Block Outlier Methods for Malicious User Detection in Cooperative Spectrum Sensing

Block outlier detection methods, based on Tietjen- Moore (TM) and Shapiro-Wilk (SW) tests, are proposed to detect and suppress spectrum sensing data falsification (SSDF) attacks by malicious users in cooperative spectrum sensing. First, we consider basic and statistical SSDF attacks, where the malicious users attack independently. Then we propose a new SSDF attack, which involves cooperation among malicious users by masking. In practice, the number of malicious users is unknown. Thus, it is necessary to estimate the number of malicious users, which is found using clustering and largest gap method. However, we show using Monte Carlo simulations that, these methods fail to estimate the exact number of malicious users when they cooperate. To overcome this, we propose a modified largest gap method.

[1]  Lara Dolecek,et al.  Detecting and Counteracting Statistical Attacks in Cooperative Spectrum Sensing , 2012, IEEE Transactions on Signal Processing.

[2]  Zhu Han,et al.  CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[3]  R. H. Moore,et al.  Some Grubbs-Type Statistics for the Detection of Several Outliers , 1972 .

[4]  S. S. Kalamkar,et al.  Malicious user suppression for cooperative spectrum sensing in cognitive radio networks using Dixon's outlier detection method , 2012, 2012 National Conference on Communications (NCC).

[5]  Peter C. Mason,et al.  Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[6]  Takeo Fujii,et al.  Outlier detection methods of low SNR nodes for cooperative spectrum sensing , 2010, 2010 7th International Symposium on Wireless Communication Systems.

[7]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[8]  W. R. Buckland,et al.  Outliers in Statistical Data , 1979 .

[9]  B. Kale,et al.  Masking effect on tests for outliers in normal samples , 1987 .

[10]  Yuping Zhao,et al.  A New Cooperative Detection Technique with Malicious User Suppression , 2009, 2009 IEEE International Conference on Communications.

[11]  S. Shapiro,et al.  An Analysis of Variance Test for Normality (Complete Samples) , 1965 .

[12]  Yonghong Zeng,et al.  Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Transactions on Wireless Communications.

[13]  J. I. Mararm,et al.  Energy Detection of Unknown Deterministic Signals , 2022 .

[14]  Kang G. Shin,et al.  Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.

[15]  Daesik Hong,et al.  Goodness-of-Fit-Based Malicious User Detection in Cooperative Spectrum Sensing , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).

[16]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[17]  Kamran Arshad,et al.  Robust collaborative spectrum sensing in the presence of deleterious users , 2013, IET Commun..

[18]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[19]  Majid Khabbazian,et al.  Malicious User Detection in a Cognitive Radio Cooperative Sensing System , 2010, IEEE Transactions on Wireless Communications.

[20]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[21]  Danijela Cabric,et al.  Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.

[22]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.