Skip to main content

Investigating the Effectiveness of Spectrum Sensing Data Falsification Attacks Defense Mechanisms in Cognitive Radio Ad Hoc Networks

  • Conference paper
  • First Online:
Ad Hoc Networks and Tools for IT (ADHOCNETS 2021, TridentCom 2021)

Abstract

Cognitive Radio Networks (CRN) was proposed to improve the utilization of wireless spectrum resources. However, it is susceptible to various security attacks like any other wireless network. CRN technology allows secondary users (SU) to opportunistically utilize the idle spectrum while avoiding interfering with primary users (PU). Spectrum sensing is a key characteristic of this technology and it is the main enabling functionality in facilitating the utilization of free channels by PUs and SUs. Unfortunately, malicious users can interfere with either the PUs or SUs. Spectrum Sensing Data Falsification (SSDF) attack is one of the major attacks in CRN which result in incorrect wrong spectrum access decisions being made which result in interference. There is therefore a need to investigate this attack and design robust SSDF mitigation schemes. In this study, we investigate different approaches to prevent or mitigate SSDF attack and evaluate comparative results of two best mitigation schemes in literature and make recommendations for future research. Three metrics were used for evaluation. These are: missed detection, success and false alarm probabilities which were used to evaluate the performance of the schemes. It is shown though MATLAB simulation results that extreme studentized cooperative consensus spectrum sensing performs better compared to the reputation-based and majority ruling scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cordeiro, C., Challapali, K., Birru, D.: IEEE 802.22: the first worldwide wireless standard based on cognitive radios. In: First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005, pp. 328–337. IEEE (2005)

    Google Scholar 

  2. Mitola, J.: Cognitive radio for flexible mobile multimedia communications. In: 1999 IEEE International Workshop on Mobile Multimedia Communications (MoMuC 1999) (Cat. No. 99EX384), pp. 3–10. IEEE (1999)

    Google Scholar 

  3. Commission, F.C.: In the Matter of Unlicensed Operation in the TV Broadcast Bands and Additional Spectrum for Unlicensed Devices Below 900 MHz and in the 3 GHz band. Second Report and Order and Memorandum Opinion and Order FCC 08-260. Washington, D.C. (2008)

    Google Scholar 

  4. https://stakeholders.ofcom.org.uk/binaries/consultations/cog-nitive/statement/statement.pdf

  5. Fragkiadakis, A.G., Tragos, E.Z., Askoxylakis, I.G.: A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun. Surv. Tutorials 15, 428–445 (2012)

    Google Scholar 

  6. Ngomane, I., Velempini, M., Dlamini, V.: Detection and mitigation of the spectrum sensing data falsification attack in cognitive radio Ad Hoc networks. In: 2018 Conference on Information Communications Technology and Society (ICTAS). Durban, South Africa (2018)

    Google Scholar 

  7. Mapunya, S., Velempini, M.: The design of byzantine attack mitigation scheme in cognitive radio ad-hoc networks. In: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), pp. 1–4. IEEE (2018)

    Google Scholar 

  8. Rawat, A.S., Anand, P., Chen, H., Varshney, P.K.: Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks. IEEE Trans. Signal Process. 59, 774–786 (2010)

    Article  MathSciNet  Google Scholar 

  9. Chen, C., Song, M., Xin, C.: CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks. Wireless Netw. 20(8), 2521–2528 (2014). https://doi.org/10.1007/s11276-014-0758-2

    Article  Google Scholar 

  10. Chen, R., Park, J.-M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26, 25–37 (2008)

    Article  Google Scholar 

  11. Limbasiya, T., Das, D., Yadav, R.N.: A Reputation-based trust management model in multi-hop cognitive radio networks. In: Sa, P.K., Bakshi, S., Hatzilygeroudis, I.K., Sahoo, M.N. (eds.) Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th ICACNI 2017, Volume 2, pp. 183–192. Springer Singapore, Singapore (2018). https://doi.org/10.1007/978-981-10-8636-6_20

    Chapter  Google Scholar 

  12. Akyildiz, I.F., Lo, B.F., Balakrishnan, R.: Cooperative spectrum sensing in cognitive radio networks: a survey. Phys. Commun. 4(1), 40–62 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sekgoari Mapunya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mapunya, S., Makgolane, B., Velempini, M. (2022). Investigating the Effectiveness of Spectrum Sensing Data Falsification Attacks Defense Mechanisms in Cognitive Radio Ad Hoc Networks. In: Bao, W., Yuan, X., Gao, L., Luan, T.H., Choi, D.B.J. (eds) Ad Hoc Networks and Tools for IT. ADHOCNETS TridentCom 2021 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 428. Springer, Cham. https://doi.org/10.1007/978-3-030-98005-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-98005-4_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-98004-7

  • Online ISBN: 978-3-030-98005-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics