scispace - formally typeset
Open AccessJournal ArticleDOI

Malicious User Detection in a Cognitive Radio Cooperative Sensing System

Reads0
Chats0
TLDR
In this article, the authors investigate schemes to identify the malicious users based on outlier detection techniques for a cooperative sensing system employing energy detection at the sensors, considering constraints imposed by the CR scenario such as the lack of information about the primary signal propagation environment and the small size of the sensing data samples.
Abstract
Reliable detection of primary users (PUs) is an important task for cognitive radio (CR) systems. Cooperation among a few spectrum sensors has been shown to offer significant gain in the performance of the CR spectrum-sensing system by countering the shadow-fading effects. We consider a parallel fusion network in which the sensors send their sensing information to an access point which makes the final decision regarding presence or absence of the PU signal. It has been shown in the literature that the presence of malicious users sending false sensing data can severely degrade the performance of such a cooperative sensing system. In this paper, we investigate schemes to identify the malicious users based on outlier detection techniques for a cooperative sensing system employing energy detection at the sensors. We take into consideration constraints imposed by the CR scenario such as the lack of information about the primary signal propagation environment and the small size of the sensing data samples. Considering partial information of the PU activity, we propose a novel method to identify the malicious users. We further propose malicious user detection schemes that take into consideration the spatial information of the CR sensors. The performance of the proposed schemes are studied using simulations.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

When Attackers Meet AI: Learning-Empowered Attacks in Cooperative Spectrum Sensing

TL;DR: Li et al. as discussed by the authors proposed a learning-empowered attack framework named Learning-Evaluation-Beating (LEB) to mislead the fusion center by constructing a surrogate model of the fusion centre's decision model.
Journal ArticleDOI

A Multi-factor Trust Management Scheme for Secure Spectrum Sensing in Cognitive Radio Networks

TL;DR: This paper proposes a novel trust management mechanism that evaluates the trustworthiness of each node participating in the CSS scheme called sensing reputation (SR), and introduces the concept of sensing reputation chain to record and track the future behavior of the identified suspicious users.
Journal ArticleDOI

CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks

TL;DR: A distributed defense scheme, termed conjugate prior based SSDF detection (CoPD), to countermeasure the SSDF attack, which can effectively exclude the malicious sensing reports from SSDF attackers, so that benign SUs can effectively detect the PU activity.
Proceedings Article

Robust collaborative spectrum sensing based on beta reputation system

TL;DR: A credibility based mechanism for collaborative spectrum sensing using beta reputation system has been introduced and results show that proposed scheme significantly improves the reliability of aggregated data in the presence of falsified users.
Posted Content

Cognitive Radio Networks: Realistic or Not?

TL;DR: In this article, the authors present a set of real-world scenarios, inspired by realistic settings in commercial telecommunications networks, focusing on spectrum sensing as a basic and critical functionality in the deployment of CRs.
References
More filters
Journal ArticleDOI

An Analysis of Transformations

TL;DR: In this article, Lindley et al. make the less restrictive assumption that such a normal, homoscedastic, linear model is appropriate after some suitable transformation has been applied to the y's.
Journal ArticleDOI

Energy detection of unknown deterministic signals

H. Urkowitz
TL;DR: By using Shannon's sampling formula, the problem of the detection of a deterministic signal in white Gaussian noise, by means of an energy-measuring device, reduces to the consideration of the sum of the squares of statistically independent Gaussian variates.
Book

Identification of outliers

TL;DR: A computer normalizes the one or more sets of historical data points and creates a first visual representation corresponding to the first set of the oneor more sets and the second set of additional points.
Proceedings ArticleDOI

Collaborative spectrum sensing for opportunistic access in fading environments

TL;DR: This paper studies spectrum-sharing between a primary licensee and a group of secondary users and suggests that collaboration may improve sensing performance significantly.
Proceedings ArticleDOI

Cooperative Sensing among Cognitive Radios

TL;DR: This work proposes light-weight cooperation in sensing based on hard decisions to mitigate the sensitivity requirements on individual radios and shows that the "link budget" that system designers have to reserve for fading is a significant function of the required probability of detection.
Related Papers (5)