HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing

被引:47
作者
He, Xiaofan [1 ]
Dai, Huaiyu [1 ]
Ning, Peng [2 ,3 ]
机构
[1] N Carolina State Univ, Dept Elect & Comp Engn, Raleigh, NC 27695 USA
[2] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
[3] N Carolina State Univ, SOSI, Raleigh, NC 27695 USA
基金
美国国家科学基金会;
关键词
Cognitive radio network; security; collaborative spectrum sensing; malicious user detection; Byzantine attacks; HMM; COGNITIVE RADIO;
D O I
10.1109/JSAC.2013.131119
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Collaborative spectrum sensing improves the spectrum state estimation accuracy but is vulnerable to the potential attacks from malicious secondary cognitive radio (CR) users, and thus raises security concerns. One promising malicious user detection method is to identify their abnormal statistical spectrum sensing behaviors. From this angle, two hidden Markov models (HMMs) corresponding to honest and malicious users respectively are adopted in this paper to characterize their different sensing behaviors, and malicious user detection is achieved via detecting the difference in the corresponding HMM parameters. To obtain the HMM estimates, an effective inference algorithm that can simultaneously estimate two HMMs without requiring separated training sequences is also developed. By using these estimates, high malicious user detection accuracy can be achieved at the fusion center, leading to more robust and reliable collaborative spectrum sensing performance (substantially enlarged operational regions) in the presence of malicious users, as compared to the baseline approaches. Different fusion methods are also discussed and compared.
引用
收藏
页码:2196 / 2208
页数:13
相关论文
共 27 条
  • [1] Adelantado F., 2011, P IEEE ICC
  • [2] Cooperative spectrum sensing in cognitive radio networks: A survey
    Akyildiz, Ian F.
    Lo, Brandon F.
    Balakrishnan, Ravikumar
    [J]. PHYSICAL COMMUNICATION, 2011, 4 (01) : 40 - 62
  • [3] [Anonymous], P SDR FOR TECHN C
  • [4] [Anonymous], P IEEE WCNC
  • [5] [Anonymous], 2000, Pattern Classification, DOI DOI 10.1007/978-3-319-57027-3_4
  • [6] Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead
    Baldini, Gianmarco
    Sturman, Taj
    Biswas, Abdur Rahim
    Leschhorn, Ruediger
    Godor, Gyoezoe
    Street, Michael
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02): : 355 - 379
  • [7] A MAXIMIZATION TECHNIQUE OCCURRING IN STATISTICAL ANALYSIS OF PROBABILISTIC FUNCTIONS OF MARKOV CHAINS
    BAUM, LE
    PETRIE, T
    SOULES, G
    WEISS, N
    [J]. ANNALS OF MATHEMATICAL STATISTICS, 1970, 41 (01): : 164 - &
  • [8] Burbank J. L., 2008, P IEEE CROWNCOM
  • [9] Chen R., 2008, Proc. of IEEE INFOCOM
  • [10] Toward secure distributed spectrum sensing in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Hou, Y. Thomas
    Reed, Jeffrey H.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 50 - 55