DOI QR코드

DOI QR Code

Supporting Trusted Soft Decision Scheme Using Volatility Decay in Cooperative Spectrum Sensing

  • Zhao, Feng (Department of Communication Engineering, Xi'an University of Posts & Telecommunications) ;
  • Feng, Jingyu (Department of Communication Engineering, Xi'an University of Posts & Telecommunications)
  • 투고 : 2015.11.17
  • 심사 : 2016.04.03
  • 발행 : 2016.05.31

초록

Cooperative spectrum sensing (CSS) for vacant licensed bands is one of the key techniques in cognitive radio networks. Currently, sequential probability ratio test scheme (SPRT) is considered as a powerful soft decision approach to improve the sensing result for CSS. However, SPRT assumes all secondary users (SU) are honest, and thus offering opportunities for malicious SUs to launch the spectrum sensing data falsification attack (SSDF attack). To combat such misbehaved behaviors, recent efforts have been made to trust mechanism. In this paper, we argue that powering SPRT with traditional trust mechanism is not enough. Dynamic SSDF attackers can maintain high trust in an alternant process of submitting honest or false sensing data, resulting in difficultly detecting them. Noting that the trust value of dymamic SSDF attackers behave highly volatile, a novel trusted SPRT scheme (VSPRT) based on volatility decay analysis is proposed in this paper to mitigate the harmful effect of dynamic SSDF attackers in the process of the soft-decision data fusion, and thus improving the accuracy of the final sensing result. Simulation results show that the VSPRT scheme outperforms the conventional SPRT schemes.

키워드

1. Introduction

With the rapid development of wireless communication technologies and the huge demand of the capacity for wireless applications, the wireless spectrum has become more and more scarce. On the other hand, a large portion of the licensed spectrum bands are not utilized efficiently. According to the Federal Communications Commission (FCC), temporal and geographical variations in the utilization of the licensed spectrum range from 15% to 85% [1]. To solve the contradiction between the spectrum scarcity and low spectrum utilization, cognitive radio has been considered as a useful technology, which allows the licensed users (LU) to share their vacant bands with secondary users (SU) who are not assigned bands, thereby increasing the efficiency of the spectrum utilization [2].

Cooperative spectrum sensing (CSS) is the key to the opportunistic use of assigned spectrum bands in cognitive radio networks, since it enables SUs to find the vacant bands in the case of deep shadowing and multipath fading. The main idea of CSS is to enhance the sensing performance by exploiting spatial diversity via the observations of spatially located SUs [3]. By cooperation, SUs can share their sensing data to make a combined decision with increased accuracy as comparing with the individual decisions [4].

However, little research has been done regarding security in cognitive radio, while much more research has been done on spectrum sensing and allocation problems [5]. It is well known that the cognitive radio paradigm imposes human-like characteristics (e.g., learning, adaptation and cooperation) in wireless networks [6]. Meanwhile, CSS is often established randomly among SUs that are unrelated and unknown to each other [7]. This offers opportunities for malicious SUs to launch the spectrum sensing data falsification attack (SSDF attack [8]) to degrade the profits of honest SUs. Therefore, how to efficiently and effectively defend against SSDF attack has become a very challenging issue to achieve better performance of CSS.

To encourage honest sensing data sharing among SUs, recent efforts have been made to indentify malicious SUs in CSS using trust mechanism. In [9], the authors proposed a novel trust-aware hybrid spectrum sensing scheme, in which the Beta Reputation System is used to construct trust scheme. Zeng et al [10] proposed a reputation-based cooperative spectrum sensing scheme, and categorize the trust of each SU into three states. In [11], the authors considered trust as a competitive factor to punish malicious SUs to access any vacant LU spectrum. In [12], the authors measured the trustworthiness of SUs in CSS during the cognition cycle, and incorporate it into the sensing data fusion to reduce the effect of malicious SUs on final spectrum decision making. They estimate whether an SU is trusted or not by his historical behaviors and give low weights to the sensing data from less trusted SUs when generating a final sensing result. But, their successful foundation is built on the fact that malicious SUs always submit false sensing data. To avoid the detection of trust mechanism, malicious SUs can exhibit dynamic behaviors that allow them to partially hide through providing honest sensing data sometimes while launching SSDF attack. Or rather, they can maintain high trust in an alternant process by submitting honest or false sensing data.

