Browse > Article
http://dx.doi.org/10.3837/tiis.2022.11.015

Secure and Efficient Cooperative Spectrum Sensing Against Byzantine Attack for Interweave Cognitive Radio System  

Wu, Jun (School of Communication Engineering, Hangzhou Dianzi University)
Chen, Ze (School of Communication Engineering, Hangzhou Dianzi University)
Bao, Jianrong (School of Communication Engineering, Hangzhou Dianzi University)
Gan, Jipeng (School of Communication Engineering, Hangzhou Dianzi University)
Chen, Zehao (School of Communication Engineering, Hangzhou Dianzi University)
Zhang, Jia (School of Communication Engineering, Hangzhou Dianzi University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.16, no.11, 2022 , pp. 3738-3760 More about this Journal
Abstract
Due to increasing spectrum demand for new wireless devices applications, cooperative spectrum sensing (CSS) paradigm is the most promising solution to alleviate the spectrum shortage problem. However, in the interweave cognitive radio (CR) system, the inherent nature of CSS opens a hole to Byzantine attack, thereby resulting in a significant drop of the CSS security and efficiency. In view of this, a weighted differential sequential single symbol (WD3S) algorithm based on MATLAB platform is developed to accurately identify malicious users (MUs) and benefit useful sensing information from their malicious reports in this paper. In order to achieve this, a dynamic Byzantine attack model is proposed to describe malicious behaviors for MUs in an interweave CR system. On the basis of this, a method of data transmission consistency verification is formulated to evaluate the global decision's correctness and update the trust value (TrV) of secondary users (SUs), thereby accurately identifying MUs. Then, we innovatively reuse malicious sensing information from MUs by the weight allocation scheme. In addition, considering a high spectrum usage of primary network, a sequential and differential reporting way based on a single symbol is also proposed in the process of the sensing information submission. Finally, under various Byzantine attack types, we provide in-depth simulations to demonstrate the efficiency and security of the proposed WD3S.
Keywords
Byzantine attack; cooperative spectrum sensing; security and efficiency; trust value; sequential and differential;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. Zhang, X. Wang, Y. Liang and J. Liu, "Fast and robust spectrum sensing via Kolmogorov-smirnov test," IEEE Transactions on Communications, vol. 58, no. 12, pp. 3410-3416, December 2010.   DOI
2 S. Mapunya and M. Velempini, "The design of Byzantine attack mitigation scheme in cognitive radio Ad-hoc networks," in Proc. of International Conference on Intelligent and Innovative Computing Applications, pp. 1-4, 2018.
3 L. Zhang, G. Nie, G. Ding, Q. Wu, Z. Zhang and Z. Han, "Byzantine attacker identification in collaborative spectrum sensing: A robust defense framework," IEEE Transactions on Mobile Computing, vol. 18, no. 9, pp. 1992-2004, Sept. 2019.   DOI
4 J. Wang and I. Chen, "Trust-based data fusion mechanism design in cognitive radio networks," in Proc. of IEEE Conference on Communications and Network Security, pp. 53-59, 2014.
5 J. Wang, Y. Liu, S. Niu and H. Song, "Lightweight blockchain assisted secure routing of swarm UAS networking," Computer Communications, vol. 165, pp. 131-140, 2021.   DOI
6 H.A. Ghazijahani, A.A. Sharifi, J.M. Niya and H. Seyedarabi, "Attack-aware cooperative spectrum sensing in cognitive radio networks under byzantine attack," Journal of Communication Engineering, vol. 6, pp. 81-98, 2017.
7 J. Wu, T. Song, C. Wang and J. Hu, "Reputation value ranking based sequential cooperative spectrum sensing against Byzantine attack," in Proc. of IEEE International Conference on Communications Workshops, pp. 1-6, 2018.
8 A. Sivakumaran, A. S. Alfa and B. T. Maharaj, "An empirical analysis of the effect of malicious users in decentralised cognitive radio networks," in Proc. of IEEE 89th Vehicular Technology Conference, pp. 1-5, 2019.
9 Q. Li and Z. Li, "A novel sequential spectrum sensing method in cognitive radio using suprathreshold stochastic resonance," IEEE Transactions on Vehicular Technology, vol. 63, no. 4, pp. 1717-1725, May 2014.   DOI
10 R. Chen, J. M. J. Park, K. Bian, "Robustness against Byzantine failures in distributed spectrum sensing," Computer Communication, vol. 35, no. 17, pp. 2115-2124, 2012.   DOI
11 H. Chen, M. Zhou, L. Xie and J. Li, "Cooperative spectrum sensing with M-Ary quantized data in cognitive radio networks under SSDF attacks," IEEE Transactions on Wireless Communications, vol. 16, no. 8, pp. 5244-5257, Aug. 2017.   DOI
12 H. Hsieh, H. Chang and M. Ku, "Higher-order statistics based sequential spectrum sensing for cognitive radio," in Proc. of 11th International Conference on ITS Telecommunications, pp. 696-701, 2011.
13 R. Chen, J. M. Park and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks," in Proc. of IEEE INFOCOM 27th Conference on Computer Communications, pp. 1876-1884, 2008.
14 J. Wu, Y. Yu, and J. Hu, "Sequential 0/1 for cooperative spectrum sensing in the presence of strategic Byzantine attack," IEEE Wireless Communications Letters, vol. 8, no. 2, pp. 500-503, Apr. 2019.   DOI
15 K. Haghighi, A. Svensson and E. Agrell, "Wideband sequential spectrum sensing with varying thresholds," IEEE Global Telecommunications Conference GLOBECOM, pp. 1-5, 2010.
