Skip to main content

Addressing the Effects of the Spectrum Sensing Data Falsification Attack Using the Enhanced Q-out-of-m Rule

  • Conference paper
  • First Online:
Proceedings of Sixth International Congress on Information and Communication Technology

Abstract

The spectrum sensing data falsification (SSDF) attack modifies the energy values received from the primary users (PUs). During cooperative spectrum sensing (CSS), it reports the incorrect data to its neighbouring secondary users (SUs). CSS is conducted by SUs which perform local sensing and then share observed data to achieve distributed global sensing. In this study, the effects of SSDF in cognitive radio ad hoc network (CRAHN) are evaluated. The enhanced q-out-of-m rule scheme is proposed to address the effects of SSDF in CRAHN. The proposed scheme was evaluated in MATLAB and the simulation results show that it outperformed the DBSD scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mapunya S, Velempini M (2019) The design of byzantine attack mitigation scheme in cognitive radio ad-hoc networks. In: Proceedings of 2018 international conference on intelligent and innovative computing applications (ICONIC), Holiday Inn Mauritius, Mon Trésor, Plaine Magnien, Mauritius

    Google Scholar 

  2. Wei Z-H, Hu B-J (2018) A fair multi-channel assignment algorithm with practical implementation in distributed cognitive radio networks. IEEE Access 6:14255–14267

    Article  Google Scholar 

  3. Boddapati KH, Bhatnagar RM, Prakriya S (2018) Performance of incremental relaying protocols for cooperative multi-hop CRNs. IEEE Trans Veh Technol 67(7):6006–6022

    Article  Google Scholar 

  4. Mapunya SS, Velempini M (2019) The design and implementation of a robust scheme to combat the effect of malicious nodes in cognitive radio ad hoc networks. South Afr Comput J 2(31):178–194

    Google Scholar 

  5. Tephillah S, Manickam ML (2020) An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks. Wirel Commun Mob Comput 2020:1–9

    Article  Google Scholar 

  6. Osama E, Maha E, Osamu M, Hiroshi F (2018) Game theoretic approaches for cooperative spectrum sensing in energy-harvesting cognitive radio networks. IEEE Access 6:11086–11100

    Article  Google Scholar 

  7. Chen C, Song M, Xin C (2014) CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks. Wireless Netw 20(8):2521–2528

    Article  Google Scholar 

  8. Ngomane I, Velempini M, Dlamini SV (2016) The design of a defence mechanism to mitigate the spectrum sensing data falsification attack in cognitive radio ad hoc networks. In: Proceedings of 2016 international conference on Advances in Computing and Communication Engineering (ICACCE), Durban, South Africa

    Google Scholar 

  9. Tong J, Jin M, Guo Q, Li Y (2018) Cooperative spectrum sensing: a blind and soft fusion detector. IEEE Trans Wireless Commun 17(4), 2726–2737

    Google Scholar 

  10. Chen H, Zhou M, Xie L, Li J (2017) Cooperative spectrum sensing with M-Ary quantized data in cognitive radio networks under SSDF attacks. IEEE Trans Wireless Commun 16(8):5244–5257

    Article  Google Scholar 

  11. Sun M, Jin M, Guo Q, Li Y (2017) Cooperative spectrum sensing under ambient malicious interferences. IEEE Commun Lett 22(2):432–435

    Article  Google Scholar 

  12. Jadhav A, Shinde SC (2015) Centralized cooperative and non-cooperative spectrum sensing using energy detection in cognitive radio. Int J Recent Sci Res 6(8):5764–5767

    Google Scholar 

  13. Akyildiz I, Lo B, Balakrishnan R (2011) Cooperative spectrum sensing in cognitive radio networks: a survey. Phy Commun 4(1):40–62

    Article  Google Scholar 

  14. Chen Q, Motani M, Wong W-C, Nallanathan A (2010) Cooperative spectrum sensing strategies for cognitive radio mesh networks. IEEE J Select Topics Sign Proc 5(1):56–67

    Article  Google Scholar 

  15. Nie G, Ding G, Zhang L, Wu Q (2017) Byzantine defense in collaborative spectrum sensing via bayesian learning. IEEE Access 5:20089–20098

    Article  Google Scholar 

  16. Wang H, Yao Y-D, Peng S (2018) Prioritized secondary user access control in cognitive radio networks. IEEE Access 6:11007–11016

    Article  Google Scholar 

  17. Seif M, Karmoose M, Youssef M (2015) Censoring for improved sensing performance in infrastructure-less cognitive radio networks. In: Proceedings of 2015 IEEE 81st vehicular technology conference, Glasgow, UK

    Google Scholar 

  18. Chen C, Song M, Xin C (2013) A density based scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks. In: Proceedings of 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA

    Google Scholar 

  19. Yu FR, Tang H, Huang M, Li Z, Mason P (2009) Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In: MILCOM 2009–2009 IEEE Military Communications Conference. MA, USA, Boston

    Book  Google Scholar 

  20. Bai P, Zhang X, Ye F (2017) Reputation-based Beta reputation system against SSDF attack in cognitive radio networks. In: Proceedings of 2017 Progress in Electromagnetics Research Symposium, PIERS

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Velempini Mthulisi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mthulisi, V., Issah, N., Semaka, M.S. (2022). Addressing the Effects of the Spectrum Sensing Data Falsification Attack Using the Enhanced Q-out-of-m Rule. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Sixth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 235. Springer, Singapore. https://doi.org/10.1007/978-981-16-2377-6_55

Download citation

Publish with us

Policies and ethics