Abstract
The Internet of Things (IoT) is a new paradigm for connecting various heterogeneous networks. Cognitive radio (CR) adopts cooperative spectrum sensing (CSS) to realize the secondary utilization of idle spectrum by unauthorized IoT devices, allowing IoT objects can effectively use spectrum resources. However, the abnormal IoT devices in the cognitive Internet of Things will disrupt the CSS process. For this attack, we propose a spectrum sensing strategy based on weighted combining of the hidden Markov model. The method uses the hidden Markov model to detect the probability of malicious attacks at each node and reports to the Fusion Center (FC), which evaluates the submitted observations and assigns reasonable weight to improve the accuracy of the sensing results. Simulation results show that the algorithm proposed has a higher detection probability and a lower false alarm probability than other algorithms, which can effectively resist spectrum sensing data falsification (SSDF) attacks in cognitive Internet of Things and improve the performance of IoT devices.
Similar content being viewed by others
Data availibility
Data can be shared and is available on request. Data can be requested by sending an email to the main author.
References
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.
Diène, B., Rodrigues, J. J. P. C., Diallo, O., Ndoye, E. L. H. M., & Korotaev, V. V. (2020). Data management techniques for internet of things. Mechanical Systems and Signal Processing, 138, 106564.
Xing, L. (2020). Reliability in internet of things: Current status and future perspectives. IEEE Internet of Things Journal, 7(8), 6704–6721.
Lu, W., Hu, S., Liu, X., He, C., & Gong, Y. (2019). Incentive mechanism based cooperative spectrum sharing for OFDM cognitive IoT network. IEEE Transactions on Network Science and Engineering, 7(2), 662–672.
Chatterjee, P. S. (2021). Systematic survey on SSDF attack and detection mechanism in cognitive wireless sensor network. 1–5.
Joshi, G. P., Nam, S. Y., & Kim, S. W. (2013). Cognitive radio wireless sensor networks: Applications, challenges and research trends. Sensors, 13(9), 11196–11228.
Niu, Z., Ma, T., Shu, N., & Shan, H. (2020). Interference sources localization and communication relationship inference with cognitive radio IoT networks. IEEE Access, 8, 103062–103072.
Zhang, M., Zhao, H., Zheng, R., Wu, Q., & Wei, W. (2012). Cognitive internet of things: Concepts and application example. International Journal of Computer Science Issues (IJCSI), 9(6), 151.
Wu, Q., Ding, G., Xu, Y., Feng, S., Du, Z., Wang, J., & Long, K. (2014). Cognitive internet of things: A new paradigm beyond connection. IEEE Internet of Things Journal, 1(2), 129–143.
Ploennigs, J., Ba, A., & Barry, M. (2017). Materializing the promises of cognitive IoT: How cognitive buildings are shaping the way. IEEE Internet of Things Journal, 5(4), 2367–2374.
Tarek, D., Benslimane, A., Darwish, M., & Kotb, A. M. (2020). A new strategy for packets scheduling in cognitive radio internet of things. Computer Networks, 178, 107292.
Tarek, D., Benslimane, A., Darwish, M., & Kotb, A. M. (2020). Survey on spectrum sharing/allocation for cognitive radio networks internet of things. Egyptian Informatics Journal
Kumar, V., Jha, R. K., & Jain, S. (2020). NB-IoT security: A survey. Wireless Personal Communications, 113(4), 2661–2708.
Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014). IoT security: Ongoing challenges and research opportunities. In 2014 IEEE 7th international conference on service-oriented computing and applications (pp. 230–234). IEEE.
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures. In 2015 10th international conference for internet technology and secured transactions (ICITST) (pp. 336–341). IEEE.
Meneghello, F., Calore, M., Zucchetto, Daniel, Polese, Michele, & Zanella, Andrea. (2019). IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal, 6(5), 8182–8201.
Akyildiz, I. F., Lo, B. F., & Balakrishnan, R. (2011). Cooperative spectrum sensing in cognitive radio networks: A survey. Physical Communication, 4(1), 40–62.
Wu, J., Li, P., Chen, Y., Tang, J., Wei, C., Xia, L., & Song, T. (2020). Analysis of Byzantine attack strategy for cooperative spectrum sensing. IEEE Communications Letters, 24(8), 1631–1635.
Cao, Y., & Pan, H. (2020). Energy-efficient cooperative spectrum sensing strategy for cognitive wireless sensor networks based on particle swarm optimization. IEEE Access, 8, 214707–214715.
Zhang, L., Ding, G., Wu, Q., Zou, Y., Han, Z., & Wang, J. (2015). Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 17(3), 1342–1363.
Chatterjee, P. S., & Roy, M. (2015). A regression based spectrum-sensing data-falsification attack detection technique in CWSN. In 2015 International Conference on Information Technology (ICIT) (pp. 48–53). IEEE.
Yadav, K., Roy, S. D., & Kundu, S. (2020). Defense against spectrum sensing data falsification attacker in cognitive radio networks. Wireless Personal Communications, 1–14.
Sha, K., Yang, T. A., Wei, W., & Davari, S. (2020). A survey of edge computing-based designs for IoT security. Digital Communications and Networks, 6(2), 195–202.
