Performance of p-Norm Detector in Cognitive Radio Networks with Cooperative Spectrum Sensing in Presence of Malicious Users

A cognitive radio network (CRN) with a cooperative spectrum sensing scheme is considered. This CRN has a primary user and multiple secondary users, some of which are malicious secondary users (MSUs). Energy detection at each SU is performed using a -norm detector with , where corresponds to the standard energy detector. The MSUs are capable of perpetrating spectrum sensing data falsification (SSDF) attacks. At the fusion center (FC), an algorithm is used to suppress these MSUs which could be either an adaptive weighing algorithm or one of the following: Tietjen-Moore (TM) test or Peirce’s criterion. This is followed by computation of a test statistic (TS) which is a random variable. In this paper, we assume TS to have either a Gamma or a Gaussian distribution and calculate the threshold accordingly. We provide closed-form expressions of probability of false alarm and probability of miss-detection under both assumptions. We show that Gaussian assumption of TS is more suited in presence of an SSDF attack when compared with the Gamma assumption. We also compare the detection performance for various values of and show that along with the Gaussian assumption is the best amongst all the cases considered.

[1]  Adrish Banerjee,et al.  Block Outlier Methods for Malicious User Detection in Cooperative Spectrum Sensing , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).

[2]  Peter C. Mason,et al.  Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[3]  Shuguang Cui,et al.  Optimal Linear Cooperation for Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE Journal of Selected Topics in Signal Processing.

[4]  Majid Khabbazian,et al.  Malicious User Detection in a Cognitive Radio Cooperative Sensing System , 2010, IEEE Transactions on Wireless Communications.

[5]  Hai Jiang,et al.  Performance of $p$-Norm Detector in AWGN, Fading, and Diversity Reception , 2014, IEEE Transactions on Vehicular Technology.

[6]  P. Moschopoulos,et al.  The distribution of the sum of independent gamma random variables , 1985 .

[7]  Khaled Ben Letaief,et al.  Cooperative Communications for Cognitive Radio Networks , 2009, Proceedings of the IEEE.

[8]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[9]  R. H. Moore,et al.  Some Grubbs-Type Statistics for the Detection of Several Outliers , 1972 .

[10]  S. S. Kalamkar,et al.  Malicious user suppression for cooperative spectrum sensing in cognitive radio networks using Dixon's outlier detection method , 2012, 2012 National Conference on Communications (NCC).

[11]  Simon Haykin,et al.  Spectrum Sensing for Cognitive Radio , 2009, Proceedings of the IEEE.

[12]  Yunfei Chen,et al.  Improved energy detector for random signals in gaussian noise , 2010, IEEE Transactions on Wireless Communications.

[13]  Zhongding Lei,et al.  IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.

[14]  Ranjan K. Mallik,et al.  Cooperative Spectrum Sensing in Multiple Antenna Based Cognitive Radio Network Using an Improved Energy Detector , 2012, IEEE Communications Letters.

[15]  D. Owen Handbook of Mathematical Functions with Formulas , 1965 .

[16]  Yuping Zhao,et al.  A New Cooperative Detection Technique with Malicious User Suppression , 2009, 2009 IEEE International Conference on Communications.

[17]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..