Title :
Counteracting malicious users in cognitive radio networks over imperfect reporting channels
Author :
Jun Du ; Chaocan Xiang ; Daoxing Guo ; Bangning Zhang ; Hailiang Zhang
Author_Institution :
Coll. of Commun. Eng., PLA Univ. of Sci. & Technol., Nanjing, China
Abstract :
Spectrum sensing data falsification (SSDF) attack are serious threats to collaborative spectrum sensing (CSS) of cognitive radio networks (CRNs). In this paper, inspired by EM (Expectation Maximization) method, we propose a scheme to estimate the presences of primary user (PU) and the SUs´ operating point parameters (false alarm and detection probabilities) iteratively. The key features of the proposed scheme is that, by using the estimated SUs´ operating point parameters, the fusion center can estimate the presences of the PU, while the PU´s state information is feedback to enhance the estimation accuracy of SUs´ operating point parameters. Furthermore, our scheme can achieve a powerful capability of eliminating incorrect sensing reports, which can avoid over penalize the honest users who have random errors in reporting channels. The numerical result shows that, the proposed method can achieve higher malicious user detection accuracy than the existing reputation-based schemes, and can thus improve the CSS performance significantly.
Keywords :
cognitive radio; expectation-maximisation algorithm; radio spectrum management; signal detection; wireless channels; CRN; CSS performance; EM method; PU state information; SSDF attack; SU operating point parameters; cognitive radio networks; collaborative spectrum sensing; counteracting malicious user detection accuracy; estimation accuracy enhancement; expectation maximization method; fusion center; imperfect reporting channels; incorrect sensing report elimination; primary user; random errors; reputation-based schemes; spectrum sensing data falsification attack; Accuracy; Collaboration; Estimation; Measurement; Parameter estimation; Resistance; Sensors; Cognitive radio network; collaborative spectrum sensing; expectation maximization algorithm; malicious secondary users´ detection; security;
Conference_Titel :
Wireless Communications and Signal Processing (WCSP), 2014 Sixth International Conference on
Conference_Location :
Hefei
DOI :
10.1109/WCSP.2014.6992078