scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Malicious User Detection in a Cognitive Radio Cooperative Sensing System

01 Aug 2010-IEEE Transactions on Wireless Communications (Institute of Electrical and Electronics Engineers)-Vol. 9, Iss: 8, pp 2488-2497
TL;DR: In this article, the authors investigate schemes to identify the malicious users based on outlier detection techniques for a cooperative sensing system employing energy detection at the sensors, considering constraints imposed by the CR scenario such as the lack of information about the primary signal propagation environment and the small size of the sensing data samples.
Abstract: Reliable detection of primary users (PUs) is an important task for cognitive radio (CR) systems. Cooperation among a few spectrum sensors has been shown to offer significant gain in the performance of the CR spectrum-sensing system by countering the shadow-fading effects. We consider a parallel fusion network in which the sensors send their sensing information to an access point which makes the final decision regarding presence or absence of the PU signal. It has been shown in the literature that the presence of malicious users sending false sensing data can severely degrade the performance of such a cooperative sensing system. In this paper, we investigate schemes to identify the malicious users based on outlier detection techniques for a cooperative sensing system employing energy detection at the sensors. We take into consideration constraints imposed by the CR scenario such as the lack of information about the primary signal propagation environment and the small size of the sensing data samples. Considering partial information of the PU activity, we propose a novel method to identify the malicious users. We further propose malicious user detection schemes that take into consideration the spatial information of the CR sensors. The performance of the proposed schemes are studied using simulations.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: The state-of-the-art survey of cooperative sensing is provided to address the issues of cooperation method, cooperative gain, and cooperation overhead.

1,800 citations

Journal ArticleDOI
TL;DR: The proposed scheme is robust against Byzantine attacks and can successfully remove the Byzantines in a short time span and is also proposed a novel and easy to implement technique to counter Byzantine attacks in CRNs.
Abstract: Cognitive radio (CR) has emerged as a solution to the problem of spectrum scarcity as it exploits transmission opportunities in the under-utilized spectrum bands of primary users. Collaborative (or distributed) spectrum sensing has been shown to have various advantages in terms of spectrum utilization and robustness. The data fusion scheme is a key component of collaborative spectrum sensing. In this paper, we analyze the performance limits of collaborative spectrum sensing under Byzantine Attacks where malicious users send false sensing data to the fusion center leading to increased probability of incorrect sensing results. We show that above a certain fraction of Byzantine attackers in the CR network, data fusion scheme becomes completely incapable and no reputation based fusion scheme can achieve any performance gain. We present optimal attacking strategies for given attacking resources and also analyze the possible counter measures at the fusion center (FC). Based on these analyses, we also propose a novel and easy to implement technique to counter Byzantine attacks in CRNs. In this approach, the FC identifies the attackers and removes them from the data fusion process. Our analysis indicates that the proposed scheme is robust against Byzantine attacks and can successfully remove the Byzantines in a short time span.

284 citations

Journal ArticleDOI
Min Jia1, Xuemai Gu1, Qing Guo1, Wei Xiang1, Naitong Zhang1 
TL;DR: This article proposes a space segment design based on a spectrum-sensing-based cooperative framework, in consideration of the presence of MUs, and presents an overview of future broadband hybrid S-T communications systems, followed by an introduction to a typical application scenario of futuristic CR-broadband hybridS-T communication systems toward 5G.
Abstract: The development of 5G terrestrial mobile communications technology has been a driving force for revolutionizing satellite mobile communications. Satellite mobile communications, which carry many unique features, such as large coverage and support for reliable emergency communications, should satisfy the requirements for convergence between terrestrial mobile communications and satellite mobile communications for future broadband hybrid S-T communications. On the other hand, CR is an attractive technique to support dynamic single-user or multi-user access in hybrid S-T communications. This article first discusses several key issues in applying cognitive radio to future broadband satellite communications toward 5G. Then we present an overview of future broadband hybrid S-T communications systems, followed by an introduction to a typical application scenario of futuristic CR-broadband hybrid S-T communication systems toward 5G. Moreover, we propose a space segment design based on a spectrum-sensing-based cooperative framework, in consideration of the presence of MUs. An experiment platform for the proposed CR-based hybrid S-T communications system is also demonstrated.

