Secure distributed spectrum sensing in cognitive radio networks using multi-armed bandits

A solution to security of distributed spectrum sensing in cognitive radio networks is provided. Malicious nodes report the channel as busy, when they detect it to be idle, to be able to exclusively use it. However, when they detect the channel as busy, they do not have incentives to misreport and send actual result to the fusion center making it nontrivial to combat spectrum sensing data falsification attack. To neutralize the effect of misreporting sensed spectrum state, this problem is modeled as a binomial multi-armed bandit process using randomized probability matching and Bayesian methods. In each round the fusion center selects subset of most rewarding nodes to use their reports in the fusion rule, while trying to identify and single out misreporting nodes. Results show this technique sifts malicious reports from truthful ones with false alarm or misdetection with high confidence by removing uncertainties in derived patterns of reports.

[1]  Peng Ning,et al.  Anti-jamming communication in cognitive radio networks with unknown channel statistics , 2011, 2011 19th IEEE International Conference on Network Protocols.

[2]  Victor C. M. Leung,et al.  Denial of Service Attacks in Cognitive Radio Networks through Channel Eviction Triggering , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[3]  Steven L. Scott,et al.  A modern Bayesian look at the multi-armed bandit , 2010 .

[4]  Bhaskar Krishnamachari,et al.  Distributed learning under imperfect sensing in cognitive radio networks , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[5]  Jin Wei,et al.  Two-Tier Optimal-Cooperation Based Secure Distributed Spectrum Sensing for Wireless Cognitive Radio Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[6]  Zhiqiang Li,et al.  Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks , 2012, IET Commun..

[7]  Kang G. Shin,et al.  Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation , 2011, IEEE Transactions on Mobile Computing.

[8]  Victor C. M. Leung,et al.  Combating channel eviction triggering denial-of-service attacks in cognitive radio networks , 2012, Trans. Emerg. Telecommun. Technol..

[9]  L. Tierney Markov Chains for Exploring Posterior Distributions , 1994 .

[10]  Danijela Cabric,et al.  Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.

[11]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[12]  Jun Cai,et al.  Secure cooperative multi-channel spectrum sensing in cognitive radio networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[13]  Abolfazl Falahati,et al.  SSDF protection in cooperative spectrum sensing employing a computational trust evaluation algorithm , 2010, 2010 5th International Symposium on Telecommunications.

[14]  Carl A. Gunter,et al.  Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[15]  Hai Jiang,et al.  Medium access in cognitive radio networks: A competitive multi-armed bandit framework , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[16]  Jun Gao,et al.  Attacker-exclusion scheme for cooperative spectrum sensing against SSDF attacks based on accumulated suspicious level , 2011, 2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems.