SSDF protection in cooperative spectrum sensing employing a computational trust evaluation algorithm

A serious threat to cognitive radio networks which sense the spectrum in a cooperative manner is the transmission of false spectrum sensing data by malicious secondary nodes. This enforces the system to acquire authentication. Actually, the decision maker needs to determine the reliability or trustworthiness of the shared data. In this paper, the evaluation process is considered as an estimation dilemma on a set of evidence which is obtained from distributed cooperating nodes. Then, a MLE-based computational trust evaluation algorithm is proposed to determine the trustworthiness of each cognitive radio (CR) user's data. The proposed procedure just uses the information which is obtained from the CR users without any presumptions about nodes reliability. Numerical results confirm the effectiveness of the algorithm in eliminating malicious nodes effects when 16% of cooperating nodes in the network are considered as malicious, and up to 20%, the algorithm are found to have a reasonable performance.

[1]  Amir Ghasemi,et al.  Asymptotic performance of collaborative spectrum sensing under correlated log-normal shadowing , 2007, IEEE Communications Letters.

[2]  I. Miller Probability, Random Variables, and Stochastic Processes , 1966 .

[3]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[4]  R.F. Mills,et al.  A comparison of various radiometer detection models , 1996, IEEE Transactions on Aerospace and Electronic Systems.

[5]  Zheng Zhou,et al.  Energy Detection Based Spectrum Sensing for Cognitive Radios in Noise of Uncertain Power , 2008, 2008 International Symposium on Communications and Information Technologies.

[6]  Athanasios Papoulis,et al.  Probability, Random Variables and Stochastic Processes , 1965 .

[7]  Kwang-Cheng Chen,et al.  Multiple Systems Sensing for Cognitive Radio Networks over Rayleigh Fading Channel , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[8]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[9]  H. Urkowitz Energy detection of unknown deterministic signals , 1967 .

[10]  Jack L. Burbank,et al.  Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[11]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[12]  Vijay Varadharajan,et al.  A Hybrid Trust Model for Enhancing Security in Distributed Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[13]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[14]  Ronald K. Pearson,et al.  Outliers in process modeling and identification , 2002, IEEE Trans. Control. Syst. Technol..

[15]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[16]  Haiming Wang,et al.  Double Thresholds Based Cooperative Spectrum Sensing Against Untrusted Secondary Users in Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[17]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .