Springer Nature is making Coronavirus research free. View research | View latest news | Sign up for updates

Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing

协作频谱感知中的 MAC 攻击及其检测机制研究

  • 77 Accesses



  1. 1.

    发现了一种新的频谱感知数据伪造攻击模式-互助式合谋攻击 (简称 MAC 攻击)。 多个恶意用户形成互助式合谋攻击组, 相互抬高信任值, 用于躲避信任机制检测, 达到垄断空闲频谱资源的攻击目的。

  2. 2.

    针对感知数据的二元特性, 引入 “0–1” 相似度方法设计MAC攻击的检测机制-DMAC, 可在避免复杂数学运算的前提下, 检测出 MAC 攻击者。

  3. 3.

    通过 DMAC 对信任机制的优化, 在信任评估中阻止 MAC 攻击者虚构的“诚实感知总次数”增长, 使得 MAC 攻击者难以抬高信任值。

This is a preview of subscription content, log in to check access.


  1. 1

    Federal Communications Commission. Spectrum Policy Task Force. Technical Report, Rep. ET Docket No. 02–135. 2002

  2. 2

    Mitola J. Cognitive radio: an integrated agent architecture for software defined radio. Dissertation for Ph.D. Degree. Stockholm: Royal Instutute of Technology (KTH), 2000

  3. 3

    Zeng K, Peng Q H, Tang Y X. Mitigating spectrum sensing data falsification attacks in hard-decision combining cooperative spectrum sensing. Sci China Inf Sci, 2014, 57: 042318

  4. 4

    Feng J Y, Lu G Y, Chang H. Behave well: how to win a pop vacant band via cooperative spectrum sensing. KSII Trans Int Inf Syst, 2015, 9: 1321–1336

  5. 5

    Pei Q Q, Yuan B B, Li L, et al. A sensing and etiquette reputation-based trust management for centralized cognitive radio networks. Neurocomputing, 2013, 101: 129–138

  6. 6

    Akyildiz I F, Lo B F, Balakrishnan R. Cooperative spectrum sensing in cognitive radio networks: a survey. Phys Commun, 2011, 4: 40–62

Download references

Author information

Correspondence to Guangyue Lu.

Additional information

The authors declare that they have no conflict of interest.

Electronic supplementary material

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Feng, J., Lu, G., Zhang, Y. et al. Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing. Sci. China Inf. Sci. 60, 059101 (2017). https://doi.org/10.1007/s11432-015-0337-x

Download citation


  • 协作频谱感知
  • 认知无线电
  • 信任
  • 合谋攻击
  • 网络安全