Skip to main content

Abstract

In cognitive radio networks, the cooperation of different network entities holds great promise for attaining high-precision spectrum sensing decisions. It makes it possible for network users to cooperatively share sensing measurements to track the primary spectrum occupancy. However, this has made it easier for hostile secondary users (SUs) to launch a variety of attacks or interference into the system by sending false observations from local sensing. Our proposal is based on two techniques of detecting anomalies in spectrum data to inform whether there exists a malicious user (MU) or not. These techniques are the partial periodic pattern mining (PPPM) and the moving average time series (MATS) anomaly detection which compare the power allocation factors (PAFs) of the user signals both over time and in real time. An anomaly detection scheme combining the two techniques is presented and analyzed. The results indicate that combining the MATS and the PPPM techniques results in a balance between sensitivity to variations in PAF, specificity in detecting the true anomalies and reliability in anomaly detection. The proposed technique has good precision and F1 score performance when K = 2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Chege, T. Walingo, Energy efficient resource allocation for uplink hybrid power domain sparse code nonorthogonal multiple access heterogeneous networks with statistical channel estimation. Trans. Emerg. Tel. Tech. 32, e4185 (2021). https://doi.org/10.1002/ett.4185

    Article  Google Scholar 

  2. G. Sharma, R. Sharma, A review on recent advances in spectrum sensing, energy efficiency and security threats in cognitive radio network, in 2015 International Conference on Microwave, Optical and Communication Engineering (ICMOCE), (Bhubaneswar, 2015), pp. 114–117. https://doi.org/10.1109/ICMOCE.2015.7489704

  3. A.S. Hamood, S.B. Sadkhan, Cognitive radio network security status and challenges, in 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), (Baghdad, 2017), pp. 1–6. https://doi.org/10.1109/NTICT.2017.7976105

  4. H. