Browse > Article
http://dx.doi.org/10.3837/tiis.2016.10.003

Coalition based Optimization of Resource Allocation with Malicious User Detection in Cognitive Radio Networks  

Huang, Xiaoge (School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications)
Chen, Liping (School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications)
Chen, Qianbin (School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications)
Shen, Bin (School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.10, 2016 , pp. 4661-4680 More about this Journal
Abstract
Cognitive radio (CR) technology is an effective solution to the spectrum scarcity issue. Collaborative spectrum sensing is known as a promising technique to improve the performance of spectrum sensing in cognitive radio networks (CRNs). However, collaborative spectrum sensing is vulnerable to spectrum data falsification (SSDF) attack, where malicious users (MUs) may send false sensing data to mislead other secondary users (SUs) to make an incorrect decision about primary user (PUs) activity, which is one of the key adversaries to the performance of CRNs. In this paper, we propose a coalition based malicious users detection (CMD) algorithm to detect the malicious user in CRNs. The proposed CMD algorithm can efficiently detect MUs base on the Geary'C theory and be modeled as a coalition formation game. Specifically, SSDF attack is one of the key issues to affect the resource allocation process. Focusing on the security issues, in this paper, we analyze the power allocation problem with MUs, and propose MUs detection based power allocation (MPA) algorithm. The MPA algorithm is divided into two steps: the MUs detection step and the optimal power allocation step. Firstly, in the MUs detection step, by the CMD algorithm we can obtain the MUs detection probability and the energy consumption of MUs detection. Secondly, in the optimal power allocation step, we use the Lagrange dual decomposition method to obtain the optimal transmission power of each SU and achieve the maximum utility of the whole CRN. Numerical simulation results show that the proposed CMD and MPA scheme can achieve a considerable performance improvement in MUs detection and power allocation.
Keywords
Cognitive radio network; malicious user detection; coalition formation game; power allocation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Vempaty, K. Agrawal, H. Chen and P. Varshney, “Adaptive learning of Byzantines’ behavior in cooperative spectrum sensing,” in Proc. of 2011 IEEE Wireless Communications and Networking Conference, pp.1310-1315, March 28-31, 2011. Article (CrossRef Link)
2 Kun Zeng, Przemyslaw Pawelczak, and Danijela Cabric, “Reputation-based cooperative spectrum sensing with trusted nodes assistance,” IEEE Communications Letters, vol. 14, no. 3, pp. 226-228, March, 2010. Article (CrossRef Link)   DOI
3 G. Ding, Q. Wu, Y. Yao, J. Wang and Y. Chen, “Kernel-based learning for statistical signal processing in cognitive radio networks: Theoretical foundations, example applications, and future directions,” IEEE Signal Processing Magazine, vol. 30, no. 4, pp. 126–136, July, 2013. Article (CrossRef Link)   DOI
4 M. Jo, L. Han and D. Kim, “Selfish attacks and detection in cognitive radio ad-hoc networks,” IEEE Network, vol. 27, no. 3, pp. 46-50, May, 2013. Article (CrossRef Link)   DOI
5 A. Min, K. Shin and X. Hu, “Secure cooperative sensing in IEEE 802.22 WRANS using shadow fading correlation,” IEEE Transactions on Mobile Computing, vol. 10, no. 10, pp. 1434-1447, October, 2011. Article (CrossRef Link)   DOI
6 P. Kaligineedi, M. Khabbazian and V. Bhargava, “Malicious user detection in a cognitive radio cooperative sensing system,” IEEE Transactions on Wireless Communications, vol. 9, no. 8, pp. 2488-2497, August, 2010. Article (CrossRef Link)   DOI
7 Changlong Chen, Min Song, ChunSheng Xin and Mansoor Alam, “A robust malicious user detection scheme in cooperative spectrum sensing,” in Proc. of 2012 IEEE Global Communications Conference, pp. 4856-4861, December 3-7, 2012. Article (CrossRef Link)
8 P. D. Mankar, G. Das and S.S. Pathak, “A centralized method for optimal power allocation in cognitive radio networks,” in Proc. of 2013 IEEE Globecom Workshop, pp. 385-390, December 9-13, 2013. Article (CrossRef Link)
9 F. Ahmed, O. Tirkkonen, AA. Dowhuszko and M. Juntti, “Distributed power allocation in cognitive radio networks under network power constraint,” in Proc. of 2014 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications, pp. 492-497, June 2-4, 2014. Article (CrossRef Link)
