Secure Cooperative Spectrum Sensing and Access Against Intelligent Malicious Behaviors

被引:0
|
作者
Wang, Wei [1 ]
Chen, Lin [2 ]
Shin, Kang G. [3 ]
Duan, Lingjie [4 ]
机构
[1] Zhejiang Univ, Dept Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[2] Univ Paris 11, LRI, F-91405 Orsay, France
[3] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[4] Singapore Univ Technol & Design, Engn Syst & Design Pillar, Singapore, Singapore
关键词
COGNITIVE RADIO;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Sensing falsification is a key security problem in cooperative spectrum sensing for cognitive radio networks. Most previous approaches assume that malicious users only cheat in their sensing reports following a predefined rule. However, some malicious users usually act intelligently to strategically adjust their malicious behavior according to their objectives and the network's defense schemes. The existing schemes cannot resist the malicious behaviors of intelligent malicious users (IMUs) without long-term collection of information on their reputation. In this paper, we construct a moral hazard principal-agent framework and design an incentive compatible mechanism to thwart the malicious behaviors of rational and irrational IMUs. We find that neither spectrum sensing nor spectrum access alone can prevent the malicious behavior without any information on users' reputation. According to the analysis of malicious behavior resistance methods, we propose a joint spectrum sensing and access mechanism to optimally prevent the IMUs from sensing falsification. Our evaluation results show that the proposed mechanism achieves almost the same performance as the ideal case with perfect sensing.
引用
收藏
页码:1267 / 1275
页数:9
相关论文
共 50 条
  • [41] Goodness-of-Fit-based Malicious User Detection in Cooperative Spectrum Sensing
    Noh, Gosan
    Lim, Sungmook
    Lee, Seokwon
    Hong, Daesik
    2012 IEEE VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2012,
  • [42] A Reputation-Based Cooperative Spectrum Sensing in the Presence of Malicious Byzantine Users
    Benedetto, F.
    Coronas, P.
    Giunta, G.
    Tedeschi, A.
    2018 IEEE 87TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2018,
  • [43] Differential Evolution Based Reliable Cooperative Spectrum Sensing in the Presence of Malicious Users
    Gul, Noor
    Qureshi, Ijaz Mansoor
    Khan, Muhammad Sajjad
    Elahi, Atif
    Akbar, Sadiq
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) : 123 - 147
  • [44] A Theoretical Analysis of Asymptotical Performance of Cooperative Spectrum Sensing in the Presence of Malicious Users
    Benedetto, Francesco
    Giunta, Gaetano
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (03) : 380 - 383
  • [45] Cooperative spectrum sensing method considering anti camouflage SSDF malicious attacks
    Qi X.
    Qin F.
    Liu L.
    Liu, Lifang (LfLiu@xidian.edu.cn), 1600, Science Press (43): : 86 - 91and159
  • [46] Differential Evolution Based Reliable Cooperative Spectrum Sensing in the Presence of Malicious Users
    Noor Gul
    Ijaz Mansoor Qureshi
    Muhammad Sajjad Khan
    Atif Elahi
    Sadiq Akbar
    Wireless Personal Communications, 2020, 114 : 123 - 147
  • [47] Cooperative spectrum sensing for cognitive radio networks in the presence of smart malicious users
    Haghighat, Maryam
    Sadough, Seyed Mohammad Sajad
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2014, 68 (06) : 520 - 527
  • [48] Defending Against Byzantine Attacks in CRNs: PCA-Based Malicious User Detection and Weighted Cooperative Spectrum Sensing
    Chouhan, Ankit
    Parmar, Ashok
    Captain, Kamal
    Lopez-Benitez, Miguel
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2024, 13 (05) : 1488 - 1492
  • [49] Research on Distributed Cooperative Intelligent Spectrum Sensing of UAV Cluster
    Chi, Wensheng
    Wang, Hai
    Xie, Wenjun
    Zhang, Peng
    Ru, Le
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [50] Achieving Secure Spectrum Sensing in Presence of Malicious Attacks Utilizing Unsupervised Machine Learning
    Li, Yang
    Peng, Qihang
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 174 - 179