An optimal reputation-based detection against SSDF attacks in industrial cognitive radio network

With the increasing development of industrial wireless technologies and standards, the scarce spectrum in the industrial, scientific, and medical (ISM) band has been extremely overcrowded, which can be mitigated by harvesting more spectrum in licensed bands with the emerging cognitive radio technology. In industrial cognitive radio networks (ICRNs), security is one of the most important problems. Spectrum sensing data falsification (SSDF) attacks is one of major challenges for cooperative spectrum sensing (CSS) in ICRNs. Malicious users send fake decisions to mislead the fusion center for exploiting the spectrum source. And smart malicious users launch attacks with small probability which is difficult to be detected by existing detection scheme. To address this issue, we propose an optimal reputation-based detection scheme with considerations of the attack probability. Moreover, the threshold of reputation value is specially designed to adapt to the varying attack probability which can be estimated by past performance. To estimate the attack probability, we use the maximum likelihood estimation method in certain CSS rounds. Numerical results reveal that the proposed detection scheme performs better than existing reputation-based detection schemes.

[1]  Gerhard P. Hancke,et al.  Using Cognitive Radio for Interference-Resistant Industrial Wireless Sensor Networks: An Overview , 2015, IEEE Transactions on Industrial Informatics.

[2]  Bin Shen,et al.  An Optimal Soft Fusion Scheme for Cooperative Spectrum Sensing in Cognitive Radio Network , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[3]  Reihaneh Safavi-Naini,et al.  ReDiSen: Reputation-based secure cooperative sensing in distributed cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[4]  Lin Yang,et al.  Research on the improvement of Apriori algorithm and its application in intrusion detection system , 2015, 2015 IEEE International Conference on Computer and Communications (ICCC).

[5]  Li Xiao,et al.  ARC: Adaptive Reputation based Clustering Against Spectrum Sensing Data Falsification Attacks , 2014, IEEE Transactions on Mobile Computing.

[6]  Xin-Ping Guan,et al.  Cognitive Radio Enabled Transmission for State Estimation in Industrial Cyber-Physical Systems , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[7]  Zhu Han,et al.  Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[8]  Kamran Arshad,et al.  Robust collaborative spectrum sensing in the presence of deleterious users , 2013, IET Commun..

[9]  Yuping Zhao,et al.  A New Cooperative Detection Technique with Malicious User Suppression , 2009, 2009 IEEE International Conference on Communications.

[10]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[11]  Geoffrey Ye Li,et al.  Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[12]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[13]  Zheng Wang,et al.  Distributed Consensus-Based Weight Design for Cooperative Spectrum Sensing , 2015, IEEE Transactions on Parallel and Distributed Systems.