Defense Against Byzantine Attack in Cognitive Radio Using Isolation Forest

被引:3
|
作者
Mehmuda, Danish [1 ]
Bhagat, Chinmay [1 ]
Patel, Dhrupam [1 ]
Captain, Kamal [1 ]
Parmar, Ashok [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Dept Elect Engn, Surat, India
来源
2023 15TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS, COMSNETS | 2023年
关键词
Cognitive Radio; Cooperative Spectrum Sensing; Byzantine Attack; Anomaly Detection; Isolation Forest;
D O I
10.1109/COMSNETS56262.2023.10041300
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cognitive Radios (CRs) have gained significant popularity due to their ability to harness white spaces opportunistically to improve the spectrum utilization of underutilized spectrum. Cognitive Radio uses cooperative spectrum sensing (CSS) to detect free licensed spectrum. In this work, centralized CSS is explored where secondary users (unlicensed users) sense a band that belongs to the primary user and reports their observations to the fusion center (FC), which takes the final decision to access the channel. With the openness of cognitive radio networks (CRN), there exist numerous attacks which can lead to various security threats in CR. One such attack is the Byzantine attack, also known as the spectrum sensing data falsification (SSDF) attack. This paper proposes an isolation forest-based anomaly detection algorithm for detecting attackers in the CRN. Various simulations are carried out to show the effectiveness of the proposed algorithm in detecting malicious users in different attack scenarios.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard
    Alahmadi, Ahmed
    Abdelhakim, Mai
    Ren, Jian
    Li, Tongtong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) : 772 - 781
  • [42] Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach
    Wu, Yongle
    Wang, Beibei
    Liu, K. J. Ray
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [43] COUNTERING BYZANTINE ATTACKS IN COGNITIVE RADIO NETWORKS
    Rawat, Ankit Singh
    Anand, Priyank
    Chen, Hao
    Varshney, Pramod K.
    2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, : 3098 - 3101
  • [44] Gaussian Mixture Model-Based Anomaly Detection for Defense Against Byzantine Attack in Cooperative Spectrum Sensing
    Parmar, Ashok
    Shah, Karan
    Captain, Kamal M.
    Lopez-Benitez, Miguel
    Patel, Jignesh R.
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2024, 10 (02) : 499 - 509
  • [45] Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks
    Nguyen-Thanh, Nhan
    Ciblat, Philippe
    Pham, Anh T.
    Nguyen, Van-Tam
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (09) : 4981 - 4993
  • [46] Defense Against Spectrum Sensing Data Falsification Attacker in Cognitive Radio Networks
    Yadav, Kuldeep
    Roy, Sanjay Dhar
    Kundu, Sumit
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (02) : 849 - 862
  • [47] Defense Against Spectrum Sensing Data Falsification Attacker in Cognitive Radio Networks
    Kuldeep Yadav
    Sanjay Dhar Roy
    Sumit Kundu
    Wireless Personal Communications, 2020, 112 : 849 - 862
  • [48] Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks
    Feng, Jingyu
    Zhang, Yuqing
    Lu, Guangyue
    Zheng, Wenxiu
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3157 - 3166
  • [49] WELFARISM - A DEFENSE AGAINST SEN ATTACK
    NG, YK
    ECONOMIC JOURNAL, 1981, 91 (362): : 527 - 530
  • [50] Antibodies for defense against biological attack
    Arturo Casadevall
    Nature Biotechnology, 2002, 20 : 114 - 114