Identification and Elimination of Abnormal Information in Electromagnetic Spectrum Cognition

  • Haojun Zhao
  • Ruowu Wu
  • Hui Han
  • Xiang Chen
  • Yuyao Li
  • Yun LinEmail author
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 279)


The electromagnetic spectrum is an important national strategic resource. Spectrum sensing data falsification (SSDF) is an attack method that destroys cognitive networks and makes them ineffective. Malicious users capture sensory nodes and tamper with data through cyber attacks, and make the cognitive network biased or even completely reversed. In order to eliminate the negative impact caused by abnormal information in spectrum sensing and ensure the desired effect, this thesis starts with the improvement of the performance of cooperative spectrum sensing, and constructs a robust sensing user evaluation reference system. At the same time, considering the dynamic changes of user attributes, the sensory data is identified online. Finally, the attacker identification and elimination algorithm is improved based on the proposed reference system. In addition, this paper verifies the identification performance of the proposed reference system through simulation. The simulation results show that the proposed reference system still maintain a good defense effect even if the proportion of malicious users in the reference is greater than 50%.


Cognitive radio Cooperative spectrum sensing Spectrum sensing data falsification (SSDF) Bayesian learning 



This work is supported by the National Natural Science Foundation of China (61771154), the Fundamental Research Funds for the Central Universities (HEUCFG201830), and the funding of State Key Laboratory of CEMEE (CEMEE2018K0104A).

This paper is also funded by the International Exchange Program of Harbin Engineering University for Innovation-oriented Talents Cultivation.

Meantime, all the authors declare that there is no conflict of interests regarding the publication of this article.

We gratefully thank of very useful discussions of reviewers.


  1. 1.
    Benjamin, R.: Security considerations in communications systems and networks. In: Communications Speech & Vision IEEE Proceedings I, vol. 137, no. 2, pp. 61–72, April 1990Google Scholar
  2. 2.
    Li, H., Han, Z.: Catch me if you can: an abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Trans. Wirel. Commun. 9(11), 3554–3565 (2010)CrossRefGoogle Scholar
  3. 3.
    Rawat, S., Anand, P., Chen, H., et al.: Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Trans. Signal Process. 59(2), 774–786 (2011)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Zeng, K., Paweczak, P., Cabri, D.: Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Commun. Lett. 14(3), 226–228 (2010)CrossRefGoogle Scholar
  5. 5.
    Chen, C., Song, M., Xin, C., et al.: A robust malicious user detection scheme in cooperative spectrum sensing. In: Proceedings of the IEEE Global Telecommunication Conference, pp. 4856–4861 (2012)Google Scholar
  6. 6.
    Penna, F., Sun, Y., Dolecek, L., et al.: Detecting and counteracting statistical attacks in cooperative spectrum sensing. IEEE Trans. Signal Process. 60(4), 1806–1822 (2012)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Urkowitz, H.: Energy detection of unknown deterministic signals. Proc. IEEE 55(4), 523–531 (1967)CrossRefGoogle Scholar
  8. 8.
    Chen, R., Park, J.M., Bian, K.: Robust distributed spectrum sensing in cognitive radio networks. In: INFOCOM 2008, Phoenix, AZ, 13–18 April 2008Google Scholar
  9. 9.
    He, X., Dai, H., Ning, P.: A byzantine attack defender in cognitive radio networks: the conditional frequency check. IEEE Trans. Wirel. Commun. 12(5), 2512–2523 (2013)CrossRefGoogle Scholar
  10. 10.
    Solla, S.A., Winther, O.: Optimal perceptron learning: an on-line Bayesian approach. In: Saad, D. (ed.) On-Line Learning in Neural Networks, pp. 379–398. Cambridge University Press, Cambridge (1998)Google Scholar
  11. 11.
    Noh, G., Lim, S., Lee, S., et al.: Goodness-of-fit-based malicious user detection in cooperative spectrum sensing. In: Proceedings of the 76th IEEE Vehicular Technology Conference, pp. 1–5 (2012)Google Scholar
  12. 12.
    Althunibat, S., Denise, B.J., Granelli, F.: Identification and punishment policies for spectrum sensing data falsification attackers using delivery-based assessment. IEEE Trans. Veh. Technol. 65(9), 7308–7321 (2016)CrossRefGoogle Scholar
  13. 13.
    Zhao, Y., Song, M., Xin, C.: A weighted cooperative spectrum sensing framework for infrastructure-based cognitive radio networks. Comput. Commun. 2011(34), 1510–1517 (2011)CrossRefGoogle Scholar
  14. 14.
    Jo, M., Han, L., Kim, D.: Selfish attacks and detection in cognitive radio ad-hoc networks. IEEE Network 27(3), 46–50 (2013)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • Haojun Zhao
    • 1
  • Ruowu Wu
    • 2
  • Hui Han
    • 2
  • Xiang Chen
    • 2
  • Yuyao Li
    • 1
  • Yun Lin
    • 1
    Email author
  1. 1.College of Information and Communication EngineeringHarbin Engineering UniversityHarbinChina
  2. 2.State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System (CEMEE)LuoyangChina

Personalised recommendations