Skip to main content

Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks

  • Conference paper
Security and Privacy in Communication Networks (SecureComm 2011)

Abstract

IEEE 802.22 is the first standard based on the concept of cognitive radio. It recommends collaborative spectrum sensing to avoid the unreliability of individual spectrum sensing while detecting primary user signals. However, it opens an opportunity for attackers to exploit the decision making process by sending false reports. In this paper, we address security issues regarding distributed node sensing in the 802.22 standard and discuss how attackers can modify or manipulate their sensing result independently or collaboratively. This problem is commonly known as spectrum sensing data falsification (SSDF) attack or Byzantine attack. To counter the different attacking strategies, we propose a reputation based clustering algorithm that does not require prior knowledge of attacker distribution or complete identification of malicious users. We compare the performance of our algorithm against existing approaches across a wide range of attacking scenarios. Our proposed algorithm displays a significantly reduced error rate in decision making compared to current methods. It also identifies a large portion of the attacking nodes and greatly minimizes the false detection rate of honest nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, H., Han, Z.: Catching Attackers for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach. In: IEEE Symposium on New Frontiers in Dynamic Spectrum, pp. 1–12 (2010)

    Google Scholar 

  2. Rawat, A.S., Anand, P., Chen, H., Varshney, P.K.: Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks. IEEE Transactions on Signal Processing 59(2), 774–786 (2011)

    Article  MathSciNet  Google Scholar 

  3. Chen, R., Park, J.-M., Bian, K.: Robust Distributed Spectrum Sensing in Cognitive Radio Networks. In: INFOCOM: The 27th Conference on Computer Communications, pp. 1876–1884. IEEE (2008)

    Google Scholar 

  4. Clancy, T.C., Goergen, N.: Security in Cognitive Radio Networks: Threats and Mitigation. In: Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), pp. 1–8 (2008)

    Google Scholar 

  5. Bian, K., Park, J.-M.J.: Security vulnerabilities in IEEE 802.22. In: Proceedings of the 4th Annual International Conference on Wireless Internet, WICON 2008, pp. 9:1–9:9 (2008)

    Google Scholar 

  6. Kaligineedi, P., Khabbazian, M., Bhargava, V.K.: Malicious User Detection in a Cognitive Radio Cooperative Sensing System. IEEE Transactions on Wireless Communications 9, 2488–2497 (2010)

    Article  Google Scholar 

  7. Chen, R., Park, J.-M., Hou, Y.T., Reed, J.H.: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine 46, 50–55 (2008)

    Article  Google Scholar 

  8. Wang, W., Li, H., Sun, Y., Han, Z.: CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing. In: Global Telecommunications Conference, GLOBECOM 2009, pp. 1–6. IEEE (2009)

    Google Scholar 

  9. Akyildiz, I.F., Lee, W.-Y., Vuran, M.C., Mohanty, S.: A survey on spectrum management in cognitive radio networks. IEEE Communications Magazine 46, 40–48 (2008)

    Article  Google Scholar 

  10. Wang, W., Li, H., Sun, Y., Han, Z.: Attack-proof collaborative spectrum sensing in cognitive radio networks. In: 43rd Annual Conference on Information Sciences and Systems (March 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Hyder, C.S., Grebur, B., Xiao, L. (2012). Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds) Security and Privacy in Communication Networks. SecureComm 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 96. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31909-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31909-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31908-2

  • Online ISBN: 978-3-642-31909-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics