Multi-fusion Based Distributed Spectrum Sensing against Data Falsification Attacks and Byzantine Failures in CR-MANET

In mobile ad-hoc cognitive radio networks (CRMANET), accurately identifying primary user spectrum occupancy is an important requirement in successful utilization of the spectrum by the secondary user. This is made difficult by malicious mobile secondary users launching spectrum sensing data falsification (SSDF) attacks, byzantine failures of devices, primary user signal fading, and hidden terminal problems. Another ability of these malicious users is to use their mobility to hide under the changing neighborhood. Existing state of the art techniques either consider a centralized approach in decision making or when considering an ad-hoc network, do not take into account the mobility of the devices which adds unique limitations. We present a light weight multi-fusion based distributed spectrum sensing scheme (MFDSS) in a mobile ad-hoc secondary user network to overcome the aforementioned problems. MFDSS allows each secondary user to collect semi-global information to make decisions in a distributed manner. It uses outlier detection and data fusion to remove incorrect sensing data generated by byzantine failures. Reputation information of the devices is used to suppress a SSDF attack. MFDSS incorporates a reputation propagation and fusion scheme to prevent malicious devices from hiding behind changing topology and to maintain the freshness of the reputation information. Additionally, MFDSS includes an incubation period to discourage devices from changing identity to perform a Sybil attack or to mask a bad reputation. Detailed analysis is presented and the results show significant improvement in correct primary user spectrum occupancy identification. We also show that without the reputation propagation of MFDSS, a malicious device is able to move its position and hide its malicious intentions in the new neighborhood.

[1]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[2]  Dharma P. Agrawal,et al.  Spectrum occupancy validation and modeling using real-time measurements , 2010, CoRoNet '10.

[3]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[4]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[5]  Zhu Han,et al.  Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.

[6]  Li Xiao,et al.  Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks , 2011, SecureComm.

[7]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[8]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[9]  Ralph B. D'Agostino,et al.  Simulation probability points of b2 for small samples , 1971 .

[10]  Ian F. Akyildiz,et al.  CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.

[11]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[12]  Teri A. Crosby,et al.  How to Detect and Handle Outliers , 1993 .

[13]  Kaigui Bian,et al.  Robustness against Byzantine Failures in Distributed Spectrum Sensing , 2012, Comput. Commun..

[14]  Kang G. Shin,et al.  Secure cooperative spectrum sensing in cognitive radio networks using interference signatures , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[15]  Otto Carlos Muniz Bandeira Duarte,et al.  Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.

[16]  W. R. Buckland,et al.  Outliers in Statistical Data , 1979 .

[17]  Pramod K. Varshney,et al.  Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.

[18]  Danijela Cabric,et al.  Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.

[19]  Peng Ning,et al.  A Byzantine attack defender: The Conditional Frequency Check , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.