ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks

被引:44
作者
Liu, Song [1 ]
Chen, Yingying [2 ]
Trappe, Wade [1 ]
Greenstein, Larry J. [1 ]
机构
[1] Rutgers State Univ, WINLAB, N Brunswick, NJ 08902 USA
[2] Stevens Inst Technol, Hoboken, NJ 07030 USA
来源
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5 | 2009年
关键词
COGNITIVE RADIO; DISTRIBUTED DETECTION; MULTIPLE SENSORS; CHANNELS; SUPPORT;
D O I
10.1109/INFCOM.2009.5061975
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner. For a cognitive radio network to achieve this goal, spectrum policies and the ability to enforce them are necessary. Detection of an unauthorized (anomalous) usage is one of the critical issues in spectrum etiquette enforcement. In this paper, we present a network structure for dynamic spectrum access and formulate the anomalous usage detection problem using statistical significance testing. The detection problem is classified into two subproblems. For the case where no authorized signal is present, we describe the existing cooperative sensing schemes and investigate the impact of signal path loss on their performance. For the case where an authorized signal is present, we propose three methods that detect anomalous transmissions by making use of the characteristics of radio propagation. Analytical models are formulated for two special cases and, due to the intractability of the general problem, we present an algorithm using machine learning techniques to solve the general case. Our simulation results show that our approaches can effectively detect unauthorized spectrum usage with high detection rate and low false positive rate.
引用
收藏
页码:675 / +
页数:2
相关论文
共 26 条
[1]   NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey [J].
Akyildiz, Ian F. ;
Lee, Won-Yeol ;
Vuran, Mehmet C. ;
Mohanty, Shantidev .
COMPUTER NETWORKS, 2006, 50 (13) :2127-2159
[2]  
[Anonymous], 2006, P 1 INT WORKSH TECHN, DOI DOI 10.1145/1234388.1234400
[3]   Distributed detection with multiple sensors .2. Advanced topics [J].
Blum, RS ;
Kassam, SA ;
Poor, HV .
PROCEEDINGS OF THE IEEE, 1997, 85 (01) :64-79
[4]   Implementation issues in spectrum sensing for cognitive radios [J].
Cabric, D ;
Mishra, SM ;
Brodersen, RW .
CONFERENCE RECORD OF THE THIRTY-EIGHTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2, 2004, :772-776
[5]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[6]   Ensuring trustworthy spectrum sensing in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min .
2006 1ST IEEE WORKSHOP ON NETWORKING TECHNOLOGIES FOR SOFTWARE DEFINED RADIO NETWORKS, 2006, :110-+
[7]   Attack detection in wireless iocalization [J].
Chen, Yingying ;
Trappe, Wade ;
Martin, Richard P. .
INFOCOM 2007, VOLS 1-5, 2007, :1964-+
[8]  
Digham FF, 2003, 2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, P3575
[9]   An empirically based path loss model for wireless channels in suburban environments [J].
Erceg, V ;
Greenstein, LJ ;
Tjandra, SY ;
Parkoff, SR ;
Gupta, A ;
Kulic, B ;
Julius, AA ;
Bianchi, R .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1999, 17 (07) :1205-1211
[10]  
Ganesan G, 2005, 2005 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, Conference Record, P137