A soft cooperative spectrum sensing in the presence of most destructive smart PUEA using energy detector

Recently, the growth of Internet of Things (IoT) and its remarkable impacts on human well‐being life style are deniable. On the connectivity side, IoT is highly related to Wireless Sensor Network (WSN) concept. The key elements include the data, which is machine‐produced, specifically by sensors, and the data communication through connectivity technologies. On the security side, primary user emulation attack (PUE) is one of the well‐defined attacks in cognitive radio (CR)–based WSN. Here, we investigate a smart primary user emulation attacker that has the most destructive effect on the spectrum sensing unit of cognitive radio users. To deal with this attack, a soft cooperative spectrum sensing using an energy detector is proposed. In the proposed method, the values of sensing information of each secondary user are sent to a fusion center. Once the values are received, they will be combined with some appropriate coefficients in order to minimize spectrum sensing probability of error for a given probability of false alarm. The coefficients are the variables of a constrained optimization problem. Based on simulation results, our method has a lower error probability in spectrum sensing in comparison to hard combination schemes (eg, OR rule) and soft combination schemes (eg, CSINR method).

[1]  Alentattil Rajesh,et al.  Sliding window Dixon's tests for malicious users' suppression in a cooperative spectrum sensing system , 2014, IET Commun..

[2]  Li Xu,et al.  Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks , 2017, Appl. Math. Comput..

[3]  Mohsen Guizani,et al.  Securing cognitive radio networks against primary user emulation attacks , 2015, IEEE Network.

[4]  Yu-Dong Yao,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack , 2011, IEEE Transactions on Wireless Communications.

[5]  Salvatore Cuomo,et al.  Analysis of a data-flow in a financial IoT system , 2017, EUSPN/ICTH.

[6]  Larry J. Greenstein,et al.  ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks , 2009, IEEE INFOCOM 2009.

[7]  Beibei Li,et al.  DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System , 2016, IEEE Transactions on Information Forensics and Security.

[8]  Beibei Li,et al.  Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..

[9]  Geoffrey Ye Li,et al.  Cooperative Spectrum Sensing in Cognitive Radio, Part II: Multiuser Networks , 2007, IEEE Transactions on Wireless Communications.

[10]  Hanna Bogucka,et al.  Energy-Efficient Cooperative Spectrum Sensing: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[11]  Qun Li,et al.  Defending Against Cooperative Attacks in Cooperative Spectrum Sensing , 2013, IEEE Transactions on Wireless Communications.

[12]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[13]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[14]  Maryam Haghighat,et al.  Smart primary user emulation in cognitive radio networks: defence strategies against radio‐aware attacks and robust spectrum sensing , 2015, Trans. Emerg. Telecommun. Technol..

[15]  Xi Zhang,et al.  Information-centric network function virtualization over 5g mobile wireless networks , 2015, IEEE Network.

[16]  Luca Mainetti,et al.  Evolution of wireless sensor networks towards the Internet of Things: A survey , 2011, SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks.

[17]  Bahman Abolhassani,et al.  Soft Cooperative Spectrum Sensing using Quantization Method in the Presence of Smart PUE Attack , 2017, Mob. Networks Appl..

[18]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[19]  S. Yadav,et al.  RSS based detection and expulsion of malicious users from cooperative sensing in Cognitive Radios , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[20]  Seyed Mohammad Sajad Sadough,et al.  Cooperative spectrum sensing for cognitive radio networks in the presence of smart malicious users , 2014 .

[21]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[22]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[23]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[24]  Geoffrey Ye Li,et al.  Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[25]  Robert H. Halstead,et al.  Matrix Computations , 2011, Encyclopedia of Parallel Computing.

[26]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[27]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[28]  J. I. Mararm,et al.  Energy Detection of Unknown Deterministic Signals , 2022 .

[29]  John Garrity,et al.  Harnessing the Internet of Things for Global Development , 2015 .

[30]  Martin Reisslein,et al.  Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols , 2016, IEEE Communications Surveys & Tutorials.

[31]  Weidong Xiang,et al.  Detecting multi-channel wireless microphone user emulation attacks in white space with noise , 2013, 8th International Conference on Cognitive Radio Oriented Wireless Networks.

[32]  Chunsheng Xin,et al.  Detection of PUE Attacks in Cognitive Radio Networks Based on Signal Activity Pattern , 2014, IEEE Transactions on Mobile Computing.

[33]  Tongtong Li,et al.  Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.

[34]  Cheng-Xiang Wang,et al.  Wideband spectrum sensing for cognitive radio networks: a survey , 2013, IEEE Wireless Communications.

[35]  Geoffrey Ye Li,et al.  Cooperative Spectrum Sensing in Cognitive Radio, Part I: Two User Networks , 2007, IEEE Transactions on Wireless Communications.

[36]  Li Xu,et al.  An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks , 2017, Comput. Commun..

[37]  Mustafa Kocakulak,et al.  An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[38]  Salvatore Cuomo,et al.  A computational method for the European option price in an Internet of Things framework , 2020, Future Gener. Comput. Syst..

[39]  A. Ghasemi,et al.  Collaborative spectrum sensing for opportunistic access in fading environments , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[40]  Evangelos N. Gazis,et al.  A survey of technologies for the internet of things , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[41]  Salvatore Cuomo,et al.  An application of the one-factor HullWhite model in an IoT financial scenario , 2018 .

[42]  Mohamed-Slim Alouini,et al.  On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.