Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum Sensing in Cognitive Radio Networks

  • Suchismita Bhattacharjee
  • Ningrinla Marchang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9478)


In collaborative sensing, a cognitive radio node cooperates with others in the spectrum sensing process for a more accurate sensing decision. A malicious node may launch Spectrum Sensing Data Falsification (SSDF) in which the local sensing report is falsified before it reaches the fusion center (FC). The task of FC is to aggregate local sensing reports from the collaborating nodes, thereby arriving at a final sensing decision. In this paper, we propose two attack-resistant trust-based decision rules: WMR (Weighted Majority Rule) and WMRR (Weighted Majority Rule with Redemption). These rules are based on the weighted majority game. The key feature in these rules is that the contribution of a sensing report in the final decision depends not merely on the report but also on the trust that the FC has on the node sending out the report. We support the validity of the proposed rules through extensive simulation results.


Cognitive radio network Collaborative spectrum sensing SSDF attack Decision rule 


  1. 1.
    Mitola, J.: Cognitive radio for flexible mobile multimedia communications. In: Proceedings of the IEEE International Workshop on Mobile Communications, pp. 3–10 (1999)Google Scholar
  2. 2.
    Mitola, J.: Cognitive Radio: An integrated agent architecture for software defined radio, Ph.D. thesis in Royal Institute of Technology (KTH) (2000)Google Scholar
  3. 3.
    Carlos, C., Challapali, K., Birru, D., Sai Shankar, N.: IEEE 802.22: the first worldwide wireless standard based on cognitive radios. In: Proceedings of the First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005, pp. 328–337 (2005). doi: 10.1109/DYSPAN.2005.1542649
  4. 4.
    Shen, J., Liu, S., Zhang, R., Liu, Y.: Soft versus hard cooperative energy detection under low SNR. In: Proceedings of the Third International Conference on Communications and Networking in China, pp. 128–131 (2008)Google Scholar
  5. 5.
    Gura, E.-Y., Maschler, M.B.: Insights into Game Theory. Cambridge University Press, Cambridge (2008)CrossRefMATHGoogle Scholar
  6. 6.
    Wang, W., Li, H., Sun, Y., Han, Z.: Attack-proof collaborative spectrum sensing in cognitive radio networks. In: Proceedings of CISS, pp. 130–134 (2009)Google Scholar
  7. 7.
    Rawat, A., Anand, P., Chen, H., Varshney, P.: Countering byzantine attacks in cognitive radio networks. In: Proceedings of ICASSP, pp. 3098–3101 (2010)Google Scholar
  8. 8.
    Chen, R., Park, J., Bian, K.: Robust distributed spectrum sensing in cognitive radio networks. In: Proceedings of Milcom, pp. 1876–1884 (2008)Google Scholar
  9. 9.
    Noon, E., Li, H.: Defending against hit-and-run attackers in collaborative spectrum sensing of cognitive radio networks: a point system. In: VTC, pp. 1–5 (2010)Google Scholar
  10. 10.
    Li, H., Han, Z.: Catching attacker(s) for collaborative spectrum sensing in cognitive radio systems: an abnormality detection approach. In: DySPAN, pp. 1–12 (2010)Google Scholar
  11. 11.
    Li, H., Han, Z.: Catch me if you can: an abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Trans. Wirel. Commun. 9(11), 3554–3565 (2010)CrossRefGoogle Scholar
  12. 12.
    Kang, X., Liang, Y.-C., Garg, H.K., Zhang, L.: Sensing-based spectrum sharing in cognitive radio networks. IEEE Trans. Veh. Technol. 58(8), 4649–4654 (2009)CrossRefGoogle Scholar
  13. 13.
    Min, A., Shin, K., Hu, X.: Attack-tolerant distributed sensing for dynamic spectrum access networks. In: Proceedings of ICNP, pp. 294–303 (2009)Google Scholar
  14. 14.
    Zhu, F., Seo, S.: Enhanced robust cooperative spectrum sensing in cognitive radio. J. Commun. Netw. 11, 122–133 (2009)CrossRefGoogle Scholar
  15. 15.
    Wang, W., Li, H., Sun, Y., Han, Z.: CatchIt: detect malicious nodes in collaborative spectrum sensing. In: Proceedings of the 28th IEEE Conference on Global Telecommunications, GLOBECOM 2009, pp. 5071–5076 (2009). ISBN- 978-1-4244-4147-1Google Scholar
  16. 16.
    Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proc. IEEE 98(10), 1755–1772 (2010)CrossRefGoogle Scholar
  17. 17.
    Chen, R., Park, J.-M., Hou, Y.T., Reed, J.H.: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun. Mag. 46(4), 50–55 (2008)CrossRefGoogle Scholar
  18. 18.
    Yifeng, C., Liu, C., Pelechrinis, K., Krishnamurthy, P., Weiss, M.B.H., Mo, Y.: Decoupling trust and wireless channel induced effects on collaborative sensing attacks. In: 2014 IEEE International Symposium on Dynamic Spectrum Access Nteworks (DYSPAN), pp. 224–235, 1–4 April 2014Google Scholar
  19. 19.
    Abdelhakim, M., Zhang, L., Ren, J., Li, T.: Cooperative sensing in cognitive networks under malicious attack. In: 2011 IEEE International Conference on Acoustics, Speech Processing (ICASSP), pp. 3004–3007, 22–27 May 2011Google Scholar
  20. 20.
    Mousavifar, S.A., Leung, C.: Energy efficient collaborative spectrum sensing based on trust managemnt in cognitive radio networks. IEEE Trans. Wirel. Commun. 14(4), 1927–1939 (2015)CrossRefGoogle Scholar
  21. 21.
    Wang, J., Chen, I.-R.: Trust-based data fusion mechanism design in cognitive radio networks. In: 2014 IEEE Conference on Communications and Network Security (CNS), pp. 53–59, 29–31 Oct 2014Google Scholar
  22. 22.
    Sagduyu, Y.E.: Securing cognitive radio networks with dynamic trust against spectrum sensing data falsification. In: 2014 IEEE Military Communications Conference (MILCOM), pp. 235–241, 6–8 Oct 2014Google Scholar
  23. 23.
    Wang, W., Chen, L., Shin, K.G., Duan, L.: Thwarting intelligent malicious behaviours in cooperative spectrum sensing. IEEE Trans. Mob. Comput. 14, 2392–2405 (2015)CrossRefGoogle Scholar
  24. 24.
    Bhattacharjee, S., Rajkumari, R., Marchang, N.: Effect of colluding attack in collaborative spectrum sensing. In: 2015 IEEE 2nd International Conference on Signal Processing and Integrated Networks (SPIN), pp. 223–227, 19–20 Feb 2015Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of CSENERISTNirjuliIndia

Personalised recommendations