PATTERN BASED ANOMALOUS USER DETECTION IN COGNITIVE RADIO NETWORKS

被引:0
|
作者
Rajasegarar, Sutharshan [1 ]
Leckie, Christopher [1 ]
Palaniswami, Marimuthu [2 ]
机构
[1] Univ Melbourne, Natl ICT Australia Victoria, Dept Comp & Informat Syst, Melbourne, Vic, Australia
[2] Univ Melbourne, Dept Elect & Elect Engn, Melbourne, Vic, Australia
基金
澳大利亚研究理事会;
关键词
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Cognitive radio (CR) provides the ability to sense the range of frequencies (spectrum) that are not utilized by the incumbent user (primary user) and to opportunistically use the unoccupied spectrum in a heterogeneous environment. This can use a collaborative spectrum sensing approach to detect the spectrum holes. However, this nature of the collaborative mechanism is vulnerable to security attacks and faulty observations communicated by the opportunistic users (secondary users). Detecting such malicious users in CR networks is challenging as the pattern of malicious behavior is unknown apriori. In this paper we present an unsupervised approach to detect those malicious users, utilizing the pattern of their historic behavior. Our evaluation reveals that the proposed scheme effectively detects the malicious data in the system and provides a robust framework for CR to operate in this environment.
引用
收藏
页码:5605 / 5609
页数:5
相关论文
共 50 条
  • [1] Cooperative Detection for Primary User in Cognitive Radio Networks
    Zhu, Jia
    Zou, Yulong
    Zheng, Baoyu
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2009,
  • [2] Cooperative Detection for Primary User in Cognitive Radio Networks
    Jia Zhu
    Yulong Zou
    Baoyu Zheng
    [J]. EURASIP Journal on Wireless Communications and Networking, 2009
  • [3] Primary User Traffic Pattern Based Opportunistic Spectrum Handoff in Cognitive Radio Networks
    Arshid, Kaleem
    Hussain, Iftikhar
    Bashir, Muhammad Khawar
    Naseem, Shahid
    Ditta, Allah
    Mian, Natash Ali
    Zahid, Misha
    Khan, Israr Ali
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (05):
  • [4] Coalition Formation Based Malicious User Detection Scheme in Cognitive Radio Networks
    Huang, Xiaoge
    Chen, Liping
    Chen, Qianbin
    Shen, Bin
    [J]. 2015 IEEE 26TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2015, : 1415 - 1419
  • [5] Primary User Detection in Cognitive Radio Networks Through Quickest Detection
    Khan, Muhammad Sajjad
    Koo, Insoo
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 1 - 5
  • [6] Detection of PUE Attacks in Cognitive Radio Networks Based on Signal Activity Pattern
    Xin, ChunSheng
    Song, Min
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (05) : 1022 - 1034
  • [7] iDetection: Intelligent Primary User Detection for Cognitive Radio Networks
    Ejaz, Waleed
    Hasan, Najam Ul
    Kim, Hyung Seok
    [J]. 2012 6TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST), 2012, : 153 - 157
  • [8] Error Detection of Malicious User Attack in Cognitive Radio Networks
    Armi, N.
    Gharibi, W.
    Khan, W. Z.
    Zangoti, H.
    Rizvi, S.
    Wael, C.
    [J]. 2017 INTERNATIONAL CONFERENCE ON RADAR, ANTENNA, MICROWAVE, ELECTRONICS, AND TELECOMMUNICATIONS (ICRAMET), 2017, : 89 - 92
  • [9] Asymptotically optimum detection of primary user in cognitive radio networks
    Taherpour, A.
    Norouzi, Y.
    Nasiri-Kenari, M.
    Jamshidi, A.
    Zeinalpour-Yazdi, Z.
    [J]. IET COMMUNICATIONS, 2007, 1 (06) : 1138 - 1145
  • [10] Coalition based Optimization of Resource Allocation with Malicious User Detection in Cognitive Radio Networks
    Huang, Xiaoge
    Chen, Liping
    Chen, Qianbin
    Shen, Bin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (10): : 4661 - 4680