Exploiting and defending trust models in cooperative spectrum sensing

被引:0
|
作者
David S Jackson
Wanyu Zang
Qijun Gu
Wei Cheng
Meng Yu
机构
[1] Virginia Commonwealth,Department of Computer Science
[2] Texas State University,Department of Computer Science
关键词
Cognitive Radio; Receive Signal Strength; Cognitive Radio Network; Fusion Center; Federal Communication Commission;
D O I
暂无
中图分类号
学科分类号
摘要
Cognitive radios are currently presented as the solution to the ever-increasing spectrum shortage problem. However, their increased capabilities over traditional radios introduce a new dimension of security threats. Cooperative spectrum sensing (CSS) has been proposed as a means to protect cognitive radio networks from the well-known security threats: primary user emulation (PUE) and spectrum sensing data falsification (SSDF). In this paper, we demonstrate a new threat to CSS protocols that rely on sensor reputations, called the Rogue Signal Framing (RSF) intrusion. Rogue signals can be exploited to create the illusion of malicious sensors which leads to the framing of innocent sensors and, consequently, their removal from the shared spectrum sensing. Ultimately, with fewer sensors working together, the spectrum sensing is less robust for making correct spectrum access decisions. The simulation experiments illustrate the impact of RSF intrusions which, in severe cases, shows roughly 40% of sensors removed. To counter the RSF’s impact on the cooperative spectrum sensing (CSS), we introduce a new defense based on cluster analysis and community detection from analyzing the network’s received signal strength (RSS) diversity. Tests show up to 95% damage mitigation to the integrity of sensor reputations, thus retaining the benefits of trust-based CSS protocols.
引用
收藏
相关论文
共 50 条
  • [11] Adaptive Trust Threshold Model Based on Reinforcement Learning in Cooperative Spectrum Sensing
    Xie, Gang
    Zhou, Xincheng
    Gao, Jinchun
    SENSORS, 2023, 23 (10)
  • [12] Regional autonomous security cooperative spectrum sensing method based on trust value
    Chen, Chengxiao
    Qi, Xiaogang
    Cai, Ying
    Zhang, Jiaxin
    IET COMMUNICATIONS, 2023, 17 (14) : 1721 - 1729
  • [13] Exploiting Spectrum Access Ability for Cooperative Spectrum Harvesting
    Ren, Chao
    Zhang, Haijun
    Chen, Jian
    Tellambura, Chintha
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (03) : 1845 - 1857
  • [14] Defending Cooperative Spectrum Sensing From Byzantine Attacks: An Effective Entropy-Based Weighted Algorithm
    Chouhan, Ankit
    Captain, Kamal
    Parmar, Ashok
    Patel, Jignesh
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2023, 12 (12) : 2063 - 2067
  • [15] Energy-Efficient Based On Cluster Selection and Trust Management in Cooperative Spectrum Sensing
    Chkirbene, Zina
    Hasna, Mazen O.
    Hamila, Ridha
    Hamdi, Noureddine
    2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
  • [16] Defend against Collusive SSDF Attack using Trust in Cooperative Spectrum Sensing Environment
    Feng, Jingyu
    Zhang, Yuqing
    Lu, Guangyue
    Zhang, Liang
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1656 - 1661
  • [17] Collaborative Spectrum Sensing with A Stranger: Trust, or Not to Trust?
    Li, Husheng
    Han, Zhu
    2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [18] A Trust-value based Cooperative Spectrum Sensing Algorithm for Mobile Secondary Users
    Wang, Xinyu
    Jia, Min
    Guo, Qing
    Gu, Xuemai
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 1635 - 1639
  • [19] Weighted-Cooperative Spectrum Sensing Scheme using Trust in Cognitive Radio Networks
    Feng, Jingyu
    Lu, Guangyue
    Bao, Zhiqiang
    PROCEEDINGS OF 2012 IEEE 11TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING (ICSP) VOLS 1-3, 2012, : 1693 - 1696
  • [20] Blockchain-Inspired Trust Management in Cognitive Radio Networks with Cooperative Spectrum Sensing
    Mahvash, Mahsa
    Moghim, Neda
    Mahdavi, Mojtaba
    Amiri, Mahdieh
    Shetty, Sachin
    PERVASIVE AND MOBILE COMPUTING, 2025, 106