–53). IEEE.

  22. Yadav, K., Roy, S. D., & Kundu, S. (2020). Defense against spectrum sensing data falsification attacker in cognitive radio networks. Wireless Personal Communications, 1–14.

  23. Sha, K., Yang, T. A., Wei, W., & Davari, S. (2020). A survey of edge computing-based designs for IoT security. Digital Communications and Networks, 6(2), 195–202.

    Article  Google Scholar 

  24. Wu, J., Wang, C., Yu, Y., Song, T., & Hu, J. (2020). Sequential fusion to defend against sensing data falsification attack for cognitive internet of things. ETRI Journal, 42(6), 976–986.

  25. Yao, D., Yuan, S., Lv, Z., Wan, D., & Mao, W. (2020). An enhanced cooperative spectrum sensing scheme against SSDF attack based on Dempster–Shafer evidence theory for cognitive wireless sensor networks. IEEE Access, 8, 175881–175890.

  26. Mergu, K., & Khan, H. (2021). Mitigation of spectrum sensing data falsification attack in cognitive radio networks using trust based cooperative sensing. International Journal of Engineering, 34(6), 1468–1474.

    Google Scholar 

  27. Ye, F., Zhang, X., & Li, Y. (2016). Comprehensive reputation-based security mechanism against dynamic SSDF attack in cognitive radio networks. Symmetry, 8(12), 147.

    Article  Google Scholar 

  28. Zhou, M., Shen, J., Chen, H., & Xie, L. (2013). A cooperative spectrum sensing scheme based on the Bayesian reputation model in cognitive radio networks. In 2013 IEEE wireless communications and networking conference (WCNC) (pp. 614–619). IEEE.

  29. Morozov, M. Y., Perfilov, O. Y., Malyavina, N. V., Teryokhin, R. V., & Chernova, I. V. (2020). Combined approach to SSDF-attacks mitigation in cognitive radio networks. In 2020 Systems of signals generating and processing in the field of on board communications (pp. 1–4). IEEE.

  30. Zhang, S., Wang, Y., Wan, P., Zhuang, J., Zhang, Y., & Li, Y. (2020). Clustering algorithm-based data fusion scheme for robust cooperative spectrum sensing. IEEE Access, 8, 5777–5786.

  31. Singh, W. N., Marchang, N., & Taggu, A. (2019). Mitigating SSDF attack using distance-based outlier approach in cognitive radio networks. International Journal of Ad Hoc and Ubiquitous Computing, 32(2), 119–132.

    Article  Google Scholar 

  32. Rajkumari, R., & Marchang, N. (2019). Mitigating spectrum sensing data falsification attack in ad hoc cognitive radio networks. International Journal of Communication Systems, 32(2), e3852.

    Article  Google Scholar 

  33. Chen, C., Song, M., Xin, C., & Alam, M. (2012). A robust malicious user detection scheme in cooperative spectrum sensing. In 2012 IEEE Global Communications Conference (GLOBECOM) (pp. 4856–4861). IEEE.

  34. Sarmah, R., Taggu, A., & Marchang, N. (2020). Detecting byzantine attack in cognitive radio networks using machine learning. Wireless Networks, 26(8), 5939–5950.

    Article  Google Scholar 

  35. Fu, Y., & He, Z. (2019). Bayesian-inference-based sliding window trust model against probabilistic SSDF attack in cognitive radio networks. IEEE Systems Journal, 14(2), 1764–1775.

    Article  Google Scholar 

  36. Khan, M. S., Khan, L., Gul, N., Amir, M., Kim, J., & Kim, S. M. (2020). Support vector machine-based classification of malicious users in cognitive radio networks. Wireless Communications and Mobile Computing, 2020.

  37. Li, Y., & Peng, Q. (2016). Achieving secure spectrum sensing in presence of malicious attacks utilizing unsupervised machine learning. In MILCOM 2016-2016 IEEE Military Communications Conference (pp. 174–179). IEEE.

  38. Bhattacharjee, S., Keitangnao, R., & Marchang, N. (2016). Association rule mining for detection of colluding SSDF attack in cognitive radio networks. 1–6.

  39. Khan, M. S., Jibran, M., Koo, I., Kim, S. M., & Kim, J. (2019). A double adaptive approach to tackle malicious users in cognitive radio networks. Wireless Communications and Mobile Computing, 2019.

  40. Wu, J., Li, P., Chen, Y., Tang, J., Wei, C., Xia, L., & Song, T. (2020). Analysis of byzantine attack strategy for cooperative spectrum sensing. IEEE Communications Letters, 24(8), 1631–1635.

    Article  Google Scholar 

  41. Vimal, S., Kalaivani, L., Kaliappan, M., Suresh, A., Gao, X. Z., & Varatharajan. R. (2018). Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio networks. Neural Computing and Applications.

  42. He, X., Dai, H., & Ning, P. (2013). HMM-based malicious user detection for robust collaborative spectrum sensing. IEEE Journal on Selected Areas in Communications, 31(11), 2196–2208.

    Article  Google Scholar 

  43. Rabiner, L. R. (1989). A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE, 77.

Download references

Funding

This work was supported by the Excellent Middle-aged and Young Research and Innovation Team of Northeast Petroleum University Research on Performance Optimization of Oil and Gas Pipeline Internet of Things, China, No. KYCXTDQ201901. And, the work also is supported by National Natural Science Foundation of China, No. 61601111. The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

Author information

Authors and Affiliations

Authors

Contributions

Liu Miao conceived and designed the study. Xu Di designed the study and performed experiments. Liu Miao and Xu Di wrote the paper. Zhuo-Miao Huo and Zhen-xing Sun edited the manuscript.

Corresponding author

Correspondence to Liu Miao.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Miao, L., Di, X., Huo, ZM. et al. Research on spectrum sensing data falsification attack detection algorithm in cognitive Internet of Things. Telecommun Syst 80, 227–238 (2022). https://doi.org/10.1007/s11235-022-00896-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-022-00896-0

Keywords

Navigation