In this paper, we propose a novel trust mechanism to counter dynamical SSDF attack, and embed it into a powerful approach-SPRT to enhance its performance for reliable sensing decision. The main contributions of this paper are as following:

The remainder of this paper is organized as follows. In section 2, preliminaries related on CSS and dynamic SSDF attack. In section 3, we design VSPRT based on our proposed trust mechanism using volatility decay analysis to suppress dynamic SSDF attack. Simulation analysis of VSTRT is given in section 4. Finally, we conclude the paper in section 5.

 

2. Preliminaries

The CSS process can be viewed as a parallel fusion network [14]. As shown in Fig. 1, a central authority called fusion center (FC) controls the process of CSS: individual sensing, data reporting and data fusion [3].

Fig. 1.Modeling CSS as a parallel fusion network.

In the CSS process, a sensing channel is the selected licensed frequency band where a physical point-to-point link between the LU transmitter and each SU for observing the licensed spectrum, and a reporting channel is a control channel where a physical point-to-point link between each SU and the FC for sending individual sensing information [3]. It can be seen that the two types of channels are given by the network. Thus, the CSS process between SUs seems will not waste any more spectrums.

Generally, the fusion schemes are generally classified as hard decision and soft decision scheme. In the hard decision scheme [15], SUs abstract their sensing data as “1” or “0” which denotes the hypothesis of the absence (H1) and the presence (H0) of the LU spectrum respectively. Although the hard decision consumes much less control channel bandwidth than the soft scheme, it may degrade the detection performance due to the loss of information from quantization. Currently, the FC with using the soft decision scheme can achieve the best performance since it collects the original observations from each SU in the data fusion.

As a typical soft decision scheme, SPRT [13] utilizes the likelihood ratio as the decision variable by sampling the priori probability P(di|H1) and P(di|H0).

Under the constraint of the false alarm probability (P01) and the miss detection probability (P10), the final sensing result is taken based on the criteria:

It has been proved that the values of η0 and η1are decided by

Compared to other soft decision schemes based on a fixed number of observation samples, such as Neyman-Pearson Test [16], Composite Hypothesis Test [17] and D-S Evidence Combination [18], SPRT can maximize the reduction of the detection time in the same test condition since it takes variable number of observation samples as inputs based on need.

However, SPRT assumes all SUs are honest, and thus offering opportunities for malicious SUs to take advantage of CSS and launch SSDF attack by faking data, resulting in a wrong final sensing result.

 

3. Design of VSPRT

Considering the binary feature of sensing data, we first describe a basic trust evaluation (BTE) mechanism with beta function in this section. Based on this, we design a dynamic trust evaluation (VTE) mechanismusing volatility decay analysis to suppress dynamic SSDF attack. Finally, the implementation strategies of VSTRT are described.

3.1 Basic Trust Evaluation

As we know, an SU may play two types of sensing behaviors in CSS: honest or false. Such binary behaviors can affect the evaluation of trust. His trust value can be enhanced if the SU submitted honest sensing data in the past, or be reduced by false sensing data.

Recently, one of the most popular designs using binary input (i.e., positive or negative) to evaluate trust is based on beta function. It first counts the number of positive and negative behaviors that a user has conducted, and then calculates the trust value with beta probability density functions (PDF) denoted by Beta(α, β) [19].

where θ is the probability of sensing behaviors, 0≤θ≤1, α>0, β>0.

Take example for the i-th SU (SUi), honi and fali denote the number of honest sensing (positive) and false sensing (negative) performed by SUi. His trust value (Ti) can be caculated with beta function as: Ti=Beta(honi+1, fali+1).

Consider the case Γ(n)=(n-1)! when n is an integer [20]. It can be deduced that the expectation value of the beta function is given by: E[Beta(α, β)]=α/(α+β). Thus, Ti can be further described as follows:

In the BTE scheme, Ti is a real number ranging from 0 (complete distrust) to 1 (complete trust). The more SUi often submits honest sensing data, the higher trust value he will get, and vice verse.

3.2 Volatility Deacy to Trust Value

In general, the basic goal of SSDF attackers is to illegally occupy or disturb the LU spectrum. Such attackers can be classified according to their attack intention [21].

These two types of SSDF attackers are dangerous. Fortunately, they can be easily detected by current trust mechansim if malicious SUs always send false sensing data to the FC. This is because they will obtain a lower trust value when they always submit false sensing data.

To avoid the detection of trust mechanism, malicious SUs have to change their attack strategies and launch SSDF in a dynamic way (hereinafter "DSSDF"). They can exhibit dynamic behavior that allows them to maintain high trust in an alternant process of submitting honest or false sensing data.

