A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users

被引:2
作者
Ahmed, Arshed [1 ]
Khan, Muhammad Sajjad [2 ,3 ]
Gul, Noor [1 ,3 ]
Uddin, Irfan [4 ]
Kim, Su Min [2 ]
Kim, Junsu [2 ]
机构
[1] Univ Peshawar, Dept Elect, Peshawar, Pakistan
[2] Korea Polytech Univ, Dept Elect Engn, Shihung, South Korea
[3] Int Islamic Univ, Dept Elect Engn, Islamabad, Pakistan
[4] Super Univ, Dept Informat Technol, Lahore, Pakistan
基金
新加坡国家研究基金会;
关键词
Data handling - Error detection - Probability - Signal to noise ratio - Cognitive radio - Statistics - Testing;
D O I
10.1155/2020/8832191
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a cognitive radio (CR), opportunistic secondary users (SUs) periodically sense the primary user's (PU's) existence in the network. Spectrum sensing of a single SU is not precise due to wireless channels and hidden terminal issues. One promising solution is cooperative spectrum sensing (CSS) that allows multiple SUs' cooperation to sense the PU's activity. In CSS, the misdetection of the PU signal by the SU causes system inefficiency that increases the interference to the system. This paper introduces a new category of a malicious user (MU), i.e., a lazy malicious user (LMU) with two operating modes such as an awakened mode and sleeping mode. In the awakened mode, the LMU reports accurately the PU activity like other normal cooperative users, while in the sleeping mode, it randomly reports abnormal sensing data similar to an always yes malicious user (AYMU) or always no malicious user (ANMU). In this paper, statistical analysis is carried out to detect the behavior of different abnormal users and mitigate their harmful effects. Results are collected for the different hard combination schemes in the presence of the LMU and opposite categories of malicious users (OMUs). Simulation results collected for the error probability, detection probability, and false alarm at different levels of the signal-to-noise ratios (SNRs) and various contributions of the LMUs and OMUs confirmed that out of the many outlier detection tests, the median test performs better in MU detection by producing minimum error probability results in the CSS. The results are further compared by keeping minimum SNR values with the mean test, quartile test, Grubbs test, and generalized extreme studentized deviate (GESD) test. Similarly, performance gain of the median test is examined further separately in the AND, OR, and voting schemes that show minimum error probability results of the proposed test as compared with all other outlier detection tests in discarding abnormal sensing reports.
引用
收藏
页数:18
相关论文
共 35 条
[1]   Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks [J].
Abdelhakim, Mai ;
Lightfoot, Leonard E. ;
Ren, Jian ;
Li, Tongtong .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (04) :950-959
[2]  
Agarwal C. C., 2017, OUTLIER ANAL, V24
[3]   Cooperative Communications for Cognitive Radio Networks [J].
Ben Letaief, Khaled ;
Zhang, Wei .
PROCEEDINGS OF THE IEEE, 2009, 97 (05) :878-893
[4]   A generalized Grubbs-Beck test statistic for detecting multiple potentially influential low outliers in flood series [J].
Cohn, T. A. ;
England, J. F. ;
Berenbrock, C. E. ;
Mason, R. R. ;
Stedinger, J. R. ;
Lamontagne, J. R. .
WATER RESOURCES RESEARCH, 2013, 49 (08) :5047-5058
[5]  
Cousineau D, 2010, INT J PSYCHOL RES, V3, P58
[6]  
Diamond S. M., 2007 5 IEEE INT C IN, P316, DOI [10.1109/indin.2007.4384776, DOI 10.1109/INDIN.2007.4384776]
[7]  
Divya D, 2016, PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON DATA MINING AND ADVANCED COMPUTING (SAPIENCE), P23, DOI 10.1109/SAPIENCE.2016.7684114
[8]   A Soft-Hard Combination-Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks [J].
Do, Nhu Tri ;
An, Beongku .
SENSORS, 2015, 15 (02) :4388-4407
[9]   A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks [J].
Fragkiadakis, Alexandros G. ;
Tragos, Elias Z. ;
Askoxylakis, Ioannis G. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01) :428-445
[10]   Secured Soft Combination Schemes Against Malicious-Users in Cooperative Spectrum Sensing [J].
Gul, Noor ;
Qureshi, Ijaz Mansoor ;
Naveed, Aqdas ;
Elahi, Atif ;
Rasool, Imtiaz .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (01) :389-408