scispace - formally typeset
Open AccessJournal ArticleDOI

Malicious User Detection in a Cognitive Radio Cooperative Sensing System

Reads0
Chats0
TLDR
In this article, the authors investigate schemes to identify the malicious users based on outlier detection techniques for a cooperative sensing system employing energy detection at the sensors, considering constraints imposed by the CR scenario such as the lack of information about the primary signal propagation environment and the small size of the sensing data samples.
Abstract
Reliable detection of primary users (PUs) is an important task for cognitive radio (CR) systems. Cooperation among a few spectrum sensors has been shown to offer significant gain in the performance of the CR spectrum-sensing system by countering the shadow-fading effects. We consider a parallel fusion network in which the sensors send their sensing information to an access point which makes the final decision regarding presence or absence of the PU signal. It has been shown in the literature that the presence of malicious users sending false sensing data can severely degrade the performance of such a cooperative sensing system. In this paper, we investigate schemes to identify the malicious users based on outlier detection techniques for a cooperative sensing system employing energy detection at the sensors. We take into consideration constraints imposed by the CR scenario such as the lack of information about the primary signal propagation environment and the small size of the sensing data samples. Considering partial information of the PU activity, we propose a novel method to identify the malicious users. We further propose malicious user detection schemes that take into consideration the spatial information of the CR sensors. The performance of the proposed schemes are studied using simulations.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Defending Against Byzantine Attack in Cooperative Spectrum Sensing: Defense Reference and Performance Analysis

TL;DR: This paper proposes a novel defense reference, which jointly exploits the cognitive process of spectrum sensing and spectrum access in a closed-loop manner to provide the defense scheme a solid basis without requiring any prior knowledge, and analyzes the proposed reference's favorable reliability and high robustness over the state-of-the-art references.
Journal ArticleDOI

Securing Cognitive Radio Networks using blockchains

TL;DR: A blockchain based method is proposed for the MU detection in network that can easily be discriminated from a reliable user through cryptographic keys and can be deployed for the validation of participating users in the process of spectrum sensing in CRN for IoTs.
Journal ArticleDOI

History based forward and feedback mechanism in cooperative spectrum sensing including malicious users in cognitive radio network.

TL;DR: This work considers the Kullback-Leibler (KL) divergence method for minimizing spectrum sensing data falsification (SSDF) attack and shows that the proposed KL divergence method has performed better than the existing equal gain combination (EGC), maximum gain combinations (MGC) and simple KL divergence schemes in the presence of MUs.
Journal ArticleDOI

Byzantine Defense in Collaborative Spectrum Sensing via Bayesian Learning

TL;DR: A Bayesian offline learning algorithm is developed by considering one practical challenge that the ground-truth spectrum state is unavailable for training, and a Bayesian online learning algorithm by considering the case that the sensors’ attribute may be time-varying is developed.
Proceedings ArticleDOI

FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissions

TL;DR: Simulations and experiments show that in the presence of malicious nodes operating under 2 different attack models, FastProbe reduces the throughput loss due to sensing by as much as 65% compared to existing algorithms.
References
More filters
Journal ArticleDOI

An Analysis of Transformations

TL;DR: In this article, Lindley et al. make the less restrictive assumption that such a normal, homoscedastic, linear model is appropriate after some suitable transformation has been applied to the y's.
Journal ArticleDOI

Energy detection of unknown deterministic signals

H. Urkowitz
TL;DR: By using Shannon's sampling formula, the problem of the detection of a deterministic signal in white Gaussian noise, by means of an energy-measuring device, reduces to the consideration of the sum of the squares of statistically independent Gaussian variates.
Book

Identification of outliers

TL;DR: A computer normalizes the one or more sets of historical data points and creates a first visual representation corresponding to the first set of the oneor more sets and the second set of additional points.
Proceedings ArticleDOI

Collaborative spectrum sensing for opportunistic access in fading environments

TL;DR: This paper studies spectrum-sharing between a primary licensee and a group of secondary users and suggests that collaboration may improve sensing performance significantly.
Proceedings ArticleDOI

Cooperative Sensing among Cognitive Radios

TL;DR: This work proposes light-weight cooperation in sensing based on hard decisions to mitigate the sensitivity requirements on individual radios and shows that the "link budget" that system designers have to reserve for fading is a significant function of the required probability of detection.
Related Papers (5)