Cooperative sensing in cognitive networks under malicious attack

This paper considers cooperative sensing in cognitive networks under Spectrum Sensing Data Falsification attack (SSDF) in which malicious users can intentionally send false sensing information. One effective method to deal with the SSDF attack is the q-out-of-m scheme, where the sensing decision is based on q sensing reports out of m polled nodes. The major limitation with the q-out-of-m scheme is its high computational complexity due to exhaustive search. In this paper, we prove that for a fixed percentage of malicious users, the detection accuracy increases almost exponentially as the network size increases. Motivated by this observation, as well as the linear relationship between the scheme parameters and the network size, we propose a simple but accurate approach that significantly reduces the complexity of the q-out-of-m scheme. The proposed approach can easily be applied to the large scale networks, which can be much more reliable under malicious attacks.

[1]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[2]  Anant Sahai,et al.  Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.

[3]  Tongtong Li,et al.  On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[4]  R.W. Brodersen,et al.  Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[5]  Albert H. Nuttall,et al.  Some integrals involving the QM function (Corresp.) , 1975, IEEE Trans. Inf. Theory.

[6]  A. Ghasemi,et al.  Collaborative spectrum sensing for opportunistic access in fading environments , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[7]  Harald Niederreiter,et al.  Probability and computing: randomized algorithms and probabilistic analysis , 2006, Math. Comput..

[8]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[9]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[10]  Jin Wei,et al.  Two-Tier Optimal-Cooperation Based Secure Distributed Spectrum Sensing for Wireless Cognitive Radio Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.