Malicious User Detection in a Cognitive Radio Cooperative Sensing System
Reads0
Chats0
TLDR
In this article, the authors investigate schemes to identify the malicious users based on outlier detection techniques for a cooperative sensing system employing energy detection at the sensors, considering constraints imposed by the CR scenario such as the lack of information about the primary signal propagation environment and the small size of the sensing data samples.Abstract:
Reliable detection of primary users (PUs) is an important task for cognitive radio (CR) systems. Cooperation among a few spectrum sensors has been shown to offer significant gain in the performance of the CR spectrum-sensing system by countering the shadow-fading effects. We consider a parallel fusion network in which the sensors send their sensing information to an access point which makes the final decision regarding presence or absence of the PU signal. It has been shown in the literature that the presence of malicious users sending false sensing data can severely degrade the performance of such a cooperative sensing system. In this paper, we investigate schemes to identify the malicious users based on outlier detection techniques for a cooperative sensing system employing energy detection at the sensors. We take into consideration constraints imposed by the CR scenario such as the lack of information about the primary signal propagation environment and the small size of the sensing data samples. Considering partial information of the PU activity, we propose a novel method to identify the malicious users. We further propose malicious user detection schemes that take into consideration the spatial information of the CR sensors. The performance of the proposed schemes are studied using simulations.read more
Citations
More filters
Journal ArticleDOI
Defending Against Byzantine Attack in Cooperative Spectrum Sensing: Defense Reference and Performance Analysis
TL;DR: This paper proposes a novel defense reference, which jointly exploits the cognitive process of spectrum sensing and spectrum access in a closed-loop manner to provide the defense scheme a solid basis without requiring any prior knowledge, and analyzes the proposed reference's favorable reliability and high robustness over the state-of-the-art references.
Journal ArticleDOI
Securing Cognitive Radio Networks using blockchains
TL;DR: A blockchain based method is proposed for the MU detection in network that can easily be discriminated from a reliable user through cryptographic keys and can be deployed for the validation of participating users in the process of spectrum sensing in CRN for IoTs.
Journal ArticleDOI
History based forward and feedback mechanism in cooperative spectrum sensing including malicious users in cognitive radio network.
TL;DR: This work considers the Kullback-Leibler (KL) divergence method for minimizing spectrum sensing data falsification (SSDF) attack and shows that the proposed KL divergence method has performed better than the existing equal gain combination (EGC), maximum gain combinations (MGC) and simple KL divergence schemes in the presence of MUs.
Journal ArticleDOI
Byzantine Defense in Collaborative Spectrum Sensing via Bayesian Learning
TL;DR: A Bayesian offline learning algorithm is developed by considering one practical challenge that the ground-truth spectrum state is unavailable for training, and a Bayesian online learning algorithm by considering the case that the sensors’ attribute may be time-varying is developed.
Proceedings ArticleDOI
FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissions
TL;DR: Simulations and experiments show that in the presence of malicious nodes operating under 2 different attack models, FastProbe reduces the throughput loss due to sensing by as much as 65% compared to existing algorithms.
References
More filters
Journal ArticleDOI
An Analysis of Transformations
George E. P. Box,David Cox +1 more
TL;DR: In this article, Lindley et al. make the less restrictive assumption that such a normal, homoscedastic, linear model is appropriate after some suitable transformation has been applied to the y's.
Journal ArticleDOI
Energy detection of unknown deterministic signals
TL;DR: By using Shannon's sampling formula, the problem of the detection of a deterministic signal in white Gaussian noise, by means of an energy-measuring device, reduces to the consideration of the sum of the squares of statistically independent Gaussian variates.
Book
Identification of outliers
TL;DR: A computer normalizes the one or more sets of historical data points and creates a first visual representation corresponding to the first set of the oneor more sets and the second set of additional points.
Proceedings ArticleDOI
Collaborative spectrum sensing for opportunistic access in fading environments
Amir Ghasemi,Elvino S. Sousa +1 more
TL;DR: This paper studies spectrum-sharing between a primary licensee and a group of secondary users and suggests that collaboration may improve sensing performance significantly.
Proceedings ArticleDOI
Cooperative Sensing among Cognitive Radios
TL;DR: This work proposes light-weight cooperation in sensing based on hard decisions to mitigate the sensitivity requirements on individual radios and shows that the "link budget" that system designers have to reserve for fading is a significant function of the required probability of detection.