Skip to main content

Identification and Elimination of Abnormal Information in Electromagnetic Spectrum Cognition

  • Conference paper
  • First Online:
  • 622 Accesses

Abstract

The electromagnetic spectrum is an important national strategic resource. Spectrum sensing data falsification (SSDF) is an attack method that destroys cognitive networks and makes them ineffective. Malicious users capture sensory nodes and tamper with data through cyber attacks, and make the cognitive network biased or even completely reversed. In order to eliminate the negative impact caused by abnormal information in spectrum sensing and ensure the desired effect, this thesis starts with the improvement of the performance of cooperative spectrum sensing, and constructs a robust sensing user evaluation reference system. At the same time, considering the dynamic changes of user attributes, the sensory data is identified online. Finally, the attacker identification and elimination algorithm is improved based on the proposed reference system. In addition, this paper verifies the identification performance of the proposed reference system through simulation. The simulation results show that the proposed reference system still maintain a good defense effect even if the proportion of malicious users in the reference is greater than 50%.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Benjamin, R.: Security considerations in communications systems and networks. In: Communications Speech & Vision IEEE Proceedings I, vol. 137, no. 2, pp. 61–72, April 1990

    Google Scholar 

  2. Li, H., Han, Z.: Catch me if you can: an abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Trans. Wirel. Commun. 9(11), 3554–3565 (2010)

    Article  Google Scholar 

  3. Rawat, S., Anand, P., Chen, H., et al.: Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Trans. Signal Process. 59(2), 774–786 (2011)

    Article  MathSciNet  Google Scholar 

  4. Zeng, K., Paweczak, P., Cabri, D.: Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Commun. Lett. 14(3), 226–228 (2010)

    Article  Google Scholar 

  5. Chen, C., Song, M., Xin, C., et al.: A robust malicious user detection scheme in cooperative spectrum sensing. In: Proceedings of the IEEE Global Telecommunication Conference, pp. 4856–4861 (2012)

    Google Scholar 

  6. Penna, F., Sun, Y., Dolecek, L., et al.: Detecting and counteracting statistical attacks in cooperative spectrum sensing. IEEE Trans. Signal Process. 60(4), 1806–1822 (2012)

    Article  MathSciNet  Google Scholar 

  7. Urkowitz, H.: Energy detection of unknown deterministic signals. Proc. IEEE 55(4), 523–531 (1967)

    Article  Google Scholar 

  8. Chen, R., Park, J.M., Bian, K.: Robust distributed spectrum sensing in cognitive radio networks. In: INFOCOM 2008, Phoenix, AZ, 13–18 April 2008

    Google Scholar 

  9. He, X., Dai, H., Ning, P.: A byzantine attack defender in cognitive radio networks: the conditional frequency check. IEEE Trans. Wirel. Commun. 12(5), 2512–2523 (2013)

    Article  Google Scholar 

  10. Solla, S.A., Winther, O.: Optimal perceptron learning: an on-line Bayesian approach. In: Saad, D. (ed.) On-Line Learning in Neural Networks, pp. 379–398. Cambridge University Press, Cambridge (1998)

    Google Scholar 

  11. Noh, G., Lim, S., Lee, S., et al.: Goodness-of-fit-based malicious user detection in cooperative spectrum sensing. In: Proceedings of the 76th IEEE Vehicular Technology Conference, pp. 1–5 (2012)

    Google Scholar 

  12. Althunibat, S., Denise, B.J., Granelli, F.: Identification and punishment policies for spectrum sensing data falsification attackers using delivery-based assessment. IEEE Trans. Veh. Technol. 65(9), 7308–7321 (2016)

    Article  Google Scholar 

  13. Zhao, Y., Song, M., Xin, C.: A weighted cooperative spectrum sensing framework for infrastructure-based cognitive radio networks. Comput. Commun. 2011(34), 1510–1517 (2011)

    Article  Google Scholar 

  14. Jo, M., Han, L., Kim, D.: Selfish attacks and detection in cognitive radio ad-hoc networks. IEEE Network 27(3), 46–50 (2013)

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported by the National Natural Science Foundation of China (61771154), the Fundamental Research Funds for the Central Universities (HEUCFG201830), and the funding of State Key Laboratory of CEMEE (CEMEE2018K0104A).

This paper is also funded by the International Exchange Program of Harbin Engineering University for Innovation-oriented Talents Cultivation.

Meantime, all the authors declare that there is no conflict of interests regarding the publication of this article.

We gratefully thank of very useful discussions of reviewers.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yun Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, H., Wu, R., Han, H., Chen, X., Li, Y., Lin, Y. (2019). Identification and Elimination of Abnormal Information in Electromagnetic Spectrum Cognition. In: Liu, S., Yang, G. (eds) Advanced Hybrid Information Processing. ADHIP 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 279. Springer, Cham. https://doi.org/10.1007/978-3-030-19086-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-19086-6_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-19085-9

  • Online ISBN: 978-3-030-19086-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics