Abnormal Information Identification and Elimination in Cognitive Networks

The electromagnetic spectrum is an important national strategic resource, and spectrum sensing data falsification (SSDF) is an attack method that destroys the cognitive network and makes it impossible to be used effectively. Malicious users capture the sensory nodes through cyber attacks, virus intrusions, etc., tampering with the perceived data and making the cognitive network biased or even completely reversed. In order to eliminate the negative effects caused by the identification and elimination of abnormal information in the electromagnetic spectrum in multi-user collaboration and to ensure the desired effect, this paper studies and constructs a robust cognitive user evaluation reference system based on improving the performance of cooperative spectrum sensing. The impact of attack behavior on the reference frame is greatly reduced. At the same time, the attacker’s identification and elimination algorithm are improved, and the influence of abnormal data on the perceived performance under the combined effect is eliminated.

[1]  Mansoor Alam,et al.  A robust malicious user detection scheme in cooperative spectrum sensing , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[2]  Peng Ning,et al.  A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check , 2013, IEEE Transactions on Wireless Communications.

[3]  Fabrizio Granelli,et al.  Identification and Punishment Policies for Spectrum Sensing Data Falsification Attackers Using Delivery-Based Assessment , 2016, IEEE Transactions on Vehicular Technology.

[4]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[5]  Mainak Chatterjee,et al.  Utilizing misleading information for cooperative spectrum sensing in cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[6]  Robert Benjamin Security considerations in communications systems and networks , 1990 .

[7]  Zhu Han,et al.  Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.

[8]  Shuai Li,et al.  An Adaptive Deviation-tolerant Secure Scheme for distributed cooperative spectrum sensing , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[9]  Reihaneh Safavi-Naini,et al.  ReDiSen: Reputation-based secure cooperative sensing in distributed cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[10]  Do-Hoon Kim,et al.  Selfish attacks and detection in cognitive radio Ad-Hoc networks , 2013, IEEE Network.

[11]  Danijela Cabric,et al.  Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.

[12]  Daesik Hong,et al.  Goodness-of-Fit-Based Malicious User Detection in Cooperative Spectrum Sensing , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).

[13]  Lara Dolecek,et al.  Detecting and Counteracting Statistical Attacks in Cooperative Spectrum Sensing , 2012, IEEE Transactions on Signal Processing.

[14]  Yun Lin,et al.  Semi-Supervised Learning with Generative Adversarial Networks on Digital Signal Modulation Classification , 2018 .

[15]  Ya Tu,et al.  Digital Signal Modulation Classification With Data Augmentation Using Generative Adversarial Nets in Cognitive Radio Networks , 2018, IEEE Access.

[16]  Chunsheng Xin,et al.  A weighted cooperative spectrum sensing framework for infrastructure-based cognitive radio networks , 2011, Comput. Commun..

[17]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.