Skip to main content
Log in

Detecting Byzantine attack in cognitive radio networks using machine learning

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

One primary function in a cognitive radio network (CRN) is spectrum sensing. In an infrastructure-based CRN, instead of individual nodes independently sensing the presence of the incumbent signal and taking decisions thereon, a fusion center (FC) aggregates the sensing reports from the individual nodes and makes the final decision. Such collaborative spectrum sensing (CSS) is known to result in better sensing accuracy. On the other hand, CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack (a.k.a. Byzantine attack) wherein a node maliciously falsifies the sensing report prior to sending it to the FC, with the intention of disrupting the spectrum sensing process. This paper investigates the use of machine learning techniques, viz., SVM, Neural Network, Naive Bayes and Ensemble classifiers for detection of SSDF attacks in a CRN where the sensing reports are binary (i.e., either 1 or 0). The learning techniques are studied under two experimental scenarios: (a) when the training and test data are drawn from the same data-set, and (b) when separate data-sets are used for training and testing. Under the first scenario, of all the techniques, NN and Ensemble are the most robust showing consistently very good performance across varying presence of attackers in the system. Moreover performance comparison with an existing non-machine learning technique shows that the learning techniques are generally more robust than the existing algorithm under high presence of attackers. Under the second scenario, in a limited environment, Ensemble is the most robust method showing good overall performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23

Similar content being viewed by others

References

  1. Kakalou, I., Psannis, K. E., Krawiec, P., & Badea, R. (2017). Cognitive radio network and network service chaining toward 5G: Challenges and requirements. IEEE Communications Magazine, 55(11), 145–151.

    Article  Google Scholar 

  2. Zhang, L., Ding, G., Wu, Q., Zou, Y., Han, Z., & Wang, J. (2015). Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 17(3), 1342–1363.

    Article  Google Scholar 

  3. Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. M. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.

    Article  Google Scholar 

  4. Cheng, Z., Song, T., Zhang, J., Hu, J., Hu, Y., Shen, L., Li, X., & Wu, J. (2017). Self-organizing map-based scheme against probabilistic SSDF attack in cognitive radio networks. In Proceedings of IEEE WCSP, 978-1-5386-2062-5.

  5. Marchang, N., Taggu, A., & Patra, A. K. (2018). Detecting Byzantine attack in cognitive radio networks by exploiting frequency and ordering properties. IEEE Transactions on Coginitive Communications and Networking, 4(4), 816–824.

    Article  Google Scholar 

  6. Li, H., & Han, Z. (2010). Catch me if you can: An abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Transactions on Wireless Communications, 9(11), 3554–3565.

    Article  Google Scholar 

  7. Duan, L., Min, A. W., Huang, J., & Shin, K. G. (2012). Attack prevention for collaborative spectrum sensing in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(9), 1658–1665.

    Article  Google Scholar 

  8. Wang, W., Chen, L., Shin, K. G., & Duan, L. (2015). Thwarting intelligent malicious behaviors in cooperative spectrum sensing. IEEE Transactions on Mobile Computing, 14(11), 2392–2405.

    Article  Google Scholar 

  9. He, X., Dai, H., & Ning, P. (2013). HMM-based malicious user detection for robust collaborative spectrum sensing. IEEE Journal on Selected Areas in Communications, 31(11), 2196–2208.

    Article  Google Scholar 

  10. Zhu, F., & Seo, S. (2009). Enhanced robust cooperative spectrum sensing in cognitive radio. Journal of Communications and Networks, 11, 122–133.

    Article  Google Scholar 

  11. Patnaik, M., et al. (2019). PROLEMus: A proactive learning-based MAC protocol against PUEA and SSDF attacks in energy constrained cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking, 5(2), 400–412.

    Article  Google Scholar 

  12. Le, T. N., Chin, W., & Kao, W. (2015). Cross-layer design for primary user emulation attacks detection in mobile cognitive radio networks. IEEE Communications Letters, 19(5), 799–802.

    Article  Google Scholar 

  13. Alahmadi, A., Fang, Z., Song, T., & Li, T. (2015). Subband PUEA detection and mitigation in OFDM-based cognitive radio networks. IEEE Transactions on Information Forensics and Security, 10(10), 2131–2142.

    Article  Google Scholar 

  14. Lin, S., Wen, C., & Sethares, W. A. (2018). Two-tier device-based authentication protocol against PUEA attacks for IoT applications. IEEE Transactions on Signal and Information Processing over Networks, 4(1), 33–47.

    Article  MathSciNet  Google Scholar 

  15. Karimi, M., & Sadough, S. M. S. (2018). Efficient transmission strategy for cognitive radio systems under primary user emulation attack. IEEE Systems Journal, 12(4), 3767–3774.

    Article  Google Scholar 

  16. Gao, N., Jing, X., Huang, H., & Mu, J. (2017). Robust collaborative spectrum sensing using PHY-layer fingerprints in mobile cognitive radio networks. IEEE Communications Letters, 21(5), 1063–1066.

    Article  Google Scholar 

  17. Ghaznavi, M., & Jamshidi, A. (2017). Defence against primary user emulation attack using statistical properties of the cognitive radio received power. IET Communications, 11(9), 1535–1542.

    Article  Google Scholar 

  18. Alahmadi, A., Abdelhakim, M., Ren, J., & Li, T. (2014). Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Transactions on Information Forensics and Security, 9(5), 772–781.

