Advertisement

Defense Against Spectrum Sensing Data Falsification Attacker in Cognitive Radio Networks

  • 9 Accesses

Abstract

Cognitive radio is an empowering innovation that guarantees to achieve spectrum utilization. To manage the muddled wireless condition, cooperative spectrum sensing (CSS) has been proposed to make use of the assorted variety in cognitive radio networks (CRNs). However, due to the simplicity of CRNs, CSS are vulnerable to security threats. Spectrum sensing data falsification (SSDF) attacker is one of the attackers in CSS. In the SSDF attack, malicious secondary users (MSUs) send false sensing decisions to the fusion center, which significantly degrades detection accuracy. In this paper, to identify MSUs, a modified delivery based scheme is proposed, where a minimum number of samples are considering for sensing. The proposed security scheme is shown to successfully alleviate the impact of MSUs on global decision making, which enhances the achievable throughput of an honest secondary user.

This is a preview of subscription content, log in to check access.

Access options

Buy single article

Instant unlimited access to the full article PDF.

US$ 39.95

Price includes VAT for USA

Subscribe to journal

Immediate online access to all issues from 2019. Subscription will auto renew annually.

US$ 199

This is the net price. Taxes to be calculated in checkout.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

References

  1. 1.

    FCC. (2013). Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies. FCC-03-322, p. 1–53.

  2. 2.

    Mitola, J., & Maguire, G. Q. (1999). Cognitive radio: Making software radios more personal. IEEE Personal Communications, 6(4), 13–18.

  3. 3.

    Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.

  4. 4.

    Ghasemi, A., & Sousa, E. S. (2008). Spectrum sensing in cognitive radio networks: Requirements, challenges and design trade-offs. IEEE Communications Magazine, 46(4), 32–39.

  5. 5.

    Di Renzo, M., Imbriglio, L., Graziosi, F., & Santucci, F. (2009). Cooperative spectrum sensing over correlated log-normal sensing and reporting channels. IEEE global telecommunications conference, 2009. GLOBECOM (p. 1–8).

  6. 6.

    Ghasemi, A., & Sousa, E. S. (2005). Collaborative spectrum sensing for opportunistic access in fading environments. First IEEE international symposium on new frontiers in dynamic spectrum access networks. DySPAN 2005, (p. 131–136).

  7. 7.

    Axell, E., Leus, G., Larsson, E. G., & Poor, H. V. (2012). Spectrum sensing for cognitive radio: State-of-the-art and recent advances. IEEE Signal Processing Magazine, 29(3), 101–116.

  8. 8.

    Fragkiadakis, A. G., Tragos, E. Z., & Askoxylakis, I. G. (2013). A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys & Tutorials, 15(1), 428–445.

  9. 9.

    Chen, R., Park, J. M., Hou, Y. T., & Reed, J. H. (2008). Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine, 46(4), 50–55.

  10. 10.

    Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.

  11. 11.

    Zhang, L., Ding, G., Wu, Q., Zou, Y., Han, Z., & Wang, J. (2015). Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 17(3), 1342–1363.

  12. 12.

    Wang, W., Li, H., Sun, Y., & Han Z. (2009). Attack-proof collaborative spectrum sensing in cognitive radio networks. 43rd annual IEEE conference on information sciences and systems (p. 130–134).

  13. 13.

    Rawat, A. S., Anand, P., Chen, H., & Varshney, P. K. (2011). Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Transactions on Signal Processing, 59(2), 774–786.

  14. 14.

    Zeng, K., Pawelczak, P., & Cabric, D. (2010). Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Communications Letters, 14(3), 226–228.

  15. 15.

    Lu, J., & Wei, P. (2015). Improved cooperative spectrum sensing based on the reputation in cognitive radio networks. International Journal of Electronics, Taylor & Francis, 102(5), 855–863.

  16. 16.

    Hyder, C. S., Grebur, B., Xiao, L., & Ellison, M. (2014). ARC: Adaptive reputation based clustering against spectrum sensing data falsification attacks. IEEE Transactions on Mobile Computing, 13(8), 1707–1719.

  17. 17.

    Feng, J., Zhang, M., Xiao, Y., & Yue, H. (2018). Securing cooperative spectrum sensing against collusive SSDF attack using XOR distance analysis in cognitive radio networks. Sensors, 18(2), 370.

  18. 18.

    Zhao, F., Li, S., & Feng, J. (2019). Securing cooperative spectrum sensing against DC-SSDF attack using trust fluctuation clustering analysis in cognitive radio networks. Wireless Communications and Mobile Computing.

  19. 19.

    Feng, J., Li, S., Lv, S., Wang, H., & Fu, A. (2018). Securing cooperative spectrum sensing against collusive false feedback attack in cognitive radio networks. IEEE Transactions on Vehicular Technology, 67(9), 8276–8287.

  20. 20.

    Althunibat, S., Denise, B. J., & Granelli, F. (2016). Identification and punishment policies for spectrum sensing data falsification attackers using delivery-based assessment. IEEE Transactions on Vehicular Technology, 65(9), 7308–7321.

  21. 21.

    Zhang, R., Liang, Y. C., & Cui, S. (2010). Dynamic resource allocation in cognitive radio networks. IEEE Signal Processing Magazine, 27(3), 102–114.

  22. 22.

    Liang, Y.-C., Zeng, Y., Peh, E. C. Y., & Hoang, A. T. (2008). Sensing-throughput tradeoff for cognitive radio networks. IEEE Transactions on Wireless Communications, 7(4), 1326–1337.

  23. 23.

    Varshney, P. K. (2012). Distributed detection and data fusion. Berlin: Springer. ISBN: 978-1-4612-7333-2.

  24. 24.

    Caso, G., De Nardis, L., Ferrante, G. C., Di Benedetto, M. G. (2013). Cooperative spectrum sensing based on majority decision under CFAR and CDR constraints. IEEE 24th international symposium on personal, indoor and mobile radio communications (PIMRC Workshops), (p. 51–55).

Download references

Author information

Correspondence to Kuldeep Yadav.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Yadav, K., Roy, S.D. & Kundu, S. Defense Against Spectrum Sensing Data Falsification Attacker in Cognitive Radio Networks. Wireless Pers Commun (2020). https://doi.org/10.1007/s11277-020-07077-9

Download citation

Keywords

  • Cognitive radio
  • Spectrum sensing
  • Security
  • Spectrum sensing data falsification attacker
  • Throughput