DOI QR코드

DOI QR Code

Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks

  • Feng, Jingyu (Department of Communication Engineering, Xi'an University of Post & Telecommunication) ;
  • Zhang, Yuqing (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences) ;
  • Lu, Guangyue (Department of Communication Engineering, Xi'an University of Post & Telecommunication) ;
  • Zhang, Liang (Department of Communication Engineering, Xi'an University of Post & Telecommunication)
  • Received : 2013.08.06
  • Accepted : 2014.01.04
  • Published : 2014.01.30

Abstract

Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce radio spectrum resources. However, most of CSS schemes assume all secondary users (SU) are honest, and thus offering opportunities for malicious SUs to launch the spectrum sensing data falsification attack (SSDF attack). To combat such misbehaved behaviors, recent efforts have been made to trust schemes. In this paper, we argue that powering CSS with traditional trust schemes is not enough. The rational SSDF attack is found in this paper. Unlike the simple SSDF attack, rational SSDF attackers send out false sensing data on a small number of interested primary users (PUs) rather than all PUs. In this case, rational SSDF attackers can keep up high trustworthiness, resulting in difficultly detecting malicious SUs in the traditional trust schemes. Meanwhile, a defense scheme using a novel trust approach is proposed to counter rational SSDF attack. Simulation results show that this scheme can successfully reduce the power of rational SSDF, and thus ensure the performance of CSS.

Keywords

References

  1. Federal Communications Commission, "Spectrum Policy Task Force," Rep. ET Docket no. 02-135, Nov. 2002. http://www.fcc.gov/sptf/files/SEWGFinalReport_1.pdf
  2. J. Mitola and G. Q. Maguire, "Cognitive radio: making software radios more personal," IEEE Personal on Communication, vol. 6, no. 4, pp. 13-18, August, 1999. https://doi.org/10.1109/98.788210
  3. G. U, Hwang and S. Roy, "Design and analysis of optimal random access policies in cognitive radio networks," IEEE Transactions on Communications, vol. 60, no. 1, pp. 121-131, January, 2012. https://doi.org/10.1109/TCOMM.2011.112311.100702
  4. D. Cabric, S. Mishra and R. Brodersen, "Implementation issues in spectrum sensing for cognitive radios," in Proc. of Asilomar Conference on Signals, Systems, and Computers, pp. 772-776, November 7-10, 2004.
  5. F. R Yu, M. Huang and H. Tang, "Biologically inspired consensus-based spectrum sensing in mobile Ad hoc networks with cognitive radios," IEEE Network, vol. 24, no. 3, pp. 26-30, June, 2010.
  6. R. L Chen, J. M Park and Y. T Hou, "Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 50-55, April, 2008.
  7. T. Qin, H. Yu and C. Leung, "Towards a trust-aware cognitive radio architecture," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 13, no. 2, pp. 86-95, April, 2009. https://doi.org/10.1145/1621076.1621085
  8. K. Zeng, P. Pawelczak and D. Cabri, "Reputation-based cooperative spectrum sensing with trusted nodes assistance," IEEE Communications Letters, vol. 14, no. 3, pp. 26-228, March, 2010.
  9. T. Qin, C, Leung, C. Y Mao and Y. Q Chen, "Trust-aware resource allocation in a cognitive radio system," in Proc. of 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), pp. 797-801, May 25-27, 2012.
  10. Q. Q Pei, B. B Yuan, L. Li and H. N Li, "A sensing and etiquette reputation-based trust management for centralized cognitive radio networks," Neurocomputing, vol. 101, no. 4, pp. 129-138, July, 2013. https://doi.org/10.1016/j.neucom.2012.08.005
  11. R. Chen, J. M. Park and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks," in Proc. of 27th IEEE INFOCOM Conference, pp. 1876-1884, April 13-18, 2008.
  12. I. F. Akyildiz, B. F. Lo and R. Balakrishnan, "Cooperative spectrum sensing in cognitive radio networks: A survey," Physical Communication, vol. 4, no. 1, February, pp. 40-62, 2011. https://doi.org/10.1016/j.phycom.2010.12.003
  13. E. Peh, Y. C Liang, Y. L Guan and Y. G Zeng, "Optimization of Cooperative Sensing in Cognitive Radio Networks: A Sensing-Throughput Tradeoff View," IEEE Transactions on Vehicular Technology, vol. 58, no. 9, pp. 5294-5299, November, 2009. https://doi.org/10.1109/TVT.2009.2028030
  14. I. F. Akyildiz, W. Y Lee and K. R Chowdhury, "CRAHNs: cognitive radio ad hoc networks," Ad Hoc Networks, vol. 7, no.5, pp. 810-836, October, 2009. https://doi.org/10.1016/j.adhoc.2009.01.001
  15. H. Tang, "Some physical layer issues of wide-band cognitive radio systems," in Proc. of 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, pp. 151-159, November 8-11, 2005.
  16. W. Zhang and R. K Mallik, "Cooperative Spectrum Sensing Optimization in Cognitive Radio Networks," in Proc. of IEEE International Conference on Communications, pp. 3411-3415, May 19-23, 2008.
  17. M. A Morid and M. Shajari, "An enhanced e-commerce trust model for community based centralized systems," Electronic Commerce Research, vol. 12, no. 4, pp. 409-427, November, 2012. https://doi.org/10.1007/s10660-012-9099-3
  18. X. Y Li, F. Zhou and X. D Yang. Scalable Feedback Aggregating (SFA) Overlay for Large-Scale P2P Trust Management. IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1944-1957, October, 2012. https://doi.org/10.1109/TPDS.2012.26
  19. A. Boukerche, Y. Ren and R. Pazzi. "An adaptive computational trust model for mobile ad hoc networks," in Proc. the 5th International Conference on Wireless Communications and Mobile Computing, pp. 191-195, June 21-24, 2009.
  20. A. Mohaisen, N. Hopper and Y. Kim, "Keep Your Friends Close: Incorporating Trust into Social-Network-based Sybil Defenses," in Proc. of 30th IEEE INFOCOM Conference, pp. 1943-1951, April 10-15, 2011.
  21. A. Josang and R. Ismail, "The beta reputation system", in Proc. the 15th Bled Electronic Commence Conference, pp. 1-14, June 17-19, 2002.
  22. Gamma function. http://en.wikipedia.org/wiki/Gamma_function
  23. H. Rif-Pous, M. Blasco and C. Garrigues, "Review of Robust Cooperative Spectrum Sensing Techniques for Cognitive Radio Networks," Wireless Personal Communications, vol. 67, no. 2, pp. 175-198, November, 2011.

Cited by

  1. Behave Well: How to Win a Pop Vacant Band via Cooperative Spectrum Sensing vol.9, pp.4, 2015, https://doi.org/10.3837/tiis.2015.04.003
  2. Comprehensive Reputation-Based Security Mechanism against Dynamic SSDF Attack in Cognitive Radio Networks vol.8, pp.12, 2014, https://doi.org/10.3390/sym8120147
  3. Supporting Trusted Soft Decision Scheme Using Volatility Decay in Cooperative Spectrum Sensing vol.10, pp.5, 2014, https://doi.org/10.3837/tiis.2016.05.007