A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio Networks

Cognitive Radio Networks (CRNs) is an emerging wireless communications technique for resolving the significant spectrum scarcity problem. Despite its promising characteristics, CRNs also introduce new security threats especially the internal attacks during the spectrum sensing process, which can degrade the efficiency of spectrum sensing. To address this issue, this paper proposes a distributed cooperative spectrum sensing strategy (DSCS) based on a dynamic reputation model to defend against attacks and provide reliable spectrum sensing. Both theoretical analysis and simulation results indicate that the proposed DSCS strategy can provide an effective countermeasure against the internal spectrum sensing data falsification (SSDF) attacks through enabling secondary users to obtain more accurate cooperative sensing results in adversarial environments. In addition, the DSCS does not rely on a central authority, nor a common control channel, and are therefore applicable in distributed CRNs.

[1]  Prabir Bhattacharya,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .

[2]  Choong Seon Hong,et al.  SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks , 2009, Trans. Comput. Sci..

[3]  Wei Zhou,et al.  A strategy-proof trust mechanism for pervasive computing environments , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[4]  Zhu Han,et al.  Truthful Mechanisms for Secure Communication in Wireless Cooperative System , 2013, IEEE Transactions on Wireless Communications.

[5]  Amitav Mukherjee,et al.  Diffusion of Cooperative Behavior in Decentralized Cognitive Radio Networks With Selfish Spectrum Sensors , 2013, IEEE Journal of Selected Topics in Signal Processing.

[6]  Hui Lin,et al.  PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks , 2012, EURASIP J. Wirel. Commun. Netw..

[7]  K. J. Ray Liu,et al.  Joint Design of Spectrum Sensing and Channel Access in Cognitive Radio Networks , 2011, IEEE Transactions on Wireless Communications.

[8]  Reihaneh Safavi-Naini,et al.  Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[9]  Ming Li,et al.  Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.

[10]  Li Xu,et al.  A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks , 2013, Wireless Personal Communications.

[11]  Zhiqiang Li,et al.  A Distributed Consensus-Based Cooperative Spectrum-Sensing Scheme in Cognitive Radios , 2010, IEEE Transactions on Vehicular Technology.

[12]  Jean-Yves Le Boudec,et al.  Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[13]  F. Richard Yu,et al.  Energy-Efficient Resource Allocation for Heterogeneous Cognitive Radio Networks with Femtocells , 2012, IEEE Transactions on Wireless Communications.

[14]  Wenjing Lou,et al.  PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[15]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[16]  Ramón Agustí,et al.  Multiuser Resource Allocation Optimization Using Bandwidth-Power Product in Cognitive Radio Networks , 2013, IEEE Journal on Selected Areas in Communications.

[17]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[18]  C. N. Mathur,et al.  Security Issues in Cognitive Radio Networks , 2007 .

[19]  A. Goldsmith,et al.  Variable-rate variable-power MQAM for fading channels , 1996, Proceedings of Vehicular Technology Conference - VTC.

[20]  Long Bao Le,et al.  Channel Assignment With Access Contention Resolution for Cognitive Radio Networks , 2012, IEEE Transactions on Vehicular Technology.

[21]  Kaigui Bian,et al.  Robustness against Byzantine Failures in Distributed Spectrum Sensing , 2012, Comput. Commun..

[22]  Xinping Guan,et al.  YouSense: Mitigating entropy selfishness in distributed collaborative spectrum sensing , 2013, 2013 Proceedings IEEE INFOCOM.

[23]  Sumit Roy,et al.  Analysis of Search Schemes in Cognitive Radio , 2007 .

[24]  F. Richard Yu,et al.  Spectrum sharing and resource allocation for energy-efficient heterogeneous cognitive radio networks with femtocells , 2012, 2012 IEEE International Conference on Communications (ICC).

[25]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[26]  Huifang Chen,et al.  A cooperative spectrum sensing scheme based on the Bayesian reputation model in cognitive radio networks , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[27]  Ian F. Akyildiz,et al.  Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..

[28]  F. Richard Yu,et al.  Dynamic Resource Allocation for Heterogeneous Services in Cognitive Radio Networks With Imperfect Channel Sensing , 2012, IEEE Trans. Veh. Technol..

[29]  Athanasios V. Vasilakos,et al.  QoE-Driven Channel Allocation Schemes for Multimedia Transmission of Priority-Based Secondary Users over Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[30]  Han-Chieh Chao,et al.  Secure centralized spectrum sensing for cognitive radio networks , 2012, Wirel. Networks.

[31]  Reihaneh Safavi-Naini,et al.  ReDiSen: Reputation-based secure cooperative sensing in distributed cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[32]  S. Yadav,et al.  RSS based detection and expulsion of malicious users from cooperative sensing in Cognitive Radios , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[33]  Kang G. Shin,et al.  Efficient Discovery of Spectrum Opportunities with MAC-Layer Sensing in Cognitive Radio Networks , 2008, IEEE Transactions on Mobile Computing.

[34]  Zhi-Hua Zhou,et al.  Resource Allocation for Heterogeneous Cognitive Radio Networks with Imperfect Spectrum Sensing , 2013, IEEE Journal on Selected Areas in Communications.

[35]  Qiang Chen,et al.  An Enhanced D-S Theory Cooperative Spectrum Sensing Algorithm against SSDF Attack , 2012, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring).