Abstract
Cognitive Radio Networks (CRN) was proposed to improve the utilization of wireless spectrum resources. However, it is susceptible to various security attacks like any other wireless network. CRN technology allows secondary users (SU) to opportunistically utilize the idle spectrum while avoiding interfering with primary users (PU). Spectrum sensing is a key characteristic of this technology and it is the main enabling functionality in facilitating the utilization of free channels by PUs and SUs. Unfortunately, malicious users can interfere with either the PUs or SUs. Spectrum Sensing Data Falsification (SSDF) attack is one of the major attacks in CRN which result in incorrect wrong spectrum access decisions being made which result in interference. There is therefore a need to investigate this attack and design robust SSDF mitigation schemes. In this study, we investigate different approaches to prevent or mitigate SSDF attack and evaluate comparative results of two best mitigation schemes in literature and make recommendations for future research. Three metrics were used for evaluation. These are: missed detection, success and false alarm probabilities which were used to evaluate the performance of the schemes. It is shown though MATLAB simulation results that extreme studentized cooperative consensus spectrum sensing performs better compared to the reputation-based and majority ruling scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cordeiro, C., Challapali, K., Birru, D.: IEEE 802.22: the first worldwide wireless standard based on cognitive radios. In: First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005, pp. 328–337. IEEE (2005)
Mitola, J.: Cognitive radio for flexible mobile multimedia communications. In: 1999 IEEE International Workshop on Mobile Multimedia Communications (MoMuC 1999) (Cat. No. 99EX384), pp. 3–10. IEEE (1999)
Commission, F.C.: In the Matter of Unlicensed Operation in the TV Broadcast Bands and Additional Spectrum for Unlicensed Devices Below 900 MHz and in the 3 GHz band. Second Report and Order and Memorandum Opinion and Order FCC 08-260. Washington, D.C. (2008)
https://stakeholders.ofcom.org.uk/binaries/consultations/cog-nitive/statement/statement.pdf
Fragkiadakis, A.G., Tragos, E.Z., Askoxylakis, I.G.: A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun. Surv. Tutorials 15, 428–445 (2012)
Ngomane, I., Velempini, M., Dlamini, V.: Detection and mitigation of the spectrum sensing data falsification attack in cognitive radio Ad Hoc networks. In: 2018 Conference on Information Communications Technology and Society (ICTAS). Durban, South Africa (2018)
Mapunya, S., Velempini, M.: The design of byzantine attack mitigation scheme in cognitive radio ad-hoc networks. In: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), pp. 1–4. IEEE (2018)
Rawat, A.S., Anand, P., Chen, H., Varshney, P.K.: Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks. IEEE Trans. Signal Process. 59, 774–786 (2010)
Chen, C., Song, M., Xin, C.: CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks. Wireless Netw. 20(8), 2521–2528 (2014). https://doi.org/10.1007/s11276-014-0758-2
Chen, R., Park, J.-M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26, 25–37 (2008)
Limbasiya, T., Das, D., Yadav, R.N.: A Reputation-based trust management model in multi-hop cognitive radio networks. In: Sa, P.K., Bakshi, S., Hatzilygeroudis, I.K., Sahoo, M.N. (eds.) Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th ICACNI 2017, Volume 2, pp. 183–192. Springer Singapore, Singapore (2018). https://doi.org/10.1007/978-981-10-8636-6_20
Akyildiz, I.F., Lo, B.F., Balakrishnan, R.: Cooperative spectrum sensing in cognitive radio networks: a survey. Phys. Commun. 4(1), 40–62 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Mapunya, S., Makgolane, B., Velempini, M. (2022). Investigating the Effectiveness of Spectrum Sensing Data Falsification Attacks Defense Mechanisms in Cognitive Radio Ad Hoc Networks. In: Bao, W., Yuan, X., Gao, L., Luan, T.H., Choi, D.B.J. (eds) Ad Hoc Networks and Tools for IT. ADHOCNETS TridentCom 2021 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 428. Springer, Cham. https://doi.org/10.1007/978-3-030-98005-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-98005-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-98004-7
Online ISBN: 978-3-030-98005-4
eBook Packages: Computer ScienceComputer Science (R0)