An Effective and Optimal Fusion Rule in the Presence of Probabilistic Spectrum Sensing Data Falsification Attack

Cognitive radio (CR) network is an excellent solution to the spectrum scarcity problem. Cooperative spectrum sensing (CSS) has been widely used to precisely detect of primary user (PU) signals. The trustworthiness of the CSS is vulnerable to spectrum sensing data falsification (SSDF) attack. In an SSDF attack, some malicious users intentionally report wrong sensing results to cheat the fusion center (FC) and disturb the FC’s global decision on the PU activity. In this paper, we introduce an effective data fusion rule called attack-aware optimal voting rule (AOVR) to confront the SSDF attack in the CSS procedure. In the beginning stages of the cooperative sensing, two important SSDF attack parameters are estimated and then applied in a conventional voting rule to acquire an optimal number of CR users to minimize the global error probability. Two estimated attack parameters include the probabilities of attack in both occupied and empty frequency bands. Simulation results confirm that the proposed attack-aware approach achieves very good performance over the existing conventional cooperative sensing methods.

[1]  Zhu Han,et al.  Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[2]  Abbas Ali Sharifi,et al.  Defense Against SSDF Attack in Cognitive Radio Networks: Attack-Aware Collaborative Spectrum Sensing Approach , 2016, IEEE Communications Letters.

[3]  Geoffrey Ye Li,et al.  Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[4]  Abbas Ali Sharifi,et al.  Securing Collaborative Spectrum Sensing Against Malicious Attackers in Cognitive Radio Networks , 2016, Wirel. Pers. Commun..

[5]  Kaigui Bian,et al.  Robustness against Byzantine Failures in Distributed Spectrum Sensing , 2012, Comput. Commun..

[6]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[7]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[8]  Mohamed-Slim Alouini,et al.  On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.

[9]  Javad Musevi Niya,et al.  Reputation-based Likelihood Ratio Test with anchor nodes assistance , 2016, 2016 8th International Symposium on Telecommunications (IST).

[10]  Chunsheng Xin,et al.  CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks , 2014, Wirel. Networks.

[11]  Han-Chieh Chao,et al.  Secure centralized spectrum sensing for cognitive radio networks , 2012, Wirel. Networks.

[12]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[13]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[14]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[15]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[16]  Anant Sahai,et al.  Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.

[17]  A. A Sharifi,et al.  Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation , 2018 .

[18]  Ian F. Akyildiz,et al.  Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..

[19]  J. Christopher Clement,et al.  Jettison the Defectives: A Robust Cooperative Spectrum Sensing Scheme in a Cognitive Radio Network , 2018, Circuits Syst. Signal Process..

[20]  Pramod K. Varshney,et al.  Distributed Detection and Data Fusion , 1996 .