Trust based fusion over noisy channels through anomaly detection in cognitive radio networks

Byzantine attacks have been identified as one of the key vulnerabilities in cognitive radio networks, where malicious nodes advertise false spectrum occupancy data in a cooperative environment. In such cases, the resultant fused data is very different from the actual scenario. Thus, there is a need to identify the malicious nodes or at least find the trustworthiness of nodes such that the data sent by malicious nodes could be filtered out. The process is complicated by presence of noise in the channel which makes it harder to distinguish anomalies caused by malicious activity and those caused due to unreliable noisy channels. This paper proposes a scheme for trust based fusion by monitoring anomalies in spectrum usage reports advertised over unreliable channels by secondary nodes which leads to evaluation of trust of a node by its neighbors. The calculated trust is then used to determine if a neighboring node's advertised data could be used for fusion or not. We provide a heuristic trust threshold for nodes to disregard malicious nodes while fusing the data, which holds good for any probability of attack. A trust coefficient is calculated based on interactions with peers in a distributed manner. Results show that even at higher probabilities of attack (0.8 and above), 95% of the nodes generate fused data with accuracy as high as 84%. We compare our results of trust based fusion with blind fusion scheme and observe improvement in accuracy of fusion from individual nodes' as well as overall network's perspective. We also analyze an alternative weighted trust fusion technique and evaluate its performance. We find that at lower probabilities of attack a malicious node's contribution to the overall gain in cooperation is more than the damage done. We observe that above a critical value for probability of attack of 0.40, the overall gain in cooperation is compromised if the malicious nodes are considered in fusion. We also discover that an honest node's benefit due to cooperation depends on its relative position with respect to the spatial orientation of malicious nodes.

[1]  Venugopal V. Veeravalli,et al.  Cooperative Sensing for Primary Detection in Cognitive Radio , 2008, IEEE Journal of Selected Topics in Signal Processing.

[2]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[3]  Ying-Chang Liang,et al.  A retransmission-based scheme for video streaming over wireless channels , 2010, CMC 2010.

[4]  Song Han,et al.  Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[5]  Geoffrey Ye Li,et al.  Cooperative Spectrum Sensing in Cognitive Radio, Part II: Multiuser Networks , 2007, IEEE Transactions on Wireless Communications.

[6]  Sae-Young Chung,et al.  Cognitive networks achieve throughput scaling of a homogeneous network , 2009, WiOpt.

[7]  Zhu Han,et al.  Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[8]  Friedrich Jondral,et al.  Calculation of detection and false alarm probabilities in spectrum pooling systems , 2005, IEEE Communications Letters.

[9]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[10]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[11]  Ying-Chang Liang,et al.  Trusted cognitive radio networking , 2010, Wirel. Commun. Mob. Comput..

[12]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[13]  A. Ghasemi,et al.  Collaborative spectrum sensing for opportunistic access in fading environments , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[14]  Zhiqiang Li,et al.  Distributed Spectrum Sensing in Cognitive Radio Networks , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[15]  S. Marano,et al.  Distributed Detection in the Presence of Byzantine Attack in Large Wireless Sensor Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.