Massive SSDF Attackers Identification in Cognitive Radio Networks by Using Consistent Property

被引:7
|
作者
Fu, Yuanhua [1 ,2 ,3 ]
He, Zhiming [2 ]
机构
[1] Xihua Univ, Sch Aeronaut & Astronaut & Engn, Ctr IntelligentAirground IntegratedVehicle & Traf, Minist Educ, Chengdu 610039, Peoples R China
[2] Univ Elect Sci & Technol China UESTC, Guangdong Inst Elect Informat Engn, Dongguan 523808, Peoples R China
[3] UESTC, Shenzhen Inst, Shenzhen 518110, Peoples R China
关键词
Spectrum sensing data falsification attacker identification; inconsistency property analysis; INFERENCE;
D O I
10.1109/TVT.2023.3253865
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To resist probabilistic spectrum sensing data falsification (SSDF) attacks in cognitive radio networks (CRNs), we in this paper propose a simple and effective attacker identification scheme from the perspective of each secondary user's (SU) historical sensing data without any prior knowledge about the strategy of attackers. In the proposed algorithm, the inconsistency property of the historical data within two consecutive sensing slots during a sensing time window is extracted to characterize different attack behaviors. Further, an optimal identification threshold is obtained for each SU and the analytical expressions of identification performance are also derived. Finally, simulation results along with theoretical analysis show the validity of the proposed scheme to defend against massive probabilistic SSDF attacks with low computation cost.
引用
收藏
页码:11058 / 11062
页数:5
相关论文
共 50 条
  • [1] Recognition and elimination of SSDF attackers in cognitive radio networks
    Zardosht, Fatemeh
    Derakhtian, Mostafa
    Jamshidi, Ali
    Eshaghi, Hossein
    [J]. TELECOMMUNICATION SYSTEMS, 2022, 81 (01) : 53 - 66
  • [2] Recognition and elimination of SSDF attackers in cognitive radio networks
    Fatemeh Zardosht
    Mostafa Derakhtian
    Ali Jamshidi
    Hossein Eshaghi
    [J]. Telecommunication Systems, 2022, 81 : 53 - 66
  • [3] A Density-based Clustering Approach to detect Colluding SSDF Attackers in Cognitive Radio Networks
    Taggu, Amar
    Marchang, Ningrinla
    [J]. 2022 37TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2022), 2022, : 709 - 712
  • [4] Detection of Attackers in Cognitive Radio Network Using Optimized Neural Networks
    Ajay, V. P.
    Nesasudha, M.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (01): : 193 - 204
  • [5] Proof of Reputation: A Blockchain-Based Countermeasure to Defend Against Massive SSDF in Cognitive Radio Networks
    Yang, Ning
    Jiang, Hao
    Guo, Daoxing
    Liu, Yuan
    Ding, Guoru
    Chen, Zhen
    Yang, Zhaohui
    [J]. IEEE Communications Letters, 2024, 28 (11) : 2693 - 2697
  • [6] Defense against PUEA and SSDF Attacks in Cognitive Radio Networks
    Chaitanya, D. L.
    Chari, K. Manjunatha
    [J]. PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [7] Performance Analysis of PUEA and SSDF Attacks in Cognitive Radio Networks
    Chaitanya, D. L.
    Chari, K. Manjunatha
    [J]. COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 219 - 225
  • [8] An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks
    Tephillah, S.
    Manickam, J. Martin Leo
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):
  • [9] Mitigating SSDF Attack using K-Medoids Clustering in Cognitive Radio Networks
    Nath, Shikhamoni
    Marchang, Ningrinla
    Taggu, Amar
    [J]. 2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 275 - 282
  • [10] Detection of Collaborative SSDF Attacks using Abnormality Detection Algorithm in Cognitive Radio Networks
    Wang, Mingchen
    Liu, Bin
    Zhang, Chi
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (IEEE ICC), 2013, : 342 - 346