Skip to main content
Log in

Secure spectrum sensing in relay-based cognitive radio networks

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

A novel cooperative spectrum sensing algorithm intended for robust sensing in the presence of Byzantine attacks was formulated for relay-based cognitive radio networks, with the computation distributed among the relay nodes. The development of this algorithm improves the viability of the application of decentralised CRNs to sensing, which in turn increases the number of use cases for the technology. The proposed algorithm, which performs probabilistic inference using belief propagation, learns from historical sensing results to provide an estimate of the primary user (PU) state. The algorithm was found to reduce the impact of malicious users significantly in comparison to the majority decision rule even in cases where the majority of users were malicious. Furthermore, the algorithm’s PU state estimations converged quickly. Characteristic of a distributed algorithm, the performance of the algorithm was sensitive to the measurement quality of the relay nodes responsible for computation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Notes

  1. Note that these quantities are chosen for clarity. The number of UTUs is typically much larger than the number of TUs.

References

  1. Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.

    Article  Google Scholar 

  2. Mitola, J., & Maguire, G. Q. (1999). Cognitive radio: Making software radios more personal. IEEE Personal Communications, 6(4), 13–18.

    Article  Google Scholar 

  3. Parvin, S., Hussain, F. K., Hussain, O. K., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691–1708.

    Article  Google Scholar 

  4. Shu, Z., Qian, Y., & Ci, S. (2013). On physical layer security for cognitive radio networks. IEEE Network, 27(3), 28–33.

    Article  Google Scholar 

  5. Zhang, L., Ding, G., Wu, Q., Zou, Y., Han, Z., & Wang, J. (2015). Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communications Surveys Tutorials, 17(3), 1342–1363.

    Article  Google Scholar 

  6. Kaligineedi, P., Khabbazian, M., & Bhargava, V. K. (2010). Malicious user detection in a cognitive radio cooperative sensing system. IEEE Transactions on Wireless Communications, 9(8), 2488–2497.

    Article  Google Scholar 

  7. Adelantado, F., & Verikoukis, C. (2011). A non-parametric statistical approach for malicious users detection in cognitive wireless ad-hoc networks. In 2011 IEEE International Conference on Communications (ICC), pp 1–5.

  8. Rawat, A. S., Anand, P., Chen, H., & Varshney, P. K. (2011). Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks. IEEE Transactions on Signal Processing, 59(2), 774–786.

    Article  MathSciNet  Google Scholar 

  9. Penna, F., Sun, Y., Dolecek, L., & Cabric, D. (2012). Detecting and counteracting statistical attacks in cooperative spectrum sensing. IEEE Transactions on Signal Processing, 60(4), 1806–1822.

    Article  MathSciNet  Google Scholar 

  10. Penna, F., & Garello, R. (2012). Decentralized Neyman-Pearson test with belief propagation for peer-to-peer collaborative spectrum sensing. IEEE Transactions on Wireless Communications, 11(5), 1881–1891.

    Article  Google Scholar 

  11. Soltanmohammadi, E., & Naraghi-Pour, M. (2014). Fast detection of malicious behavior in cooperative spectrum sensing. IEEE Journal on Selected Areas in Communications, 32(3), 377–386.

    Article  Google Scholar 

  12. Laghate, M., & Cabric, D. (2015). Cooperative spectrum sensing in the presence of correlated and malicious cognitive radios. IEEE Transactions on Communications, 63(12), 4666–4681.

    Article  Google Scholar 

  13. Zarrin, S., & Lim, T. J. L. T. J. (2008). Belief propagation on factor graphs for cooperatitve spectrum sensing in cognitive radio. In 2008 3rd IEEE symposium on new frontiers in dynamic spectrum access networks, pp 1–9.

  14. Maric, S., Biswas, A., & Reisenfeld, S. (2017). A complete algorithm to diagnose and alleviate the effects of physical layer attacks. In 2017 international conference on signals and systems (ICSigSys), pp 29–34.

  15. Sivakumaran, A., Alfa, A. S., & Maharaj, B. T. (2019). An empirical analysis of the effect of malicious users in decentralised cognitive radio networks. In 2019 IEEE 89th vehicular technology conference (VTC2019-Spring), pp 1–5.

  16. Bishop, C. (2006). Pattern Recognition and Machine Learning (1st ed.). Springer.

    MATH  Google Scholar 

  17. Kschischang, F. R., Frey, B. J., & Loeliger, H. A. (2001). Factor graphs and the sum-product algorithm. IEEE Transactions on Information Theory, 47(2), 498–519.

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work is based on research funded by the South African Research Chairs Initiative (SARChI) Chair for Advanced Sensor Networks (cohosted by the University of Pretoria (UP) and the Council for Scientific and Industrial Research (CSIR)).

Funding

The funding was provided by National Research Foundation (ZA).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arun Sivakumaran.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Below is the link to the electronic supplementary material.

Supplementary material 1 (pdf 89 KB)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sivakumaran, A., Maharaj, B.T. & Alfa, A.S. Secure spectrum sensing in relay-based cognitive radio networks. Wireless Netw 27, 3979–3994 (2021). https://doi.org/10.1007/s11276-021-02640-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-021-02640-z

Keywords

Navigation