Stealthy-Attacker Detection With a Multidimensional Feature Vector for Collaborative Spectrum Sensing

Byzantine attackers are serious threats to collaborative spectrum sensing (CSS) systems of cognitive radio networks (CRNs). When the attackers eavesdrop on the sensing reports of honest users and fabricate their local reports according to an undetectable criterion, they can even evolve into stealthy attackers, which cannot be detected by conventional detection approaches. However, in existing works, the significant threats of stealthy attacks have yet to be well considered. In this paper, we focus on the issue of detecting stealthy attackers in CSS systems. To analyze the detectability of stealthy attackers, we propose a multidimensional metric. We prove that dissimilarity in the metrics between different subsets of cognitive radios (CRs) reveals the existence of attackers, and when the attackers fabricate their local reports to eliminate the dissimilarity, they can avoid being detected. Based on these analyses, we propose a multidimensional feature vector (FV) and its empirical form to indicate the identity (an honest user or an attacker) of a CR. By classifying the CRs according to their empirical FVs (EFVs), attackers are distinguished from honest users. The effectiveness of the EFV-based attacker detection scheme is validated by both mathematical proof and numerical experiments.

[1]  Qihui Wu,et al.  Kernel-Based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions , 2013, IEEE Signal Processing Magazine.

[2]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[3]  David G. Daut,et al.  Signature Based Spectrum Sensing Algorithms for IEEE 802.22 WRAN , 2007, 2007 IEEE International Conference on Communications.

[4]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[5]  W. Gray,et al.  Optimal data fusion of correlated local decisions in multiple sensor detection systems , 1992 .

[6]  Sai Shankar Nandagopalan,et al.  IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios , 2006, J. Commun..

[7]  Geoffrey Ye Li,et al.  Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[8]  Janne J. Lehtomäki,et al.  On the Selection of the Best Detection Performance Sensors for Cognitive Radio Networks , 2010, IEEE Signal Processing Letters.

[9]  Khaled Ben Letaief,et al.  Cooperative Communications for Cognitive Radio Networks , 2009, Proceedings of the IEEE.

[10]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[11]  Qihui Wu,et al.  Attacker Detection Based on Dissimilarity of Local Reports in Collaborative Spectrum Sensing , 2012, IEICE transactions on communications.

[12]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[13]  Zhu Han,et al.  Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.

[14]  Shuai Li,et al.  Believe Yourself: A User-Centric Misbehavior Detection Scheme for Secure Collaborative Spectrum Sensing , 2011, 2011 IEEE International Conference on Communications (ICC).

[15]  Qihui Wu,et al.  Spatial-Temporal Opportunity Detection for Spectrum-Heterogeneous Cognitive Radio Networks: Two-Dimensional Sensing , 2013, IEEE Transactions on Wireless Communications.

[16]  Feng Gao,et al.  A Robust and Efficient Cooperative Spectrum Sensing Scheme in Cognitive Radio Networks , 2010, 2010 IEEE International Conference on Communications Workshops.

[17]  Amir Ghasemi,et al.  Opportunistic Spectrum Access in Fading Channels Through Collaborative Sensing , 2007, J. Commun..

[18]  Amir Ghasemi,et al.  Spectrum sensing in cognitive radio networks: requirements, challenges and design trade-offs , 2008, IEEE Communications Magazine.

[19]  Hai Jiang,et al.  Optimal multi-channel cooperative sensing in cognitive radio networks , 2010, IEEE Transactions on Wireless Communications.

[20]  Guoru Ding,et al.  Detection of non-uniform byzantine attacks in collaborative spectrum sensing , 2013 .

[21]  Tsang-Yi Wang,et al.  Performance Analysis of Energy Detection Based Spectrum Sensing with Unknown Primary Signal Arrival Time , 2011, IEEE Transactions on Communications.

[22]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[23]  Pramod K. Varshney,et al.  Countering byzantine attacks in cognitive radio networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[25]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[26]  Qihui Wu,et al.  Hybrid-Strategy Attacks in Collaborative Spectrum Sensing of Cognitive Radio Networks , 2013 .

[27]  R. Fisher THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .

[28]  Ian F. Akyildiz,et al.  Optimal spectrum sensing framework for cognitive radio networks , 2008, IEEE Transactions on Wireless Communications.

[29]  Tao Jiang,et al.  Maximum channel throughput via cooperative spectrum sensing in cognitive radio networks , 2009, IEEE Transactions on Wireless Communications.

[30]  Brian M. Sadler,et al.  Opportunistic Spectrum Access via Periodic Channel Sensing , 2008, IEEE Transactions on Signal Processing.

[31]  Mohamed-Slim Alouini,et al.  On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.

[32]  Danijela Cabric,et al.  Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.