    Article  Google Scholar 

  19. Chen, C., Cheng, H., & Yao, Y. (2011). Cooperative spectrum sensing in cognitive radio networks in the presence of the primary user emulation attack. IEEE Transactions on Wireless Communications, 10(7), 2135–2141.

    Article  Google Scholar 

  20. Zhu, H., Song, T., Wu, J., Li, X., & Hu, J. (2018) Cooperative spectrum sensing algorithm based on support vector machine against SSDF attack. In Proceedings IEEE ICC workshops (pp. 1–6).

  21. Farmani, F., Jannat-Abad, M. A., & Berangi, R. (2011). Detection of SSDF attack using SVDD algorithm in cognitive radio networks. In Proceedings of third international conference in computational intelligence, communication systems and networks (pp. 201–204).

  22. Huo, Y., Wang, Y., Lin, W., & Sun, R. Three-layer Bayesian model based spectrum sensing to detect malicious attacks in cognitive radio networks. In Proceedings of IEEE ICCW (pp. 1640–1645).

  23. Nie, G., Ding, G., Zhang, Li, & Wu, Q. (2017). Byzantine defense in collaborative spectrum sensing via Bayesian learning. IEEE Access, 5, 20089–20098.

    Article  Google Scholar 

  24. Fragkiadakis, A. G., Tragos, E. Z., & Askoxylakis, I. G. (2013). A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys and Tutorials, 15(1), 428–445.

    Article  Google Scholar 

  25. Hlavacek, D., & Chang, J. M. (2014). A layered approach to cognitive radio network security: A survey. Computer Networks, 75(Part A), 414–436.

    Article  Google Scholar 

  26. Rina, K., Nath, S., Marchang, N., & Taggu, A. (2018). Can clustering be used to detect intrusion during spectrum sensing in cognitive radio networks? IEEE Systems Journal, 12(1), 938–947.

    Article  Google Scholar 

  27. Zhao, F., Li, S., & Feng, J. (2019). Securing cooperative spectrum sensing against DC-SSDF attack using trust fluctuation clustering analysis in cognitive radio networks. Hindawi Wireless Communications and Mobile Computing Volume 2019. Article ID, 3174304.

  28. Ahmed, M. E., Song, J. B., & Han, Z. (2014). Mitigating malicious attacks using bayesian non-parametric clustering in collaborative cognitive radio networks. In Proceedings of IEEE Globecom—Cognitive radio and networks symposium (pp. 999–1004)

  29. Penna, F., Sun, Y., Dolecek, L., & Cabric, D. (2011). Joint spectrum sensing and detection of malicious nodes via belief propagation. Proceedings of IEEE Globecom, 2011, 1–5.

    Google Scholar 

  30. Akbari, K., & Abouei, J. (2018). Signal classification for detecting primary user emulation attack in centralized cognitive radio networks. In Proceedings of 26th Iranian conference on electrical engineering (pp. 342–347).

  31. Zhou, M., Shen, J., Chen, H., & Xie, L. (2013). A cooperative spectrum sensing scheme based on the Bayesian reputation model in cognitive radio networks. In Proceedings of IEEE wireless communications and networking conference(WCNC):MAC (pp. 614–619).

  32. Penna, F., Sun, Y., Dolecek, L., & Cabric, D. (2012). Detecting and counteracting statistical attacks in cooperative spectrum sensing. IEEE Transactions on Signal Processing, 60(4), 1806–1822.

    Article  MathSciNet  Google Scholar 

  33. Jaglan, R. R., Mustafa, R., & Agrawal, S. (2018). Scalable and robust ANN based cooperative spectrum sensing for cognitive radio networks. Wireless Personal Communications, 99(3), 1141–1157.

    Article  Google Scholar 

  34. Ye, N., Emran, S. M., Chen, Q., & Vilbert, S. (2002). Multivariate statistical analysis of audit trials for host-based intrusion detection. IEEE Transactions on Computers, 51(7), 810–820.

    Article  Google Scholar 

  35. Panchal, G., Ganatra, A., Kosta, Y. P., & Panchal, D. (2011). Behaviour analysis of multilayer perceptrons with multiple hidden neurons and hidden layers. International Journal of Computer Theory and Engineering, 3(2), 332–337.

    Article  Google Scholar 

  36. GnanaSheela, K., & Deepa, S. N. (2013). Review on methods to fix number of hidden neurons in neural networks. Hindawi Publishing Corporation: Mathematical Problems in Engineering, Volume 2013. ArticleID, 425740.

  37. Spectrum Policy Task Force, Fed. Commun. Comm., ET Docket No. 02-135 Tech. Rep., Nov (2002)

Download references

Acknowlegements

This work is partially supported by Information Technology Research Academy (ITRA), Government of India under, ITRAMobile grant [ITRA/15(63)/Mobile/MBSSCRN/02/2015].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ningrinla Marchang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Electronic supplementary material

Below is the link to the electronic supplementary material.

Supplementary material 1 (pdf 103 KB)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sarmah, R., Taggu, A. & Marchang, N. Detecting Byzantine attack in cognitive radio networks using machine learning. Wireless Netw 26, 5939–5950 (2020). https://doi.org/10.1007/s11276-020-02398-w

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-020-02398-w

Keywords

Navigation