Advanced SearchSearch Tips
Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks
Khan, Muhammad Sajjad; Koo, Insoo;
  PDF(new window)
In cognitive radios, spectrum sensing plays an important role in accurately detecting the presence or absence of a licensed user. However, the intervention of malicious users (MUs) degrades the performance of spectrum sensing. Such users manipulate the local results and send falsified data to the data fusion center; this process is called spectrum sensing data falsification (SSDF). Thus, MUs degrade the spectrum sensing performance and increase uncertainty issues. In this paper, we propose a method based on the Hausdorff distance and a similarity measure matrix to measure the difference between the normal user evidence and the malicious user evidence. In addition, we use the Dempster-Shafer theory to combine the sets of evidence from each normal user evidence. We compare the proposed method with the k-means and Jaccard distance methods for malicious user detection. Simulation results show that the proposed method is effective against an SSDF attack.
Cognitive radio;Dempster-Shafer evidence theory;Hausdorff distance;Spectrum sensing data falsification (SSDF);
 Cited by
Federal Communications Commission, Spectrum Policy Task Force (ET Docket No. 02-135). Washington, DC: Federal Communications Commission, 2002.

A. Ghasemi and E. S. Sousa, “Collaborative spectrum sensing for opportunistic access in fading environments,” in Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2005), Baltimore, MD, pp. 131-136, 2005.

J. Li, Z. Feng, Z. Feng, and P. Zhang, “A survey of security issues in cognitive radio networks,” China Communications, vol. 12, no. 3, pp. 132-150, 2015. crossref(new window)

R. Chen, J. M. Park, and K. Bian, “Robust distributed spectrum sensing in cognitive radio networks,” in Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008), Phoenix, AZ, pp. 1876-1884, 2008.

A. W. Min, K. G. Shin, and X. Hu, “Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation,” IEEE transactions on Mobile Computing, vol. 10, no. 10, pp. 1434-1447, 2011. crossref(new window)

N. Mokari, S. Parsaeefard, H. Saeedi, and P. Azmi, “Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users,” IEEE Transactions on Wireless Communications, vol. 13, no. 2, pp. 1058-1073, 2014. crossref(new window)

S. Liu and B. Hu, “Analysis of sensing efficiency for cooperative spectrum sensing with malicious users in cognitive radio networks,” IEEE Communications Letters, vol. 18, no. 9, pp. 1645-1648, 2014. crossref(new window)

E. Soltanmohammadi and M. Naraghi-Pour, “Fast detection of malicious behavior in cooperative spectrum sensing,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 3, pp. 377-386, 2014. crossref(new window)

A. U. Aisha, J. Qadir, and A. Baig, “Mitigating the effect of malicious users in cognitive networks,” in Proceedings of 2013 11th International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, pp. 7-12, 2013.

C. Chen, M. Song, C. Xin, and M. Alam, “A robust malicious user detection scheme in cooperative spectrum sensing,” in Proceedings of 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, pp. 4856-4861, 2012.

Q. Peng, K. Zeng, W. Jun, and S. Li, “A distributed spectrum sensing scheme based on credibility and evidence theory in cognitive radio context,” in Proceedings of IEEE 17th international symposium on Personal, Indoor and Mobile Radio Communications, Helsinki, pp. 1-5, 2006.

N. Nguyen-Thanh and I. Koo, “An enhanced cooperative spectrum sensing scheme based on evidence theory and reliability source evaluation in cognitive radio context,” IEEE Communications Letters, vol. 13, no. 7, pp. 492-494, 2009. crossref(new window)

M. Ghaznavi and A. Jamshidi, “A reliable spectrum sensing method in the presence of malicious sensors in distributed cognitive radio network,” IEEE Sensors Journal, vol. 15, no. 3, pp.1810-1816, 2015.

N. Nguyen-Thanh and I. Koo, “A robust secure cooperative spectrum sensing scheme based on evidence theory and robust statistics in cognitive radio,” IEICE Transactions on Communications, vol. 92, no. 12, pp. 3644-3652, 2009. crossref(new window)

J. Wang, S. Feng, Q. Wu, X. Zheng, Y. Xu, and G. Ding, “A robust cooperative spectrum sensing scheme based on Dempster-Shafer theory and trustworthiness degree calculation in cognitive radio networks,” EURASIP Journal on Advances in Signal Processing, vol. 2014, 1-12, 2014. crossref(new window)

J. Wang and I. R. Chen, “Trust-based data fusion mechanism design in cognitive radio networks,” in Proceedings of 2014 IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, pp. 53-59, 2014.

Y. Han, Q. Chen, and J. X. Wang, “An enhanced DS theory cooperative spectrum sensing algorithm against SSDF attack,” in Proceedings of 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), Yokohama, Japan, pp. 1-5, 2012.

M. S. Khan and I. Koo, “An enhanced cooperative spectrum sensing scheme based on new rule of combining evidences in cognitive radio,” in Ubiquitous Computing Application and Wireless Sensor: UCAWSN-14. Heidelberg: Springer, pp. 77-87, 2015.

J. Diaz, M. Rifqi, and B. Bouchon-Meunier, “A similarity measure between basic belief assignments,” in Proceedings of 2006 9th International Conference on Information Fusion, Florence, Italy, pp. 1-6, 2006.

F. Hausdorff, Set Theory, 1st ed. New York, NY: Chelsea Publishing, 1957.