277 citations

Proceedings ArticleDOI
05 Jan 2010
TL;DR: The proposed scheme is robust against Byzantine attacks and can successfully remove the Byzantines in a short time span and is also proposed a novel and easy to implement technique to counter Byzantine attacks in CRNs.
Abstract: Cognitive radio (CR) has emerged as a solution to the problem of spectrum scarcity as it exploits the transmission opportunities in the under-utilized spectrum bands of primary users. Collaborative (or distributed) spectrum sensing has been shown to have various advantages in terms of spectrum utilization and robustness. The data fusion scheme is a key component of collaborative spectrum sensing. In this paper, we analyze the performance limits of collaborative spectrum sensing under Byzantine Attacks where malicious users send false sensing data to the fusion center leading to increased probability of incorrect sensing results. We show that above a certain fraction of Byzantine attackers in the CR network, data fusion scheme becomes completely incapable and no reputation based fusion scheme can achieve any performance gain. We present optimal attacking strategies for given attacking resources and also analyze the possible counter measures at the fusion center (FC).

228 citations

Journal ArticleDOI
TL;DR: This paper presents the recent advances on security threats/attacks and countermeasures in CRNs focusing more on the physical layer by categorizing them in terms of their types, their existence in the CR cycle, network protocol layers, and game theoretic approaches.
Abstract: Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices with the capability to adapt their operating parameters on the fly based on the radio environment, to utilize the scarce radio frequency spectrum in an efficient and opportunistic manner. However, due to the increasingly pervasive existence of smart wireless devices in cognitive radio networks (CRNs), CR systems are vulnerable to numerous security threats that affect the overall performance. There have been many significant advances on security threats and countermeasures in CRNs in the past few years. Our main goal in this paper is to present the state-of-the-art research results and approaches proposed for CRN security to protect both unlicensed secondary users and licensed primary users. Specifically, we present the recent advances on security threats/attacks and countermeasures in CRNs focusing more on the physical layer by categorizing them in terms of their types, their existence in the CR cycle, network protocol layers (exploited during their activities and defense strategies), and game theoretic approaches. The recent important attacks and countermeasures in CRNs are also summarized in the form of tables. We also present recommendations that can be followed while implementing countermeasures to enhance CRN security. With this paper, readers can have a more thorough understanding of CRN security attacks and countermeasures, as well as research trends in this area.

214 citations

References
More filters
Journal ArticleDOI
TL;DR: In this article, Lindley et al. make the less restrictive assumption that such a normal, homoscedastic, linear model is appropriate after some suitable transformation has been applied to the y's.
Abstract: [Read at a RESEARCH METHODS MEETING of the SOCIETY, April 8th, 1964, Professor D. V. LINDLEY in the Chair] SUMMARY In the analysis of data it is often assumed that observations Yl, Y2, *-, Yn are independently normally distributed with constant variance and with expectations specified by a model linear in a set of parameters 0. In this paper we make the less restrictive assumption that such a normal, homoscedastic, linear model is appropriate after some suitable transformation has been applied to the y's. Inferences about the transformation and about the parameters of the linear model are made by computing the likelihood function and the relevant posterior distribution. The contributions of normality, homoscedasticity and additivity to the transformation are separated. The relation of the present methods to earlier procedures for finding transformations is discussed. The methods are illustrated with examples.

12,158 citations

Journal ArticleDOI
01 Apr 1967
TL;DR: By using Shannon's sampling formula, the problem of the detection of a deterministic signal in white Gaussian noise, by means of an energy-measuring device, reduces to the consideration of the sum of the squares of statistically independent Gaussian variates.
Abstract: By using Shannon's sampling formula, the problem of the detection of a deterministic signal in white Gaussian noise, by means of an energy-measuring device, reduces to the consideration of the sum of the squares of statistically independent Gaussian variates. When the signal is absent, the decision statistic has a central chi-square distribution with the number of degrees of freedom equal to twice the time-bandwidth product of the input. When the signal is present, the decision statistic has a noncentral chi-square distribution with the same number of degrees of freedom and a noncentrality parameter λ equal to the ratio of signal energy to two-sided noise spectral density. Since the noncentral chi-square distribution has not been tabulated extensively enough for our purpose, an approximate form was used. This form replaces the noncentral chi-square with a modified chi-square whose degrees of freedom and threshold are determined by the noncentrality parameter and the previous degrees of freedom. Sets of receiver operating characteristic (ROC) curves are drawn for several time-bandwidth products, as well as an extended nomogram of the chi-square cumulative probability which can be used for rapid calculation of false alarm and detection probabilities. Related work in energy detection by J. I. Marcum and E. L Kaplan is discussed.