16 Y. Yilmaz, G. V. Moustakides and X. Wang, "Cooperative sequential spectrum sensing based on level-triggered sampling," IEEE Transactions on Signal Processing, vol. 60, no. 9, pp. 4509-4524, Sept. 2012.   DOI
17 W. Lee, M. Kim and D. Cho, "Deep cooperative sensing: cooperative spectrum sensing based on convolutional neural networks," IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 3005-3009, Mar. 2019.   DOI
18 A. Taggu and N. Marchang, "Random-Byzantine attack mitigation in cognitive radio networks using a multi-hidden markov model system," in Proc. of International Conference on Electrical and Computing Technologies and Applications, pp. 1-5, 2019.
19 R. Sarmah, A. Taggu and N. Marchang, "Detecting Byzantine attack in cognitive radio networks using machine learning," Wireless Networks, vol. 26, no. 8, pp. 5939-5950, 2020.   DOI
20 M. Liu, N. Zhao, J. Li and V. C. M. Leung, "Spectrum sensing based on maximum generalized correntropy under symmetric alpha stable noise," IEEE Transactions on Vehicular Technology, vol. 68, no. 10, pp. 10262-10266, Oct. 2019.   DOI
21 X. Wang, M. Jia, Q. Guo and X. Gu, "A trust-value based cooperative spectrum sensing algorithm for mobile secondary users," in Proc. of IEEE International Conference on Communication Workshop, pp. 1635-1639, 2015.
22 Q. Wang, Y. Guo, X. Wang, T. Ji, L. Yu and P. Li, "AI at the edge: Blockchain-empowered secure multiparty learning with heterogeneous models," IEEE Internet of Things Journal, vol. 7, no. 10, pp. 9600-9610, Oct. 2020.   DOI
23 P. Zhang, S. G. Nagarajan and I. Nevat, "Secure location of things (SLOT): mitigating localization spoofing attacks in the Internet of Things," IEEE Internet of Things Journal, vol. 4, no. 6, pp. 2199-2206, Dec. 2017.   DOI
24 K. Zeng, P. Pawelczak and D. Cabric, "Reputation-based cooperative spectrum sensing with trusted nodes assistance," IEEE Communications Letters, vol. 14, no. 3, pp. 226-228, Mar. 2010.   DOI
25 J. Wu, T. Song, Y. Yue, W. Cong, J. Hu, "Sequential cooperative spectrum sensing in the presence of dynamic Byzantine attack for mobile networks," PLoS ONE, vol. 13, no. 7, p. e0199546, 2018.   DOI
26 J. Wang, Y. Liu, S. Niu, H. Song, W. Jing and J. Yuan, "Blockchain enabled verification for cellular-connected unmanned aircraft system networking," Future Generation Computer Systems, vol. 123, pp. 233-244, 2021.   DOI
27 Y. Liang, Y. Zeng, E. C. Y. Peh and A. T. Hoang, "Sensing-throughput tradeoff for cognitive radio networks," IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1326-1337, April 2008.   DOI
28 L. Zhang, G. Ding, Q. Wu, Y. Zou, Z. Han and J. Wang, "Byzantine attack and defense in cognitive radio networks: A survey," IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1342-1363, thirdquarter 2015.   DOI
29 P. K. Varshney, "Distributed detection and data fusion," Springer Science & Business Media, 2012.
30 Y. Liu, J. Wang, J. Li, S. Niu, L. Wu and H. Song, "Zero-bias deep-learning-enabled quickest abnormal event detection in IoT," IEEE Internet of Things Journal, vol. 9, no. 13, pp. 11385-11395, 2022.   DOI
31 J. Wu, P. Li, Z. Chen, C. Ze and J. Bao, "Sequential single symbol differential voting for cooperative spectrum sensing in the presence of byzantine attack and imperfect reporting channels," in Proc. of 8th international Conference on wireless communication and sensor networks, pp. 39-46, January 2021.
32 A. Al-Tahmeesschi, M. Lopez-Benitez, V. Selis, D. K. Patel and K. Umebayashi, "Cooperative estimation of primary traffic under imperfect spectrum sensing and Byzantine attacks," IEEE Access, vol. 6, pp. 61651-61664, 2018.   DOI
33 Y. Shei and Y. T. Su, "A sequential test based cooperative spectrum sensing scheme for cognitive radios," in Proc. of IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1-5, 2008.
34 Y. Al-Mathehaji, S. Boussakta, M. Johnston and J. Hussein, "Primary receiver-aware opportunistic broadcasting in cognitive radio ad hoc networks," in Proc. of 8th International Conference on Ubiquitous and Future Networks, pp. 30-35, 2016.
35 N. Marchang, A. Taggu and A. K. Patra, "Detecting Byzantine attack in cognitive radio networks by exploiting frequency and ordering properties," IEEE Transactions on Cognitive Communications and Networking, vol. 4, no. 4, pp. 816-824, Dec. 2018.   DOI
36 W. Saad, Z. Han, H. V. Poor, T. Basar and J. B. Song, "A cooperative Bayesian nonparametric framework for primary user activity monitoring in cognitive radio networks," IEEE Journal on Selected Areas in Communications, vol. 30, no. 9, pp. 1815-1822, Oct. 2012.   DOI