Abstract
Most of the existing defense schemes against the Byzantine attack discussed in Chap. 3 either assume that the underlying spectrum states at different timeslots are independent or they only focus on the measurements collected in a single timeslot. Nonetheless, for many practical scenarios, the activities of the PUs and the induced spectrum states often follow a Markov process, and hence the spectrum sensing behaviors of the SUs may be better characterized by the HMM. Under this modeling, a novel HMM-based Byzantine attack detection technique can be developed to enforce the robustness of collaborative spectrum sensing. To illustrate this, the HMM-based spectrum sensing behavioral model is presented first, and based on which, the sought-after multi-HMM inference algorithm is introduced. Then, the overall HMM-based Byzantine attack detection scheme is demonstrated along with some numerical results to corroborate its effectiveness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Note that, in (5.3), the expectation is over the hidden variables q and m.
References
T. Clancy and B. Walker. Predictive dynamic spectrum access. In Proc. of SDR Forum Technical Conference, 2006.
N. Noorshams, M. Malboubi, and A. Bahai. Centralized and decentralized cooperative spectrum sensing in cognitive radio networks: A novel approach. In Proc. of IEEE SPAWC, 2010.
X. He, H. Dai, and P. Ning. HMM-based malicious user detection for robust collaborative spectrum sensing. IEEE Journal on Selected Areas in Communications, 31 (11): 2196–2208, 2013.
L. E. Baum, T. Petrie, G. Soules, and N. Weiss. A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. The Annals of Mathematical Statistics, 41 (1): 164–171, 1970.
L. Rabiner and B.-H. Juang. Fundamentals of Speech Recognition. Prentice hall, 1993.
A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society. Series B (Methodological), pages 1–38, 1977.
R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification. Wiley-Interscience, 2012.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
He, X., Dai, H. (2018). Case Study II: HMM-Based Byzantine Attack Detection. In: Adversary Detection For Cognitive Radio Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-75868-8_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-75868-8_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75867-1
Online ISBN: 978-3-319-75868-8
eBook Packages: EngineeringEngineering (R0)