Wu, J., Wang, C., Yu, Y., Song, T., & Hu, J. (2020). Sequential fusion to defend against sensing data falsification attack for cognitive internet of things. ETRI Journal, 42(6), 976–986.
Yao, D., Yuan, S., Lv, Z., Wan, D., & Mao, W. (2020). An enhanced cooperative spectrum sensing scheme against SSDF attack based on Dempster–Shafer evidence theory for cognitive wireless sensor networks. IEEE Access, 8, 175881–175890.
Mergu, K., & Khan, H. (2021). Mitigation of spectrum sensing data falsification attack in cognitive radio networks using trust based cooperative sensing. International Journal of Engineering, 34(6), 1468–1474.
Ye, F., Zhang, X., & Li, Y. (2016). Comprehensive reputation-based security mechanism against dynamic SSDF attack in cognitive radio networks. Symmetry, 8(12), 147.
Zhou, M., Shen, J., Chen, H., & Xie, L. (2013). A cooperative spectrum sensing scheme based on the Bayesian reputation model in cognitive radio networks. In 2013 IEEE wireless communications and networking conference (WCNC) (pp. 614–619). IEEE.
Morozov, M. Y., Perfilov, O. Y., Malyavina, N. V., Teryokhin, R. V., & Chernova, I. V. (2020). Combined approach to SSDF-attacks mitigation in cognitive radio networks. In 2020 Systems of signals generating and processing in the field of on board communications (pp. 1–4). IEEE.
Zhang, S., Wang, Y., Wan, P., Zhuang, J., Zhang, Y., & Li, Y. (2020). Clustering algorithm-based data fusion scheme for robust cooperative spectrum sensing. IEEE Access, 8, 5777–5786.
Singh, W. N., Marchang, N., & Taggu, A. (2019). Mitigating SSDF attack using distance-based outlier approach in cognitive radio networks. International Journal of Ad Hoc and Ubiquitous Computing, 32(2), 119–132.
Rajkumari, R., & Marchang, N. (2019). Mitigating spectrum sensing data falsification attack in ad hoc cognitive radio networks. International Journal of Communication Systems, 32(2), e3852.
Chen, C., Song, M., Xin, C., & Alam, M. (2012). A robust malicious user detection scheme in cooperative spectrum sensing. In 2012 IEEE Global Communications Conference (GLOBECOM) (pp. 4856–4861). IEEE.
Sarmah, R., Taggu, A., & Marchang, N. (2020). Detecting byzantine attack in cognitive radio networks using machine learning. Wireless Networks, 26(8), 5939–5950.
Fu, Y., & He, Z. (2019). Bayesian-inference-based sliding window trust model against probabilistic SSDF attack in cognitive radio networks. IEEE Systems Journal, 14(2), 1764–1775.
Khan, M. S., Khan, L., Gul, N., Amir, M., Kim, J., & Kim, S. M. (2020). Support vector machine-based classification of malicious users in cognitive radio networks. Wireless Communications and Mobile Computing, 2020.
Li, Y., & Peng, Q. (2016). Achieving secure spectrum sensing in presence of malicious attacks utilizing unsupervised machine learning. In MILCOM 2016-2016 IEEE Military Communications Conference (pp. 174–179). IEEE.
Bhattacharjee, S., Keitangnao, R., & Marchang, N. (2016). Association rule mining for detection of colluding SSDF attack in cognitive radio networks. 1–6.
Khan, M. S., Jibran, M., Koo, I., Kim, S. M., & Kim, J. (2019). A double adaptive approach to tackle malicious users in cognitive radio networks. Wireless Communications and Mobile Computing, 2019.
Wu, J., Li, P., Chen, Y., Tang, J., Wei, C., Xia, L., & Song, T. (2020). Analysis of byzantine attack strategy for cooperative spectrum sensing. IEEE Communications Letters, 24(8), 1631–1635.
Vimal, S., Kalaivani, L., Kaliappan, M., Suresh, A., Gao, X. Z., & Varatharajan. R. (2018). Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio networks. Neural Computing and Applications.
He, X., Dai, H., & Ning, P. (2013). HMM-based malicious user detection for robust collaborative spectrum sensing. IEEE Journal on Selected Areas in Communications, 31(11), 2196–2208.
Rabiner, L. R. (1989). A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE, 77.
Funding
This work was supported by the Excellent Middle-aged and Young Research and Innovation Team of Northeast Petroleum University Research on Performance Optimization of Oil and Gas Pipeline Internet of Things, China, No. KYCXTDQ201901. And, the work also is supported by National Natural Science Foundation of China, No. 61601111. The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.
Author information
Authors and Affiliations
Contributions
Liu Miao conceived and designed the study. Xu Di designed the study and performed experiments. Liu Miao and Xu Di wrote the paper. Zhuo-Miao Huo and Zhen-xing Sun edited the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Miao, L., Di, X., Huo, ZM. et al. Research on spectrum sensing data falsification attack detection algorithm in cognitive Internet of Things. Telecommun Syst 80, 227–238 (2022). https://doi.org/10.1007/s11235-022-00896-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-022-00896-0