Unlike SSDF attackers, DSSDF attackers are extremely sensitive to their trust value. Assuming SUi is a DSSDF attacker, he launches DSSDF attack under the constraint

δ is the threshold of trust value. As each Ti∈[0,1], δ is usually set to a moderate value, such as 0.5. For Ti≥δ, SUi will be not identified by trust mechanism since he is marked as honest. This inspires DSSDF attackers to find an attack procedure to maintain their trust value. That is, SUi should maintain his trust value between [δ, δ+ω], in which ω (δ≤ω≤1-δ) is the trust warning line for DSSDF attackers. Under the constraint δ≤Ti≤δ+ω, the DSSDF attack procedure can be conducted in a round mode including “Attack”→“Self-check”→“Boost” phases, as shown in Fig. 2.

Fig. 2.A round of DSSDF attack procedure.

It can be seen that the core of DSSDF attack is the trust value. To further analyze the variation of SUi’s trust value, we perform a simple simulation scenario, as shown in Fig. 3.

Fig. 3.Volatility variation of SUi’s trust value.

From Fig. 3, we can find that SUi’s trust value fluctuates from δ+ω to δ. With a higher value in ω such as 0.4, SUi can get more number of attacks. We can also find η denotes the numbers of boosting trust that SUi need consume and μ denotes the number of attacks that SUi can obtain. Both η and μ can be updated with sensing time k adaptively by the following procedure.

To counter DSSDF attack, the best measure is to suppress the increase of DSSDF attackers' trust value. Noting that the trust value of DSSDF attackers behave highly volatile, we can find the wavelength (λ) of their trust value is η+μ. Obvious, η shoud be encouraged and μ should be suppressed. The larger μ value an SU makes, the more decay to trust value he will be gotten.

Here, the time is divided into m time windows (TW), where m is a large positive integer. The length of each time window is allocated adaptively to λ. So, the volatility decay index to trust value at h-th TW can be described as:

Fot SUi his trust value at h-th TW can be further calculated as:

3.3 Implementation Strategies

The effectiveness of supporting a trust mechanism depends not only on the parameters and metrics for evaluating trust, but also on the implementation of the trust mechanism in a soft decision scheme for CSS. In the VSPRT scheme, the trust value of each SU should be considered dynamically and can be used as the weight of the soft decision. Such method can improve the detection probability of SPRT in the face of DSSDF attack.

By incorporating the dynamic trust weight into SPRT, the decision likelihood ratio at h-th TW can be calculated as:

It can be seen that Tih→1 on condition that SUi always submits honest sensing data. No exponential decay happens in Snh. When DSSDF attackers are engaged in honest or false sensing alternately, Tih→0, and it has no negative impact on Snh. Based on this, compared Snh with (σ0, σ1), the FC can make a reliable sensing result in the face of DSSDF attack. Fig. 4 shows the implementation process of VSPRT.

Fig. 4.Implementation strategies of VSPRT.

 

4. Simulation Analysis

We would perform four simulations to validate the VSPRT scheme and show its effectiveness.

4.1 Simulation Setup

The simulations are performed based on the energy detection, in which the licensed signal is a baseband QPSK modulated signal under the AWGN (additive white Gaussian noise) environment. The general simulation setup is shown in Table 1.

Table 1.Description of simulation elements

In the simulation, the SUs are split into two types: malicious SUs and normal SUs. The behavior pattern for malicious SUs is to carry out honest or false sensing by launching DSSDF attack in the light of (δ, δ+ω). Considering the case of deep shadowing and multipath fading, the behavior pattern for normal SUs is modeled to submit honest sensing data at the probability of 0.8.

4.2 Simulation Results

The simulations are executed by cycle-based fashion. At each cycle, all SUs are selected to perform CSS with each other randomly. After a few cycles, a trusted network topology is gradually formed by trust mechanism. The FC then uses trust mechanism to perform CSS actions at each cycle, and update the trust value on the corresponding SUs. Firstly, we performed two simulations to validate VSPRT in terms of suppressing DSSDF attack.

Simulation 1. We choose a malicious SU randomly to observe the variation of his trust value in the BTE and VTEmechanism. As shown in Fig. 5, DSSDF makes the malicious SU’s trust value fluctuate with the increase of sensing time. Meanwhile, his trust value generally outweighs δ in BTE. Fortunately, his trust value is rarely larger than δ in VTE. This is because the volatility decay index can suppress the boost of trust value which is promoted by launching DSSDF attack.

Fig. 5.Variation of a malicious SU’s trust value.

