Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks

Khan, Muhammad Sajjad;Koo, Insoo

  • 투고 : 2015.02.02
  • 심사 : 2015.04.28
  • 발행 : 2015.06.30


In cognitive radios, spectrum sensing plays an important role in accurately detecting the presence or absence of a licensed user. However, the intervention of malicious users (MUs) degrades the performance of spectrum sensing. Such users manipulate the local results and send falsified data to the data fusion center; this process is called spectrum sensing data falsification (SSDF). Thus, MUs degrade the spectrum sensing performance and increase uncertainty issues. In this paper, we propose a method based on the Hausdorff distance and a similarity measure matrix to measure the difference between the normal user evidence and the malicious user evidence. In addition, we use the Dempster-Shafer theory to combine the sets of evidence from each normal user evidence. We compare the proposed method with the k-means and Jaccard distance methods for malicious user detection. Simulation results show that the proposed method is effective against an SSDF attack.


Cognitive radio;Dempster-Shafer evidence theory;Hausdorff distance;Spectrum sensing data falsification (SSDF)


  1. J. Wang and I. R. Chen, “Trust-based data fusion mechanism design in cognitive radio networks,” in Proceedings of 2014 IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, pp. 53-59, 2014.
  2. M. Ghaznavi and A. Jamshidi, “A reliable spectrum sensing method in the presence of malicious sensors in distributed cognitive radio network,” IEEE Sensors Journal, vol. 15, no. 3, pp.1810-1816, 2015.
  3. N. Nguyen-Thanh and I. Koo, “A robust secure cooperative spectrum sensing scheme based on evidence theory and robust statistics in cognitive radio,” IEICE Transactions on Communications, vol. 92, no. 12, pp. 3644-3652, 2009.
  4. J. Wang, S. Feng, Q. Wu, X. Zheng, Y. Xu, and G. Ding, “A robust cooperative spectrum sensing scheme based on Dempster-Shafer theory and trustworthiness degree calculation in cognitive radio networks,” EURASIP Journal on Advances in Signal Processing, vol. 2014, 1-12, 2014.
  5. Y. Han, Q. Chen, and J. X. Wang, “An enhanced DS theory cooperative spectrum sensing algorithm against SSDF attack,” in Proceedings of 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), Yokohama, Japan, pp. 1-5, 2012.
  6. M. S. Khan and I. Koo, “An enhanced cooperative spectrum sensing scheme based on new rule of combining evidences in cognitive radio,” in Ubiquitous Computing Application and Wireless Sensor: UCAWSN-14. Heidelberg: Springer, pp. 77-87, 2015.
  7. S. Liu and B. Hu, “Analysis of sensing efficiency for cooperative spectrum sensing with malicious users in cognitive radio networks,” IEEE Communications Letters, vol. 18, no. 9, pp. 1645-1648, 2014.
  8. J. Diaz, M. Rifqi, and B. Bouchon-Meunier, “A similarity measure between basic belief assignments,” in Proceedings of 2006 9th International Conference on Information Fusion, Florence, Italy, pp. 1-6, 2006.
  9. F. Hausdorff, Set Theory, 1st ed. New York, NY: Chelsea Publishing, 1957.
  10. N. Mokari, S. Parsaeefard, H. Saeedi, and P. Azmi, “Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users,” IEEE Transactions on Wireless Communications, vol. 13, no. 2, pp. 1058-1073, 2014.
  11. E. Soltanmohammadi and M. Naraghi-Pour, “Fast detection of malicious behavior in cooperative spectrum sensing,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 3, pp. 377-386, 2014.
  12. A. U. Aisha, J. Qadir, and A. Baig, “Mitigating the effect of malicious users in cognitive networks,” in Proceedings of 2013 11th International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, pp. 7-12, 2013.
  13. C. Chen, M. Song, C. Xin, and M. Alam, “A robust malicious user detection scheme in cooperative spectrum sensing,” in Proceedings of 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, pp. 4856-4861, 2012.
  14. Q. Peng, K. Zeng, W. Jun, and S. Li, “A distributed spectrum sensing scheme based on credibility and evidence theory in cognitive radio context,” in Proceedings of IEEE 17th international symposium on Personal, Indoor and Mobile Radio Communications, Helsinki, pp. 1-5, 2006.
  15. J. Li, Z. Feng, Z. Feng, and P. Zhang, “A survey of security issues in cognitive radio networks,” China Communications, vol. 12, no. 3, pp. 132-150, 2015.
  16. N. Nguyen-Thanh and I. Koo, “An enhanced cooperative spectrum sensing scheme based on evidence theory and reliability source evaluation in cognitive radio context,” IEEE Communications Letters, vol. 13, no. 7, pp. 492-494, 2009.
  17. Federal Communications Commission, Spectrum Policy Task Force (ET Docket No. 02-135). Washington, DC: Federal Communications Commission, 2002.
  18. A. Ghasemi and E. S. Sousa, “Collaborative spectrum sensing for opportunistic access in fading environments,” in Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2005), Baltimore, MD, pp. 131-136, 2005.
  19. R. Chen, J. M. Park, and K. Bian, “Robust distributed spectrum sensing in cognitive radio networks,” in Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008), Phoenix, AZ, pp. 1876-1884, 2008.
  20. A. W. Min, K. G. Shin, and X. Hu, “Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation,” IEEE transactions on Mobile Computing, vol. 10, no. 10, pp. 1434-1447, 2011.


연구 과제번호 : 자동차·조선 전자융합기술 사업단