10 Xiaoge Huang, Baltasar Beferull-Lozano and Carmen Botella, “Quasi-Nash Equilibria for Non-Convex Distributed Power Allocation Games in Cognitive Radios,” IEEE Transactions on Wireless Communications. vol. 12, no. 7, pp. 3326-3337, July, 2013. Article (CrossRef Link)   DOI
11 Xiaoge Huang, Fan Zhu, Yongxu Zou and Qianbin Chen, “Dynamic Base Station Assignment and Resource Allocation in MIMO CR Small-cell Networks,” in Proc. Of 2014 14th International Symposium on Conmunications and Information Technologies, pp. 61-65, September 24-26, 2014. Article (CrossRef Link)
12 L. Anselin, “Local indicators of spatial association—LISA,” GEOGRAPHICAL ANALYSIS, vol. 27, no. 2, pp. 93-115, April 1995. Article (CrossRef Link)   DOI
13 Y.-C. Liang, Y. Zeng, E. C. Y. Peh and A. T. Hoang, “Sensing throughput tradeoff for cognitive radio networks,” IEEE Transactions on Wireless Communications. vol. 7, no. 4, pp. 1326-1337, April, 2008. Article (CrossRef Link)   DOI
14 Q. Yan, M. Li, T. Jiang, W. Lou, and Y. Hou, “Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks,” in Proc. of 2012 31st IEEE International Conference on Computer Communications, pp. 900-908, March 25-30, 2012. Article (CrossRef Link)
15 Xiaoge Huang and Baltasar Beferull-Lozano, “Non-cooperative power allocation game with imperfect sensing information for cognitive radio,” in Proc. of 2012 IEEE International Conference on Communications, pp. 1666-1671, June 10-15, 2012. Article (CrossRef Link)
16 C. S. Hyder, B. Grebur, LiXiao, M. Ellison, “ARC: Adaptive Reputation based Clustering Against Spectrum Sensing Data Falsification Attacks,” IEEE Transactions on Mobile Computing, vol. 13, no.8, pp.1707-1719, August, 2014. Article (CrossRef Link)   DOI
17 E. Björnson, L. Sanguinetti, J. Hoydis, and M. Debbah, “Optimal design of energy-efficient multi-user MIMO systems: Is massive MIMO the answer?” IEEE Transactions on Wireless Communications, vol. 14, no. 6, pp. 3059-3075, June, 2015. Article (CrossRef Link)   DOI
18 W. Saad, Z. Han, M. Debbah, A. Hjorungnes and T. Basar, “Coalitional game theory for communication networks,” IEEE Signal Processing Magazine, vol. 26, no. 5, pp. 77–97, September, 2009. Article (CrossRef Link)   DOI
19 W. Saad, Z. Han, M. Debbah and A. Hjorungnes, “Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks,” in Proc. of 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, pp. 2114-2122, April 19-25, 2009. Article (CrossRef Link)
20 K. Apt and A. Witzel, “A generic approach to coalition formation,” International Game Theory Review, vol. 11, no. 3, pp. 347-367, September, 2009. Article (CrossRef Link)   DOI
21 S. Singh, P. Teal, P. Dmochowski and A. Coulson, “Interference management in cognitive radio systems —A convex optimization approach,” in Proc. of 2012 IEEE International Conference on Communications, pp. 1884-1889, June 10-15, 2012. Article (CrossRef Link)
22 L. Zhang, G. Ding, Q. Wu, Y. Zou, Z. Han and J. Wang, “Byzantine Attack and Defense in Cognitive Radio Networks: A Survey,” IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1342-1363, August, 2015. Article (CrossRef Link)   DOI
23 Xu Yongjun and Zhao Xiaohui, “Optimal power allocation for multiuser underlay cognitive radio networks under QoS and interference temperature constraints,” China Communications, vol. 10, no. 10, pp. 91-100, October, 2013. Article (CrossRef Link)   DOI
24 J. Mitola and G. Q. Maguire, “Cognitive radio: Making software radios more personal,” IEEE Personal Communications, vol. 6, no.4, pp. 13-18, August 1999. Article (CrossRef Link)   DOI
25 Xiaoge Huang, Liping Chen, Qianbin Chen and Bin Shen, “Coalition formation based malicious user detection scheme in cognitive radio networks,” in Proc. of 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, pp.1415-1419, August 30-September 2, 2015. Article (CrossRef Link)
26 A. G. Fragkiadakis, E. Z. Tragos and I. G. Askoxylakis, “A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks,” IEEE Communications Surveys and Tutorials, vol. 15, no.1, pp. 428-445, February, 2013. Article (CrossRef Link)   DOI
27 H. Redwan, A. Suwon and K. Kim, “Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks,” in Proc. of 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, pp. 3-9, December 27-28, 2008. Article (CrossRef Link)
28 R. Chen, J. M. Park and J. H. Reed, “Defense against primary user emulation attacks in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 25-37, January, 2008. Article (CrossRef Link)   DOI