3,071 citations

Book
01 Jan 1980
TL;DR: A computer normalizes the one or more sets of historical data points and creates a first visual representation corresponding to the first set of the oneor more sets and the second set of additional points.
Abstract: The problem of outliers is one of the oldest in statistics, and during the last century and a half interest in it has waxed and waned several times. Currently it is once again an active research area after some years of relative neglect, and recent work has solved a number of old problems in outlier theory, and identified new ones. The major results are, however, scattered amongst many journal articles, and for some time there has been a clear need to bring them together in one place. That was the original intention of this monograph: but during execution it became clear that the existing theory of outliers was deficient in several areas, and so the monograph also contains a number of new results and conjectures. In view of the enormous volume ofliterature on the outlier problem and its cousins, no attempt has been made to make the coverage exhaustive. The material is concerned almost entirely with the use of outlier tests that are known (or may reasonably be expected) to be optimal in some way. Such topics as robust estimation are largely ignored, being covered more adequately in other sources. The numerous ad hoc statistics proposed in the early work on the grounds of intuitive appeal or computational simplicity also are not discussed in any detail.

2,180 citations

Proceedings ArticleDOI
05 Dec 2005
TL;DR: This paper studies spectrum-sharing between a primary licensee and a group of secondary users and suggests that collaboration may improve sensing performance significantly.
Abstract: Traditionally, frequency spectrum is licensed to users by government agencies in a fixed manner where licensee has exclusive right to access the allocated band. This policy has been de jure practice to protect systems from mutual interference for many years. However, with increasing demand for the spectrum and scarcity of vacant bands, a spectrum policy reform seems inevitable. Meanwhile, recent measurements suggest the possibility of sharing spectrum among different parties subject to interference-protection constraints. In this paper we study spectrum-sharing between a primary licensee and a group of secondary users. In order to enable access to unused licensed spectrum, a secondary user has to monitor licensed bands and opportunistically transmit whenever no primary signal is detected. However, detection is compromised when a user experiences shadowing or fading effects. In such cases, user cannot distinguish between an unused band and a deep fade. Collaborative spectrum sensing is proposed and studied in this paper as a means to combat such effects. Our analysis and simulation results suggest that collaboration may improve sensing performance significantly

1,939 citations

Proceedings ArticleDOI
11 Dec 2006
TL;DR: This work proposes light-weight cooperation in sensing based on hard decisions to mitigate the sensitivity requirements on individual radios and shows that the "link budget" that system designers have to reserve for fading is a significant function of the required probability of detection.
Abstract: Cognitive Radios have been advanced as a technology for the opportunistic use of under-utilized spectrum since they are able to sense the spectrum and use frequency bands if no Primary user is detected. However, the required sensitivity is very demanding since any individual radio might face a deep fade. We propose light-weight cooperation in sensing based on hard decisions to mitigate the sensitivity requirements on individual radios. We show that the "link budget" that system designers have to reserve for fading is a significant function of the required probability of detection. Even a few cooperating users (~10-20) facing independent fades are enough to achieve practical threshold levels by drastically reducing individual detection requirements. Hard decisions perform almost as well as soft decisions in achieving these gains. Cooperative gains in a environment where shadowing is correlated, is limited by the cooperation footprint (area in which users cooperate). In essence, a few independent users are more robust than many correlated users. Unfortunately, cooperative gain is very sensitive to adversarial/failing Cognitive Radios. Radios that fail in a known way (always report the presence/absence of a Primary user) can be compensated for by censoring them. On the other hand, radios that fail in unmodeled ways or may be malicious, introduce a bound on achievable sensitivity reductions. As a rule of thumb, if we believe that 1/N users can fail in an unknown way, then the cooperation gains are limited to what is possible with N trusted users.

1,562 citations