Malicious User Detection Based on Low-Rank Matrix Completion in Wideband Spectrum Sensing

In cognitive radio networks, cooperative spectrum sensing (CSS) has been a promising approach to improve sensing performance by utilizing spatial diversity of participating secondary users (SUs). In current CSS networks, all cooperative SUs are assumed to be honest and genuine. However, the presence of malicious users sending out dishonest data can severely degrade the performance of CSS networks. In this paper, a framework with high detection accuracy and low costs of data acquisition at SUs is developed, with the purpose of mitigating the influences of malicious users. More specifically, a low-rank matrix completion based malicious user detection framework is proposed. In the proposed framework, in order to avoid requiring any prior information about the CSS network, a rank estimation algorithm and an estimation strategy for the number of corrupted channels are proposed. Numerical results show that the proposed malicious user detection framework achieves high detection accuracy with lower data acquisition costs in comparison with the conventional approach. After being validated by simulations, the proposed malicious user detection framework is tested on the real-world signals over TV white space spectrum.

[1]  Chunyan Feng,et al.  Collecting Detection Diversity and Complexity Gains in Cooperative Spectrum Sensing , 2012, IEEE Transactions on Wireless Communications.

[2]  Georgios B. Giannakis,et al.  Compressed Sensing for Wideband Cognitive Radios , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[3]  Zhu Han,et al.  Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[4]  Ming Li,et al.  Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.

[5]  A. Ghasemi,et al.  Collaborative spectrum sensing for opportunistic access in fading environments , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[6]  Yue Gao,et al.  Data-Assisted Low Complexity Compressive Spectrum Sensing on Real-Time Signals Under Sub-Nyquist Rate , 2016, IEEE Transactions on Wireless Communications.

[7]  Zhu Han,et al.  Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.

[8]  Zhu Han,et al.  Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks , 2010, EURASIP J. Adv. Signal Process..

[9]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[10]  Justin K. Romberg,et al.  Beyond Nyquist: Efficient Sampling of Sparse Bandlimited Signals , 2009, IEEE Transactions on Information Theory.

[11]  Majid Khabbazian,et al.  Malicious User Detection in a Cognitive Radio Cooperative Sensing System , 2010, IEEE Transactions on Wireless Communications.

[12]  Ian F. Akyildiz,et al.  Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..

[13]  Kang G. Shin,et al.  Robust cooperative sensing via state estimation in cognitive radio networks , 2011, 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[14]  Husheng Li Reconstructing Spectrum Occupancies for Wideband Cognitive Radio Networks: A Matrix Completion via Belief Propagation , 2010, 2010 IEEE International Conference on Communications.

[15]  Zhijin Qin,et al.  Wideband Spectrum Sensing on Real-Time Signals at Sub-Nyquist Sampling Rates in Single and Cooperative Multiple Nodes , 2016, IEEE Transactions on Signal Processing.

[16]  Kang G. Shin,et al.  Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation , 2011, IEEE Transactions on Mobile Computing.

[17]  Zhijin Qin,et al.  Wireless Powered Cognitive Radio Networks With Compressive Sensing and Matrix Completion , 2016, IEEE Transactions on Communications.

[18]  Emmanuel J. Candès,et al.  Exact Matrix Completion via Convex Optimization , 2009, Found. Comput. Math..

[19]  Ming Yan,et al.  Exact Low-Rank Matrix Completion from Sparsely Corrupted Entries Via Adaptive Outlier Pursuit , 2013, J. Sci. Comput..

[20]  Zhu Han,et al.  Collaborative Spectrum Sensing from Sparse Observations in Cognitive Radio Networks , 2010, IEEE Journal on Selected Areas in Communications.

[21]  Yue Gao,et al.  Low-rank matrix completion based malicious user detection in cooperative spectrum sensing , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[22]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[23]  Yonghong Zeng,et al.  Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..

[24]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[25]  Qihui Wu,et al.  Kernel-Based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions , 2013, IEEE Signal Processing Magazine.

[26]  Yue Gao,et al.  To white space or not to White Space: That is the trial within the Ofcom TV White Spaces pilot , 2015, 2015 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[27]  Yue Gao,et al.  Reliable and Efficient Sub-Nyquist Wideband Spectrum Sensing in Cooperative Cognitive Radio Networks , 2016, IEEE Journal on Selected Areas in Communications.

[28]  S. S. Kalamkar,et al.  Malicious user suppression for cooperative spectrum sensing in cognitive radio networks using Dixon's outlier detection method , 2012, 2012 National Conference on Communications (NCC).

[29]  Kang G. Shin,et al.  Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.

[30]  Kang G. Shin,et al.  Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing , 2015, IEEE Transactions on Mobile Computing.

[31]  Chunyan Feng,et al.  Sparsity Order Estimation and its Application in Compressive Spectrum Sensing for Cognitive Radios , 2012, IEEE Transactions on Wireless Communications.

[32]  E.J. Candes Compressive Sampling , 2022 .

[33]  Ming Yan,et al.  Robust 1-bit Compressive Sensing Using Adaptive Outlier Pursuit , 2012, IEEE Transactions on Signal Processing.

[34]  Pierre-Antoine Absil,et al.  RTRMC: A Riemannian trust-region method for low-rank matrix completion , 2011, NIPS.

[35]  Lara Dolecek,et al.  Detecting and Counteracting Statistical Attacks in Cooperative Spectrum Sensing , 2012, IEEE Transactions on Signal Processing.