Skip to main content
Log in

Fast and Accurate Detection of Malicious Users in Cooperative Spectrum Sensing Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cooperative spectrum sensing allows users to detect available spectrum and utilize it. However, it is known that a few users can easily affect the cooperative decision at the fusion center by reporting falsified sensing data. The problem of detecting malicious users in cooperative spectrum sensing has been studied by numerous researchers. The basic approach is to compute the credibility of the reported data of each user and declare those with low credibility (below some threshold) as malicious. The computation of credibility can be based on several things such as pattern of historic behavior, entropy of the reported data, signal-to-noise ratio, etc. The credibility of the reported data of some user node can be expressed as an attack probability of that node. A node with higher attack probability will have lower credibility while a node with lower attack probability a higher credibility. Then, the problem of computing credibility of a node becomes the problem of computing attack probability of a node given a set of reported data. We can enumerate a list of all possible attack probability vectors for a set of nodes and the list of all possible energy level vectors of the channel for the observed time period, and compute which combination of attack probability and channel energy level vector can have the maximum probability to produce the reported channel energy level. However, the search space is quite large and grows exponentially as the number of user nodes and the number of time slots to observe increase. In this paper, we suggest algorithms that reduce the search space considerably and detect malicious users in linear time instead of exponential time. The suggested algorithms have been implemented and show promising results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Availability of data and material

Not applicable.

Notes

  1. In actual cooperative sensing network, we have one more sign which is zero. That is each \(r_{k}\) can be positive, negative, or zero. In this case, the number of pr's is \(3^{K}\) for K users. However, to simplify the explanation, we assume there is no \(r_{k}\) whose value is zero.

  2. We use Y[i][k] instead of \(y_{k}^{i}\) to express the algorithm in more clean way. Both of them represent the channel energy level reported by user k at time i.

  3. There are 8 different pr's, so each pr covers roughly one eighth of the search space. Therefore each pr represents \(\frac{{11^{3} *1}}{8}\) cells for each h vector. Only 3 pr's and 5 h vectors have survived after the reduction. Therefore the size of the reduced search space is roughly 5*\(\frac{{11^{3} *3}}{8}\).

  4. Table 9 omitted those cells that produce 0 probability to produce Y. Since pr = 110 for h = 00,010 from Table 8, we only compute probability to produce Y for r whose sign is positive, positive, and negative.

  5. As explained before, there are three signs for the value of r: positive, zero, negative. In our experimentation, we take care of all three signs while in Sect. 4 and 5 we assumed only two kinds of sign, positive or negative, for the sake of argument.

References

  1. Akyildiz, I. F., Brandon, F. R., & Balakrishnan, R. (2011). Cooperative spectrum sensing in cognitive radio networks: A survey. Physical Communication, 4, 40–62.

    Article  Google Scholar 

  2. Chen, R., Park, J. M., & Bian, K. (2008). Robust distributed spectrum sensing in cognitive radio networks. In Proceedings of IEEE INFOCOM, (pp. 1876–1884).

  3. Chen, C., Song, M., Xin, C., & Alam, M. (2012). A robust malicious user detection scheme in cooperative spectrum sensing. In IEEE GLOBECOM.

  4. Chen, H., Zhou, M., Xie, L., & Li, J. (2017). Cooperative spectrum sensing with M-ary quantized data in cognitive radio networks under SSDF attacks. IEEE Transactions on Wireless Communications. https://doi.org/10.1109/TWC.2017.2707407.

    Article  Google Scholar 

  5. Du, H., Fu, S., & Chu, H. (2015). A credibility-based defense ssdf attacks scheme for the expulsion of malicious users in cognitive radio. International Journal of Hybrid Information Technology, 8, 9.

    Article  Google Scholar 

  6. Fatemieh, O., Farhadi, A., Chandra, R., & Gunter, C. A. (2011). Using classification to protect the integrity of spectrum measurements in white space networks. Network & Distributed Systems Security Symposium (NDSS), San Diego, CA, Feb 2011.

