Skip to main content
Log in

Attack Detection Scheme Against Cooperative Spectrum Sensing Data Falsification on Common Control Channel in Cognitive Radio Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cognitive radio is an intelligent technology designed to help secondary users (SUs) increase their opportunity to access unused spectrum channels while avoiding interference with the primary users. In cognitive radio networks (CRNs), to find the available channels, SUs execute cooperative spectrum sensing and exchange channels-related control information, namely an available channels list (ACL), on a common control channel (CCC) before determining which channels they may transmit. However, some SUs, defined as attackers, could create a security issue by sharing false ACL information with other SUs to increase their own utilization of the available channels, which significantly decreases the performance of CRNs. In this paper, we propose an efficient detection scheme for CCC security to identify any attacker among the cooperating SUs. In the proposed scheme, all SUs share their ACL information on the CCC, with an associated reputation, which is updated according to its own behavior in each cooperation round, to cooperatively identify attackers. An attacker will be excluded from cooperating group with the result that its updated reputation value exceeds a certain threshold. Simulation results show how to further improve the performance of the proposed scheme by choosing optimized thresholds. In addition, we also illustrate that the proposed scheme can achieve considerable performance improvement compared with a attack detection technique COOPON for secure ACL information exchange.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Select Areas in Communications, 23(2), 201–220.

    Article  Google Scholar 

  2. Yuan, Y., Bahl, P., Chandra, R., Moscibroda, T., & Wu, Y. (2007). KNOWS: Cognitive radio networks over white spaces. In Proceedigns of IEEE international symposium on new frontiers in dynamic spectrum access networks (DySPAN) (pp. 416–427).

  3. Xie, S., Liu, Y., & Zhang, Y. (2010). A parallel cooperative spectrum sensing in cognitive radio networks. IEEE Transactions on Vehicular Technology, 59(8), 4079–4092.

    Article  Google Scholar 

  4. Chiang, J. T., Hu, Y. C., & Yadav, P. (2013). Secure cooperative spectrum sensing based on sybil-resilient clustering. In Proceedings of the IEEE global communications conference (GLOBALCOM) (pp. 1075–1081).

  5. Ghurumuruhan, G., & Li, Y. (2007). Cooperative spectrum sensing in cognitive radio: Part II: Multiuser networks. IEEE Transactions on Wireless Communications, 6(6), 2214–2222.

    Article  Google Scholar 

  6. De Domenico, A., Calvanese Strinati, E., & Di Benedetto, M. (2012). A survey on MAC strategies for cognitive radio networks. IEEE Journal on Communications Surveys and Tutorials, 14(1), 21–44.

    Article  Google Scholar 

  7. Jo, M., Han, L. Z., Kim, D., & Peter, H. (2013). Selfish attacks and detection in cognitive radio ad-hoc networks. IEEE Journal on Network, 27(3), 46–50.

    Article  Google Scholar 

  8. Yan, M., Du, L., Huang, L. F., & Xiao, L. (2011). Game-theoretic approach against selfish attacks in cognitive radio networks. In Proceedings of the IEEE/ACIS 10th international conference on computer and information science (ICIS) (pp. 58–61).

  9. MacKenzie, A. B., & Wicker, S. B. (2001). Game theory and the design of self-configuring, adaptive wireless networks. IEEE Journal on Communication Magazine, 39(11), 126–131.

    Article  Google Scholar 

  10. MacKenzie, A. B., & Wicker, S. B. (2003). Stability of multipacket slotted aloha with selfish users and perfect information. In Proceedings of the IEEE computer and communications (Vol. 3, no. 3).

  11. Yu, W., & Liu, K. J. R. (2002). Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Transactions on Mobile Computing, 6(5), 507–521.

    Article  Google Scholar 

  12. Nisan, N., & Ronen, A. (1999). Algorithmic mechanism design. In Proceedings of the thirty-first annual ACM symposium on theory of computing (pp. 129-140).

  13. Howa, K. C., Maa, M., & Qin, Y. (2012). An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors. Computer Networks, 56(7), 2068–2079.

    Article  Google Scholar 

  14. Wang, W. K., Li, H. S., & Letaief, K. B. (2007). Cluster-based cooperative spectrum sensing in cognitive radio systems. In Proceedings of the IEEE international conference on communications (ICC) (pp. 2511–2515).

  15. Wang, W. K., Li, H. S., Sun, Y., & Han, Z. (2009). CatchIt: Detect malicious users in collaborative spectrum sensing. In Proceedings of the IEEE global telecommunications conference (GLOBECOM) (pp. 1–6).

  16. Safdar, G. A., & O‘Neill, M. (2009). Common control channel security framework for cognitive radio networks. In Proceedings of the IEEE 69th vehicular technology conference (pp. 1–5).

  17. Kyasanur, P., & Vaidya, N. H. (2005). Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing, 4(5), 502–516.

    Article  Google Scholar 

  18. Pawelczak, P., Pollin, S., & So, H. S. (2005). Performance analysis of multichannel medium access control algorithms for opportunistic spectrum access. IEEE Transactions on Vehicular Technology, 58(6), 3014–3031.

    Article  Google Scholar 

  19. Ma, L. P., Han, X. F., & Shen, C. C. (2005). Dynamic open spectrum sharing mac protocol for wireless ad hoc networks. In Proceedings of the IEEE international symposium on new frontiers in dynamic spectrum access neworks (DySPAN) (pp. 203–213).