Simulation 2. Malicious SUs submit false sensing data in CSS, which generates a large amount of malicious responses in each sensing time. So, the best measure to suppress malicious SUs is to reduce malicious responses. Fig. 6 shows the effectiveness of reducing malicious responses. In BTE, malicious SUs’ trust value decreases slowly, so they can have more time to submit false sensing data, resulting in more malicious responses. However, in VTE, malicious SUs’ trust value declines rapidly, and lies in [δ, δ+ω] for a very short time, and thus suppressing malicious responses effectively.

Fig. 6.Suppressing malicious responses.

From the above two simulations, we can see that the DTE scheme can suppress DSSDF attack effectively. Therefore, this mechanism is embedded into VSPRT to validate its improving the sensing performance compared with SPRT [12] and TNA [7] in the Always-busy and the Always-free attack pattern respectively. In the following simulations, we use P01=1e-05 and P10=1e-06 for the three types of soft decision schemes by using the Monte Carlo simulation.

Simulation 3. In the Always-busy attack pattern, the performance of soft decision schemes relies on the probability of correct sensing (The sum of the probability of sensing H1 and H0 correctly) for the LU spectrums. As shown in Fig. 7, VSPRT significantly outperforms SPRT with the percentage of malicious SUs. Although both VSPRT and TNA employ the exponential weight to eliminate the effect of malicious SUs in the same simulation environment, VSPRT is also better than TNA in the probability of correct sensing since TNA lacks the consideration of evaluating trust dynamically.

Fig. 7.Probability of correct sensing at Always-busy.

Simulation 4. In the Always-free attack pattern, a lower probability of miss detection (The miss probability of misleading H1 as H0) also indicates the better performance for soft decision schemes. As shown in Fig. 8, VSPRT can identify malicious SUs dynamically by introducing the volatility decay index, so its performance outperforms SPRT with the percentage of malicious SUs and is more stable than TNA.

Fig. 8.Probability of miss detection at Always-free.

 

5. Conclusion

In this paper, we have proposed a dynamic trust evaluation mechanism based on volatility decay analysis to defend against DSSDF attack. The the volatility decay index is introduced in the mechanism to evaluate the trust of SUs dynamically, which can mitigate the harmful effect of malicious SUs and thus improving the accuracy of the final sensing result. Meanwhile, such dynamic trust mechanism is embedded into VSPRT to enhance its performance for reliable sensing result. The implementation strategies of VSTRT are described in detail. Simulation results show that the VSPRT scheme can suppress DSSDF attackers effectively, and outperforms the conventional SPRT and TNA scheme.

