Mitigation of Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks using Trust Based Cooperative Sensing

被引:5
|
作者
Mergu, K. [1 ]
Khan, H. [2 ]
机构
[1] Sri Satya Sai Univ Technol & Med Sci, Dept Elect & Commun Engn, Pachama, Madya Pradesh, India
[2] KL Deemed Univ, Dept Elect & Commun Engn, Guntur, Andhra Pradesh, India
来源
INTERNATIONAL JOURNAL OF ENGINEERING | 2021年 / 34卷 / 06期
关键词
Cognitive Radio; Security Attacks; Spectrum Sensing Data Falsification; Cooperative Spectrum Sensing Primary User; Secondary User;
D O I
10.5829/ije.2021.34.06c.10
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
One of most emerging technology in recent years in the field of wireless communication is the Cognitive Radio (CR) technology, which reduces spectrum scarcity significantly. The main function of CR technology is detecting spectrum holes or unused spectrum of primary users (PUs), also called as licensed users, and assigning this unused spectrum to the secondary users (SUs), also called unlicensed users. As the CR technology is open to every user, there are many security issues such as Primary User Emulsion Attack (PUEA), Jamming Attack, Spectrum Sensing Data Falsification (SSDF) Attack, Lion Attack, and Sink Hole Attack and so on. SSDF attack is the one of major security attack in cognitive radio in which a malicious user sends false data intentionally to the other secondary users. The main aim of the SSDF attack is to disturb the communication between the secondary users or to gain more channel resources. One of the solutions to mitigating SSDF attack is the cooperative spectrum sensing. In this paper, we propose a new algorithm of cooperative sensing based on trust values of secondary users, and compares with the conventional cooperative spectrum sensing with the proposed algorithm. In this algorithm, firstly the CR which is waiting for the channel allocation sense the information and compare the sensing information of other CRs. If any CR's sensing report not matches with the test CR's sensing with in the cluster, it will punish that CR otherwise it will give the reward. This procedure will be repeated for number of cycles. Finally test CR calculates the trust value. Based on the trust value fusion center will take the decision to include or exclude the trusting value of particular CR. The simulation of cooperative sensing also performed in both time variant channel and time invariant (Rayleigh) channel. The authors also compare the three basic hard fusion techniques such as AND, OR, MAJORITY rule.
引用
收藏
页码:1468 / 1474
页数:7
相关论文
共 50 条
  • [1] Mitigation of spectrum sensing data falsification attack using multilayer perception in cognitive radio networks
    Nanjundaswamy, Mahesh Kumar
    Babu, Ane Ashok
    Shet, Sathish
    Selvaraj, Nithya
    Kovelakuntla, Jamal
    ACTA IMEKO, 2022, 11 (01):
  • [2] Probabilistic spectrum sensing data falsification attack in cognitive radio networks
    Ahmadfard, Arash
    Jamshidi, Ali
    Keshavarz-Haddad, Alireza
    SIGNAL PROCESSING, 2017, 137 : 1 - 9
  • [3] Mitigation of Spectrum Sensing Data Falsification Attack (SSDF) in Cognitive Radio Network
    Banerjee S.
    Singh T.
    Singh K.R.
    Journal of The Institution of Engineers (India): Series B, 2022, 103 (04) : 1249 - 1257
  • [4] Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks
    Wan, Runze
    Ding, Lixin
    Xiong, Naixue
    Zhou, Xing
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (09)
  • [5] Joint Spectrum Sensing and Resource Allocation Scheme in Cognitive Radio Networks with Spectrum Sensing Data Falsification Attack
    Chen, Huifang
    Zhou, Ming
    Xie, Lei
    Wang, Kuang
    Li, Jie
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (11) : 9181 - 9191
  • [6] Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks
    Biswas, Rajorshi
    Wu, Jie
    Du, Xiaojiang
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [7] Mitigation of the spectrum sensing data falsifying attack in cognitive radio networks
    Biswas R.
    Wu J.
    Du X.
    Yang Y.
    Cyber-Physical Systems, 2021, 7 (03) : 159 - 178
  • [8] The Detection of the Spectrum Sensing Data Falsification Attack in Cognitive Radio Ad Hoc Networks
    Ngomane, I
    Velempini, M.
    Dlamini, S., V
    2018 CONFERENCE ON INFORMATION COMMUNICATIONS TECHNOLOGY AND SOCIETY (ICTAS), 2018,
  • [9] Robust Algorithm Against Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks
    Althunibat, Saud
    Di Renzo, Marco
    Granelli, Fabrizio
    2014 IEEE 79TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-SPRING), 2014,
  • [10] Mitigating spectrum sensing data falsification attack in ad hoc cognitive radio networks
    Rajkumari, Roshni
    Marchang, Ningrinla
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (02)