Skip to main content

Case Study II: HMM-Based Byzantine Attack Detection

  • Chapter
  • First Online:
Adversary Detection For Cognitive Radio Networks

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 311 Accesses

Abstract

Most of the existing defense schemes against the Byzantine attack discussed in Chap. 3 either assume that the underlying spectrum states at different timeslots are independent or they only focus on the measurements collected in a single timeslot. Nonetheless, for many practical scenarios, the activities of the PUs and the induced spectrum states often follow a Markov process, and hence the spectrum sensing behaviors of the SUs may be better characterized by the HMM. Under this modeling, a novel HMM-based Byzantine attack detection technique can be developed to enforce the robustness of collaborative spectrum sensing. To illustrate this, the HMM-based spectrum sensing behavioral model is presented first, and based on which, the sought-after multi-HMM inference algorithm is introduced. Then, the overall HMM-based Byzantine attack detection scheme is demonstrated along with some numerical results to corroborate its effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Note that, in (5.3), the expectation is over the hidden variables q and m.

References

  1. T. Clancy and B. Walker. Predictive dynamic spectrum access. In Proc. of SDR Forum Technical Conference, 2006.

    Google Scholar 

  2. N. Noorshams, M. Malboubi, and A. Bahai. Centralized and decentralized cooperative spectrum sensing in cognitive radio networks: A novel approach. In Proc. of IEEE SPAWC, 2010.

    Google Scholar 

  3. X. He, H. Dai, and P. Ning. HMM-based malicious user detection for robust collaborative spectrum sensing. IEEE Journal on Selected Areas in Communications, 31 (11): 2196–2208, 2013.

    Article  Google Scholar 

  4. L. E. Baum, T. Petrie, G. Soules, and N. Weiss. A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. The Annals of Mathematical Statistics, 41 (1): 164–171, 1970.

    Article  MathSciNet  MATH  Google Scholar 

  5. L. Rabiner and B.-H. Juang. Fundamentals of Speech Recognition. Prentice hall, 1993.

    MATH  Google Scholar 

  6. A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society. Series B (Methodological), pages 1–38, 1977.

    Google Scholar 

  7. R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification. Wiley-Interscience, 2012.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

He, X., Dai, H. (2018). Case Study II: HMM-Based Byzantine Attack Detection. In: Adversary Detection For Cognitive Radio Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-75868-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75868-8_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75867-1

  • Online ISBN: 978-3-319-75868-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics