Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks

被引:0
作者
Wenkai Wang
Husheng Li
Yan(Lindsay) Sun
Zhu Han
机构
[1] University of Rhode Island,Department of Electrical, Computer and Biomedical Engineering
[2] University of Tennessee,Department of Electrical Engineering and Computer Science
[3] University of Houston,Department of Electrical and Computer Engineering
来源
EURASIP Journal on Advances in Signal Processing | / 2010卷
关键词
Primary User; False Alarm Rate; Secondary User; Cognitive Radio Network; Malicious Node;
D O I
暂无
中图分类号
学科分类号
摘要
Cognitive radio is a revolutionary paradigm to migrate the spectrum scarcity problem in wireless networks. In cognitive radio networks, collaborative spectrum sensing is considered as an effective method to improve the performance of primary user detection. For current collaborative spectrum sensing schemes, secondary users are usually assumed to report their sensing information honestly. However, compromised nodes can send false sensing information to mislead the system. In this paper, we study the detection of untrustworthy secondary users in cognitive radio networks. We first analyze the case when there is only one compromised node in collaborative spectrum sensing schemes. Then we investigate the scenario that there are multiple compromised nodes. Defense schemes are proposed to detect malicious nodes according to their reporting histories. We calculate the suspicious level of all nodes based on their reports. The reports from nodes with high suspicious levels will be excluded in decision-making. Compared with existing defense methods, the proposed scheme can effectively differentiate malicious nodes and honest nodes. As a result, it can significantly improve the performance of collaborative sensing. For example, when there are 10 secondary users, with the primary user detection rate being equal to 0.99, one malicious user can make the false alarm rate [inline-graphic not available: see fulltext] increase to 72%. The proposed scheme can reduce it to 5%. Two malicious users can make [inline-graphic not available: see fulltext] increase to 85% and the proposed scheme reduces it to 8%.
引用
收藏
相关论文
共 50 条
[21]   Effect of spectrum sensing and transmission duration on spectrum hole utilisation in cognitive radio networks [J].
Ali, Mohsin ;
Nam, Haewoon .
IET COMMUNICATIONS, 2017, 11 (16) :2539-2543
[22]   Traffic-Adaptive Proactive Spectrum Handoff Strategy for Graded Secondary Users in Cognitive Radio Networks [J].
ZHANG Lei ;
SONG Tiecheng ;
WU Ming ;
BAO Xu ;
GUO Jie ;
HU Jing .
Chinese Journal of Electronics, 2015, 24 (04) :844-851
[23]   Traffic-Adaptive Proactive Spectrum Handoff Strategy for Graded Secondary Users in Cognitive Radio Networks [J].
Zhang Lei ;
Song Tiecheng ;
Wu Ming ;
Bao Xu ;
Guo Jie ;
Hu Jing .
CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (04) :844-851
[24]   Dynamic Spectrum Sensing in Cognitive Radio Networks Using Compressive Sensing [J].
Dantu, Neeraj Kumar Reddy .
PROCEEDINGS OF NINTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2013), 2014, 299 :89-100
[25]   Spectrum sensing scheduling for group spectrum sharing in cognitive radio networks [J].
Chen, Hongbin ;
Chen, Hsiao-Hwa .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (01) :62-74
[26]   Performance Evaluation of Joint Admission and Eviction Controls of Secondary Users in Cognitive Radio Networks [J].
Hasan Ahmed ;
Salman A. AlQahtani .
Arabian Journal for Science and Engineering, 2015, 40 :3469-3481
[27]   Performance Evaluation of Joint Admission and Eviction Controls of Secondary Users in Cognitive Radio Networks [J].
Ahmed, Hasan ;
AlQahtani, Salman A. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (12) :3469-3481
[28]   Cooperative Spectrum Sensing for Cognitive Radio Networks with Limited Reporting [J].
So, Jaewoo .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (08) :2755-2773
[29]   Fault Tolerant Spectrum Assignment in Cognitive Radio Networks [J].
Pareek, Himanshu ;
Singh, Awadhesh Kumar .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 :1188-1195
[30]   A machine learning-based compressive spectrum sensing in 5G networks using cognitive radio networks [J].
Perumal, Ramakrishnan ;
Nagarajan, Sathish Kumar .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (16)