  7. Kaligineedi, P., Khabbazian, M., & Bhargava, V. (2008). Secure cooperative sensing techniques for cognitive radio systems. In Proceedings of IEEE International Conference on Communications, ICC, (pp. 3406–3410).

  8. Kaligineedi, P., Khabbazian, M., & Bhargava, V. (2010). Malicious user detection in a cognitive radio cooperative sensing system. IEEE Transactions on Wireless Communications, 9(8), 2488–2497.

    Article  Google Scholar 

  9. Khan, M. S., Jibran, M., Koo, I., Kim, S. M., & Kim, J. (2019). A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks. Wireless Communications and Mobile Computing, 2019, 2350694. https://doi.org/10.1155/2019/2350694.

  10. Li, H., & Han, Z. (2010). Catch me if you can: An abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Transactions on Wireless Communications, 9(11), 3554–3565. https://doi.org/10.1109/TWC.2010.091510.100315.

    Article  Google Scholar 

  11. Luo, Z., Zhao, S., Lu, Z., Xu, J., & Sagduyu, Y. E. (2019). When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing. arXiv:1905.01430v1.

  12. Mishra, S., Sahai, A, & Brodersen, R. (2006). Cooperative sensing among cognitive radios. In Proceedings of IEEE ICC 2006, (vol. 4, pp. 1658–1663).

  13. Nguyen-Thanh, N., & Koo, I. (2009). An enhanced cooperative spectrum sensing scheme based on evidence theory and reliability source evaluation in cognitive radio context. IEEE Communications Letters, 13(7), 492–494.

    Article  Google Scholar 

  14. Peng, Q., Zeng, K., Jun, W., and Li, S. (2006). A distributed spectrum sensing scheme based on credibility and evidence theory. In Proceeding of the IEEE 17th International symposium on Personal, Indoor and Mobile Radio Communication, (pp. 1–5), Helsinki, Finland.

  15. Peng, T., Chen, Y., Xiao, J., Zheng, Y., & Yang, J. (2016). Improved soft fusion-based cooperative spectrum sensing defense against SSDF attacks. In Proceedings of the 2016 International Conference on Computer, Information and Telecommunication Systems, CITS.

  16. Penna, F., Sun, Y., Dolecek, L., & Cabric, D. (2012). Detecting and counteracting statistical attacks in cooperative spectrum sensing. IEEE Transactions on Signal Processing, 60(4), 1806–1822. https://doi.org/10.1109/TSP.2011.2181839.

    Article  MathSciNet  MATH  Google Scholar 

  17. Rajasegarar, S., Leckie, C., & Palaniswami, M. (2015). Pattern based anomalous user detection in cognitive radio networks. In IEEE ICASSP.

  18. Thilina, K. M., Choi, K. W., Saquib, N., & Hossain, E. (2013). Machine learning techniques for cooperative spectrum sensing in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 31(11), 2209–2221. https://doi.org/10.1109/JSAC.2013.131120

    Article  Google Scholar 

  19. Wang, H., & Yao, Y. D. (2018). Primary user boundary detection in cognitive radio networks: Estimated secondary user locations and impact of malicious secondary users. IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2018.2796024

    Article  Google Scholar 

  20. Ye, F., Zhang, X., & Li, Y. (2017). Collaborative spectrum sensing algorithm based on exponential entropy in cognitive radio networks. Symmetry, 9, 36.

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by Inha University.

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kichang Kim.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix 1

figure f

Appendix 2

figure g

Appendix 3

figure h

Appendix 4

figure i

Appendix 5

figure j

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hwang, J., Kim, J., Sung, I. et al. Fast and Accurate Detection of Malicious Users in Cooperative Spectrum Sensing Network. Wireless Pers Commun 118, 1709–1731 (2021). https://doi.org/10.1007/s11277-021-08112-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08112-z

Keywords

Navigation