Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach

Husheng Li, Zhu Han
{"title":"Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach","authors":"Husheng Li, Zhu Han","doi":"10.1109/DYSPAN.2010.5457898","DOIUrl":null,"url":null,"abstract":"Collaborative spectrum sensing, which collects local observations or decisions from multiple secondary users to make a decision by a fusion center, is an effective approach to alleviate the unreliability of single-user spectrum sensing. However, it is subject to the attack of malicious secondary user(s), which may send false reports. Therefore, it is necessary to detect potential attacker(s) and make attack-proof decisions for spectrum sensing. Most existing attacker detection schemes are based on the knowledge of the attacker's strategy and thus apply the Baeysian detection of attackers. However, in practical cognitive radio systems, the data fusion center typically does not know the attacker's strategy. To alleviate the problem of the unknown strategy of attacker(s), an abnormality detection approach, based on the abnormality detection in data mining, is proposed. The performance of the attacker detection in the single-attacker scenario is analyzed explicitly. For the case that the attacker does not know the reports of honest secondary users (called independent attack), it is numerically shown that attacker can always be detected as the number of spectrum sensing rounds tends to infinity. For the case that the attacker knows all the reports of other secondary users, based on which the attacker sends its report (called dependent attack), an approach for the attacker to perfectly avoid being detected is found, provided that the attacker has perfect information about the miss detection and false alarm probabilities. This motivates cognitive radio systems to protect the reports of secondary users. The performance of attacker detection in the general case of multiple attackers is demonstrated using numerical simulations.","PeriodicalId":106204,"journal":{"name":"2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"68","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DYSPAN.2010.5457898","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 68

Abstract

Collaborative spectrum sensing, which collects local observations or decisions from multiple secondary users to make a decision by a fusion center, is an effective approach to alleviate the unreliability of single-user spectrum sensing. However, it is subject to the attack of malicious secondary user(s), which may send false reports. Therefore, it is necessary to detect potential attacker(s) and make attack-proof decisions for spectrum sensing. Most existing attacker detection schemes are based on the knowledge of the attacker's strategy and thus apply the Baeysian detection of attackers. However, in practical cognitive radio systems, the data fusion center typically does not know the attacker's strategy. To alleviate the problem of the unknown strategy of attacker(s), an abnormality detection approach, based on the abnormality detection in data mining, is proposed. The performance of the attacker detection in the single-attacker scenario is analyzed explicitly. For the case that the attacker does not know the reports of honest secondary users (called independent attack), it is numerically shown that attacker can always be detected as the number of spectrum sensing rounds tends to infinity. For the case that the attacker knows all the reports of other secondary users, based on which the attacker sends its report (called dependent attack), an approach for the attacker to perfectly avoid being detected is found, provided that the attacker has perfect information about the miss detection and false alarm probabilities. This motivates cognitive radio systems to protect the reports of secondary users. The performance of attacker detection in the general case of multiple attackers is demonstrated using numerical simulations.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
认知无线电系统协同频谱感知中的攻击者捕获:一种异常检测方法
协同频谱感知是一种有效的解决单用户频谱感知不可靠性问题的方法,它通过融合中心收集多个辅助用户的局部观测数据或决策来进行决策。但是,它容易受到恶意的二级用户的攻击,可能会发送错误的报告。因此,有必要检测潜在的攻击者,并为频谱感知做出防攻击决策。现有的攻击者检测方案大多是基于对攻击者策略的了解,从而对攻击者进行贝叶斯检测。然而,在实际的认知无线电系统中,数据融合中心通常不知道攻击者的策略。针对攻击者策略未知的问题,提出了一种基于数据挖掘中的异常检测方法的异常检测方法。明确分析了单攻击者场景下攻击者检测的性能。对于攻击者不知道诚实二级用户的报告情况(称为独立攻击),通过数值计算表明,随着频谱感知轮数趋于无穷大,攻击者始终可以被检测到。在攻击者知道其他辅助用户的所有报告的情况下,攻击者根据这些报告发送自己的报告(称为依赖攻击),找到了一种攻击者完全避免被检测的方法,前提是攻击者拥有完整的漏检概率和虚警概率信息。这促使认知无线电系统保护次要用户的报告。通过数值模拟验证了攻击者检测在一般情况下的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Decomposable MAC Framework for Highly Flexible and Adaptable MAC Realizations Receiver-Based Channel Allocation for Wireless Cognitive Radio Mesh Networks Extending Policy Languages with Utility and Prioritization Knowledge: The CAPRI Approach A 50Mhz-To-1.5Ghz Cross-Correlation CMOS Spectrum Analyzer for Cognitive Radio with 89dB SFDR in 1Mhz RBW Learning the Spectrum via Collaborative Filtering in Cognitive Radio Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1