Localization in Cognitive Radio Systems In The Presence of Spatially Obfuscated Data

Localizing primary users using observations collected from secondary users sensing the spectrum is a key asp ect for improved operations in cognitive radio networks. However, malicious secondary users may obfuscate their location rep orts causing disruption in the network operation. In this paper we take a first step towards addressing the challenging problem of primary user localization in the presence of secondary us ers of varying trust that may randomly obfuscate their reports while maintaining plausibility of their content. Using localization reports as evidences in support of (or against) hypotheses a bout user locations, we develop the foundations of an evidential reasoning-based approach that uses subjective logic for in formation fusion and inferencing for localization in the presence of incomplete and conflicting knowledge. To do so, we exploit ou r recent extensions of subjective logic that accommodate the spatial relationships that naturally exists between location reports. After highlighting our spatial extensions, we apply them in building an inferencing algorithm for primary user localization. Th rough extensive simulations, we analyze its performance and the e ff ct of various design parameters, showing a 90% accuracy in loca lization. Finally, we compare it with other localization techniques via simulations.

[1]  Jianhua Li,et al.  Intrusion Detection Engine Based on Dempster-Shafer's Theory of Evidence , 2006, 2006 International Conference on Communications, Circuits and Systems.

[2]  Petri Mähönen,et al.  Understanding conditions that lead to emulation attacks in dynamic spectrum access , 2011, IEEE Communications Magazine.

[3]  C. Badcock,et al.  Trust : making and breaking cooperative relations , 1989 .

[4]  Audun Jøsang,et al.  The consensus operator for combining beliefs , 2002, Artif. Intell..

[5]  Glenn Shafer,et al.  Perspectives on the theory and practice of belief functions , 1990, Int. J. Approx. Reason..

[6]  Zhu Han,et al.  Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[7]  Symeon Papavassiliou,et al.  Data fusion algorithms for network anomaly detection: classification and evaluation , 2007, International Conference on Networking and Services (ICNS '07).

[8]  Chunyan Miao,et al.  Towards a trust aware cognitive radio architecture , 2009, MOCO.

[9]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[10]  Zhu Han,et al.  Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks , 2010, EURASIP J. Adv. Signal Process..

[11]  Ronald Fagin,et al.  Two Views of Belief: Belief as Generalized Probability and Belief as Evidence , 1992, Artif. Intell..

[12]  Jeffrey T. Henrikson Completeness and Total Boundedness of the Hausdorff Metric , 1999 .

[13]  Basil S. Maglaris,et al.  One step ahead to multisensor data fusion for DDoS detection , 2005, J. Comput. Secur..

[14]  Zhu Han,et al.  CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[15]  Lara Dolecek,et al.  Joint Spectrum Sensing and Detection of Malicious Nodes via Belief Propagation , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[16]  Ehab Al-Shaer,et al.  Overlay Fault Diagnosis Based on Evidential Reasoning , 2009, IEEE INFOCOM 2009.

[17]  Song Han,et al.  Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[18]  Xiaohong Yuan,et al.  Engine fault diagnosis based on multi-sensor information fusion using Dempster-Shafer evidence theory , 2007, Inf. Fusion.

[19]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[20]  Venugopal V. Veeravalli,et al.  Cooperative Sensing for Primary Detection in Cognitive Radio , 2008, IEEE Journal of Selected Topics in Signal Processing.

[21]  Danijela Cabric,et al.  Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.

[22]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.