Quantifying Trust for Robust Fusion While Spectrum Sharing in Distributed DSA Networks

In this paper, we quantify the trustworthiness of secondary nodes that share spectrum sensing reports in a distributed dynamic spectrum access network. We propose a spatio-spectral anomaly monitoring technique that effectively captures anomalies in the spectrum sensing reports shared by individual cognitive radio nodes. Based on this, we propose an optimistic trust model for a system with a normal risk attitude and using approximation to the Beta distribution. For a more conservative and risk averse system, we propose a multinomial Dirichlet distribution-based conservative trust framework. Using a machine learning approach, we classify malicious nodes with a high degree of certainty regardless of their aggressiveness of attacks or variations introduced by the wireless environment. Subsequently, we propose two instantaneous fusion models: 1) optimistic trust-based fusion and 2) conservative trust-based fusion, which exclude untrustworthy sensing reports from participating nodes during spectrum data fusion. Our work considers random, deterministic, and preferential (ON–OFF) attack models to demonstrate the utility of our proposed model under varied attack scenarios. Through extensive simulation experiments, we show that the trust values help identify malicious nodes with a high degree of certainty.

[1]  Shamik Sengupta,et al.  Vulnerabilities in cognitive radio networks: A survey , 2013, Comput. Commun..

[2]  Mainak Chatterjee,et al.  Trust computation through anomaly monitoring in distributed cognitive radio networks , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.

[3]  Byung-Gil Lee,et al.  Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks , 2014, IEEE Transactions on Dependable and Secure Computing.

[4]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[5]  Pramod K. Varshney,et al.  Countering byzantine attacks in cognitive radio networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[6]  A. Ghasemi,et al.  Collaborative spectrum sensing for opportunistic access in fading environments , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[7]  Zhu Han,et al.  CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[8]  Eduardo da Silva,et al.  Distributed Self-organized Trust Management for Mobile Ad Hoc Networks , 2012, NDT.

[9]  Henry L. Bertoni,et al.  Radio Propagation for Modern Wireless Systems , 1999 .

[10]  Bo Gao,et al.  An Overview of Dynamic Spectrum Sharing: Ongoing Initiatives, Challenges, and a Roadmap for Future Research , 2016, IEEE Transactions on Cognitive Communications and Networking.

[11]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[12]  Prashant Krishnamurthy,et al.  Decoupling trust and wireless channel induced effects on collaborative sensing attacks , 2014, 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN).

[13]  R.W. Brodersen,et al.  Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[14]  Bharat K. Bhargava,et al.  SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems , 2013, IEEE Transactions on Dependable and Secure Computing.

[15]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[16]  Audun Jøsang,et al.  Interpreting Belief Functions as Dirichlet Distributions , 2007, ECSQARU.

[17]  Peter C. Mason,et al.  Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[18]  Diego Gambetta Can We Trust Trust , 2000 .

[19]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[20]  Kaveh Pahlavan,et al.  Principles of Wireless Networks: A Unified Approach , 2011 .

[21]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[22]  Audun Jøsang,et al.  Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[23]  Bo Gao,et al.  Defining incumbent protection zones on the fly: Dynamic boundaries for spectrum sharing , 2015, 2015 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[24]  Dan C. Marinescu,et al.  A cloud service for trust management in cognitive radio networks , 2014, Int. J. Cloud Comput..

[25]  Mainak Chatterjee,et al.  Bayesian inference based decision reliability under imperfect monitoring , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).