Abstract
The multi-HMM inference algorithm presented in the previous chapter can effectively assist the Byzantine attack detection when either the percentage of the malicious SUs or their flipping probability is not too high. To further enhance the detection performance, a tailor-designed Byzantine attack detection scheme, termed CFC, will be presented in this chapter. In this method, two natural yet effective CFC statistics that can capture the second-order properties of the underlying spectrum dynamics and the SUs spectrum sensing behaviors are constructed for Byzantine attacker identification. More specifically, we will first briefly clarify the underlying system model and then presents the CFC based Byzantine attack detection algorithm. In addition, performance analysis of this method will also be presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
Note that we do not consider the case that both φ 01 and φ 10 are zeros. Because in that case, the malicious SUs actually reduce to the honest SUs, and there is no need to detect them.
- 3.
Other than the majority voting rule, the fusion center may also use the AND rule [14], where the spectrum is decided to be occupied only if all the SUs report so. Another possible choice is the OR rule [15], where the spectrum will decided to be occupied as long as there is one SU reports so. As it can be seen, the AND rule is aggressive and the OR rule is conservative while the majority voting rule considered here is somewhere in between.
References
X. He, H. Dai, and P. Ning. A Byzantine attack defender in cognitive radio networks: the conditional frequency check. IEEE Transactions on Wireless Communications, 12 (5): 2512–2523, 2013.
A.W. Min, K.G. Shin, and X. Hu. Attack-tolerant distributed sensing for dynamic spectrum access networks. In Proc. of IEEE ICNP, 2009.
F. Adelantado and C. Verikoukis. A non-parametric statistical approach for malicious users detection in cognitive wireless ad-hoc networks. In Proc. of IEEE ICC, 2011.
A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney. Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks. IEEE Trans. Signal Process., 59 (2): 774–786, 2011.
S. Marano, V. Matta, and L. Tong. Distributed detection in the presence of Byzantine attacks. IEEE Trans. Signal Process., 57 (1): 16–29, 2009.
A. Vempaty, K. Agrawal, H. Chen, and P. Varshney. Adaptive learning of Byzantines’ behavior in cooperative spectrum sensing. In Proc. of IEEE WCNC, 2011.
D. Zhao, X. Ma, and X. Zhou. Prior probability-aided secure cooperative spectrum sensing. In Proc. of IEEE WiCOM, 2011.
H. Li and Z. Han. Catch me if you can: An abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Trans. Wireless Commun., 9 (11): 3554–3565, 2010.
Q. Zhao, L. Tong, A. Swami, and Y. Chen. Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework. IEEE J. Sel. Areas Commun., 25 (3): 589–600, 2007.
K. Kim, IA Akbar, KK Bae, J. Urn, CM Spooner, and JH Reed. Cyclostationary approaches to signal detection and classification in cognitive radio. In Proc. of IEEE DySPAN, 2007.
Y. Chen, Q. Zhao, and A. Swami. Joint design and separation principle for opportunistic spectrum access in the presence of sensing errors. IEEE Trans. Inf. Theory, 54 (5): 2053–2071, 2008.
T. Clancy and B. Walker. Predictive dynamic spectrum access. In Proc. of SDR Forum Technical Conference, 2006.
N. Noorshams, M. Malboubi, and A. Bahai. Centralized and decentralized cooperative spectrum sensing in cognitive radio networks: A novel approach. In Proc. of IEEE SPAWC, 2010.
T. Yucek and H. Arslan. A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surveys Tuts., 11 (1): 116–130, 2009.
W. Zhang, R. K. Mallik, and K. B. Letaief. Optimization of cooperative spectrum sensing with energy detection in cognitive radio networks. IEEE transactions on wireless communications, 8 (12), 2009.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
He, X., Dai, H. (2018). Case Study III: CFC-Based Byzantine Attack Detection. In: Adversary Detection For Cognitive Radio Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-75868-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-75868-8_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75867-1
Online ISBN: 978-3-319-75868-8
eBook Packages: EngineeringEngineering (R0)