Achieving secure spectrum sensing in presence of malicious attacks utilizing unsupervised machine learning

In this paper, we focus on the problem of how to realize secure sensing in a comprehensive hostile cognitive radio network where both PUEA and SSDF are present, while most existing research regarding secure sensing treats Primary User Emulation Attack (PUEA) and Spectrum Sensing Data Falsification (SSDF) separately. The problem arises from the coexistence of PUEA and SSDF that even if PUEA is successfully identified, its neighboring honest users would unintentionally send contaminated sensing reports, and thus leading to unsafe sensing performance. An ideal and straightforward solution is to directly exclude those attacked secondary users from the sensing cooperation process. However, this scheme requires perfect information such as the attacking strength, geographical locations of secondary users, etc. To alleviate this requirement, a secure sensing algorithm is proposed in this paper, which identifies attacked secondary users by incorporating the idea of unsupervised machine learning, without prior information on either the attack or secondary users. Further, to account for identification error and different reliabilities of SUs, an identity value is assigned and adaptively updated for each SU. Simulations show that the proposed algorithm has better performance than conventional secure sensing algorithm in presence of both PUEA and SSDF, and remains robust even in a highly stressed environment where a significant portion of the network is attacked. It is also demonstrated that, when the sensing SNR increases, the performance of the proposed algorithm asymptotically approaches the ideal solution where the attacked users are perfectly removed.

[1]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[2]  Fabrizio Granelli,et al.  A Punishment Policy for Spectrum Sensing Data Falsification Attackers in Cognitive Radio Networks , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).

[3]  Zhu Han,et al.  Mitigating malicious attacks using Bayesian nonparametric clustering in collaborative cognitive radio networks , 2014, 2014 IEEE Global Communications Conference.

[4]  Kang G. Shin,et al.  Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.

[5]  Tongtong Li,et al.  Sub-band detection of primary user emulation attacks in OFDM-based cognitive radio networks , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[6]  Zhu Han,et al.  Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[7]  Shuguang Cui,et al.  Optimal Linear Cooperation for Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE Journal of Selected Topics in Signal Processing.

[8]  Reihaneh Safavi-Naini,et al.  Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[9]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[10]  Danijela Cabric,et al.  Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.

[11]  Tongtong Li,et al.  Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.

[12]  Lei Li,et al.  Fuzzy C-Means clustering based secure fusion strategy in collaborative spectrum sensing , 2014, 2014 IEEE International Conference on Communications (ICC).

[13]  Laurence B. Milstein,et al.  Optimal Sensing Disruption for a Cognitive Radio Adversary , 2010, IEEE Transactions on Vehicular Technology.

[14]  Zhu Han,et al.  Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[15]  Vinod Sharma,et al.  A new algorithm for distributed nonparametric sequential detection , 2014, 2014 IEEE International Conference on Communications (ICC).

[16]  K. Thangavel,et al.  Outliers detection on protein localization sites by partitional clustering methods , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.