  20. Pawelczak, P., Prasad, V., & Li, X. (2005). Cognitive radio emergency networks–requirements and design. In Proceedings of the IEEE international symposium on new frontiers in dynamic spectrum access neworks (DySPAN) (pp. 601–606).

  21. Konorski, J. (2001). Protection of fairness for multimedia traffic streams in a non-cooperative wireless LAN setting. Lecture notes in computer science protocols for multimedis systems (pp. 116–129).

  22. Konorski, J. (2002). Multiple access in ad-hoc wireless LANs with noncooperative stations. Lecture notes in computer science for networking technologies (pp. 1141–1146).

  23. Zou, Y. X., & Yoo, S. J. (2015). A cooperative attack detection scheme for common control channel security in cognitive radio networks. In The senventh international conference on ubiquitous and future networks (Unpublished but acceptted).

  24. Ding, L., Melodia, T., Batalama, S. N., Matyjas, J. D., & Medley, M. J. (2010). Cross-layer routing and dynamic spectrum allocation in cognitive radio ad hoc networks. IEEE Transaction on Vehicular Technology, 59(4), 1969–1979.

    Article  Google Scholar 

  25. Savas, O., Ahn, G. S., & Deng, J. (2014). Securing cognitive radio networks against belief manipulation attacks via trust management. In Proceedings of the IEEE 2014 international conference on collaboration technologies and system (CTS) (pp. 158–165).

  26. Huang, X. G., Zou, Y. X., Shen, B., & Chen, Q. B. (2014). Dynamic suspicious reputation based collaborative sensing in cognitive radio networks. In Proceedings of the IEEE international symposium on communications and information technologies (ISCIT) (pp. 112–116).

  27. Li, S., Zhu, H. J., Yang, B., Chen, C., & Guan, X. P. (2011). Believe yourself: A user-centric misbehavior detection scheme for secure collaborative spectrum sensing. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1–5).

  28. Rao, S. (2009). Engineering optimization: Theory and practice. New York: Wiley.

    Book  Google Scholar 

  29. Shlens, J. (2007). Notes on Kullback–Leibler divergence and likelihood theory. La Jolla: Systems Neurobiology Laboratory, Salk Institute for Biological Studies.

    Google Scholar 

  30. Hyder, C. S., Grebur, B., Li, X., & Ellison, M. (2014). ARC: Adaptive reputation based clustering against spectrum sensing data falsification attacksD. IEEE Transaction on Mobile Computing, 13(8), 1707–1719.

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (NRF-2014R1A2A2A01002013). This research was supported by the Ministry of Science, ICT and Future Planning (MSIP), Korea, under the Information Technology Research Center (ITRC) Support Program (NIPA-2014-H0301-14-1042) supervised by the National IT Industry Promotion Agency (NIPA).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sang-Jo Yoo.

Appendix 1

Appendix 1

A proper value for the initial penalty parameter \(\gamma ^{(1)}\) plays an important role in implementing the IPF method [28]. Because of the unconstrained minimization of \(\phi (\vec {\lambda }, \gamma ^{(i)})\) is to be carried out for a decreasing sequence of \(\gamma ^{(i)}\), so it might appear that we can avoid an excessive number of minimizations of the function \(\phi\) by choosing a very small value for \(\gamma\). From a computation perspective, it is easier to minimize the unconstrained function \(\phi (\vec {\lambda }, \gamma ^{(i)})\) if \(\gamma ^{(i)}\) is large (according to the DS method). However, as [28] explains, the minimum \(\phi ^{(i)}\) will be farther away from the desired minimum if \(\gamma ^{(i)}\) is large. Thus, a trade-off initial value has to be chosen for the penalty parameter \(\gamma ^{(1)}\). Based on the theoretical analysis given in [28], a value of \(\gamma ^{(1)}\) that makes the value of \(\phi (\vec {\lambda }^{(1)}, \gamma ^{(1)})\) approximately equal to 1.1 to 2.0 times the value of \(f(\vec {\lambda }^{(1)})\) has been found to be quite satisfactory in achieving fast convergence in the procedure. Therefore, with a feasible initial value of \(\vec {\lambda }^{(1)}\), \(\gamma ^{(1)}\) can be taken as,

$$\begin{aligned} \gamma ^{(1)} \simeq (0.1\ {\text {to}}\ 1.0)\frac{f\left(\vec {\lambda }^{(1)}\right)}{\frac{1}{\lambda _1^{(1)}}+\frac{1}{\lambda _2^{(1)}}} \end{aligned}$$

In this paper, we chose the value 0.5 at random. Once the initial value of \(\gamma ^{(1)}\) is chosen, the subsequent value of \(\gamma ^{(i+1)}\) can be taken according to \(\gamma ^{(i+1)}=c_1\gamma ^{(i)}\). Here we set \(c_1 = 0.5\).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zou, Y., Yoo, SJ. Attack Detection Scheme Against Cooperative Spectrum Sensing Data Falsification on Common Control Channel in Cognitive Radio Networks. Wireless Pers Commun 88, 871–896 (2016). https://doi.org/10.1007/s11277-016-3216-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3216-x

Keywords

Navigation