참고문헌

  1. Federal Communications Commission, "Spectrum Policy Task Force," Rep. ET Docket, no. 02-135, Nov. 2002. http://www.fcc.gov/sptf/files/SEWGFinalReport_1.pdf
  2. H. Fang, L. Xu, C. Huang, "Dynamic Opportunistic Spectrum Access of Multi-channel Multi-radio Based on Game Theory in Wireless Cognitive Network," in Proc. of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, pp.127-132, December 11-13, 2013. Article (CrossRef Link)
  3. I. F. Akyildiz, B. F. Lo and R. Balakrishnan, “Cooperative Spectrum Sensing in Cognitive Radio Networks: A survey,” Physical Communication, vol. 4, no. 1, February, pp. 40-62, 2011. Article (CrossRef Link) https://doi.org/10.1016/j.phycom.2010.12.003
  4. D. Cabric, S. Mishra and R. Brodersen, "Implementation Issues in Spectrum Sensing for Cognitive Radios," in Proc. of Asilomar Conference on Signals, Systems, and Computers, pp. 772-776, November 7-10, 2004. Article (CrossRef Link)
  5. J. Minho, H.L Han, D. Kim, et al, “Selfish Attacks and Detection in Cognitive Radio Ad-hoc Networks,” IEEE Networks, vol.27, no.3, pp.46-50, June 2013. Article (CrossRef Link) https://doi.org/10.1109/MNET.2013.6523808
  6. F. R Yu, M. Huang and H. Tang, “Biologically Inspired Consensus-based Spectrum Sensing in Mobile Ad hoc Networks with Cognitive Radios,” IEEE Network, vol. 24, no. 3, pp. 26-30, June, 2010. Article (CrossRef Link) https://doi.org/10.1109/MNET.2010.5464224
  7. J.Y Feng, Y.Q Zhang, G.Y Lu, et al, “Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks,” KSII Transactions on Internet and Information Systems, vol.8, no.1, pp.1-17, January, 2014. Article (CrossRef Link) https://doi.org/10.3837/tiis.2014.01.001
  8. R. L Chen, J. M Park and Y. T Hou, “Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks,” IEEE Communications Magazine, vol. 46, no. 4, pp. 50-55, April, 2008. Article (CrossRef Link) https://doi.org/10.1109/MCOM.2008.4481340
  9. T. Qin, H. Yu and C. Leung, “Towards a Trust-aware Cognitive Radio Architecture,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 13, no. 2, pp. 86-95, April, 2009. Article (CrossRef Link) https://doi.org/10.1145/1621076.1621085
  10. K. Zeng, P. Pawełczak and D. Cabri, “Reputation-based cooperative spectrum sensing with trusted nodes assistance,” IEEE Communications Letters, vol. 14, no. 3, pp. 26-228, March, 2010. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2010.03.092240
  11. J.Y Feng, G.Y Lu, H Chang, “Behave well: How to Win a Pop Vacant Band via Cooperative Spectrum Sensing,” KSII Transactions on Internet and Information Systems, vol.9, no.2, pp.1321-1336, April, 2015. Article (CrossRef Link)
  12. Q. Q Pei, B. B Yuan, L. Li and H. N Li, “A Sensing and Etiquette Reputation-based Trust Management for Centralized Cognitive Radio Networks,” Neurocomputing, vol. 101, no. 4, pp. 129-138, July, 2013. Article (CrossRef Link) https://doi.org/10.1016/j.neucom.2012.08.005
  13. Y. U Liu, X. R Li, "Operating Characteristic and Average Sample Number Functions of Truncated Sequential Probability Ratio Test ," in Proc. of the 5th IEEE International Conference on Information Fusion, pp.1776-1783, July 9-12, 2012. Article (CrossRef Link)
  14. R. Chen, J. M. Park and K. Bian, "Robust Distributed Spectrum Sensing in Cognitive Radio Networks," in Proc. of 27th IEEE INFOCOM Conference, pp. 1876-1884, April 13-18, 2008. Article (CrossRef Link)
  15. E. Peh, Y. C Liang, Y. L Guan and Y. G Zeng, “Optimization of Cooperative Sensing in Cognitive Radio Networks: A Sensing-Throughput TradeoView,” IEEE Transactions on Vehicular Technology, vol. 58, no. 9, pp. 5294-5299, November, 2009. Article (CrossRef Link) https://doi.org/10.1109/TVT.2009.2028030
  16. Y. Sung, L. Tong and H. Poor, “Neyman-Pearson Detection of Gauss-markov Signals in Noise: Closed-form Error Exponent and Properties,” IEEE Transaction on Information Theory, vol.52, no.4, pp.1354-1365, Sept., 2006. Article (CrossRef Link) https://doi.org/10.1109/TIT.2006.871599
  17. S. Zarrin, T. J Lim, "Composite Hypothesis Testing for Cooperative Spectrum Sensing in Cognitive Radio," in Proc. of the 2009 IEEE International Conference on Communications, pp.1-5, June 14-18, 2012. Article (CrossRef Link)
  18. Q. H Peng, K. Zeng, J.Wang, et al, "A Distributed Spectrum Sensing Scheme Based on Credibility and Evidence Theory in Cognitive Radio Context," in Proc. of the 17th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp.1-5, Sept.11-14, 2006. Article (CrossRef Link)
  19. A. Jøsang and R. Ismail, "The Beta Reputation System," in Proc. the 15th Bled Electronic Commence Conference, pp. 1-14, June 17-19, 2002. Article (CrossRef Link)
  20. Gamma function. http://en.wikipedia.org/wiki/Gamma_function
  21. H. Rif-Pous, M. Blasco and C. Garrigues, “Review of Robust Cooperative Spectrum Sensing Techniques for Cognitive Radio Networks,” Wireless Personal Communications, vol. 67, no. 2, pp. 175-198, November, 2011. Article (CrossRef Link) https://doi.org/10.1007/s11277-011-0372-x

피인용 문헌

  1. Securing Cooperative Spectrum Sensing against DC-SSDF Attack Using Trust Fluctuation Clustering Analysis in Cognitive Radio Networks vol.2019, pp.None, 2016, https://doi.org/10.1155/2019/3174304
  2. Sequential fusion to defend against sensing data falsification attack for cognitive Internet of Things vol.42, pp.6, 2016, https://doi.org/10.4218/etrij.2019-0388