Attack-tolerant distributed sensing for dynamic spectrum access networks

Accurate sensing of the spectrum condition is of crucial importance to the mitigation of the spectrum scarcity problem in dynamic spectrum access (DSA) networks. Specifically, distributed sensing has been recognized as a viable means to enhance the incumbent signal detection by exploiting the diversity of sensors. However, it is challenging to make such distributed sensing secure due mainly to the unique features of DSA networks—openness of a low-layer protocol stack in SDR devices and non-existence of communications between primary and secondary devices. To address this challenge, we propose attack-tolerant distributed sensing protocol (ADSP), under which sensors in close proximity are grouped into a cluster, and sensors in a cluster cooperatively safeguard distributed sensing. The heart of ADSP is a novel shadow fading correlation-based filter tailored to anomaly detection, by which the fusion center prefilters abnormal sensor reports via cross-validation. By realizing this correlation filter, ADSP minimizes the impact of an attack on the performance of distributed sensing, while incurring minimal processing and communications overheads. The efficacy of our scheme is validated on a realistic two-dimensional shadow-fading field, which accurately approximates real-world shadowing environments. Our extensive simulation-based evaluation shows that ADSP significantly reduces the impact of attacks on incumbent detection performance.

[1]  Gustavo Alonso,et al.  Understanding Radio Irregularity in Wireless Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[2]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[3]  Kang G. Shin,et al.  Exploiting Multi-Channel Diversity in Spectrum-Agile Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[4]  A. Sahai,et al.  Crime and Punishment for Cognitive Radios , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[5]  Kang G. Shin,et al.  Impact of mobility on spectrum sensing in cognitive radio networks , 2009, CoRoNet '09.

[6]  Janne Riihijärvi,et al.  Characterization and modelling of spectrum for dynamic spectrum access with spatial statistics and random fields , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[7]  Kang G. Shin,et al.  An Optimal Sensing Framework Based on Spatial RSS-profile in Cognitive Radio Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[8]  Anant Sahai,et al.  Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.

[9]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[10]  Wade Trappe,et al.  TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[11]  Haitao Wu,et al.  Sora: High Performance Software Radio Using General Purpose Multi-core Processors , 2009, NSDI.

[12]  A. Ghasemi,et al.  Collaborative spectrum sensing for opportunistic access in fading environments , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[13]  Preben E. Mogensen,et al.  Experimental analysis of the joint statistical properties of azimuth spread, delay spread, and shadow fading , 2002, IEEE J. Sel. Areas Commun..

[14]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[15]  Richard P. Martin,et al.  Attack Detection in Wireless Localization , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[16]  Sai Shankar Nandagopalan,et al.  IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios , 2006, J. Commun..

[17]  M. Gudmundson Correlation Model for Shadow Fading in Mobile Radio Systems , 1991 .

[18]  Mohamed-Slim Alouini,et al.  On the energy detection of unknown signals over fading channels , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[19]  Stephen J. Shellhammer,et al.  Performance of power detector sensors of DTV signals in IEEE 802.22 WRANs , 2006, TAPAS '06.

[20]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[21]  Yonghong Zeng,et al.  Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..

[22]  Marwan Krunz,et al.  Throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors , 2009, MobiCom '09.

[23]  Neal Patwari,et al.  2008 International Conference on Information Processing in Sensor Networks Effects of Correlated Shadowing: Connectivity, Localization, and RF Tomography , 2022 .

[24]  Larry J. Greenstein,et al.  ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks , 2009, IEEE INFOCOM 2009.

[25]  Masoumeh Nasiri-Kenari,et al.  Asymptotically optimum detection of primary user in cognitive radio networks , 2007, IET Commun..

[26]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[27]  Amir Ghasemi,et al.  Asymptotic performance of collaborative spectrum sensing under correlated log-normal shadowing , 2007, IEEE Communications Letters.

[28]  A. Field Communications , 1963, The Journal of Asian Studies.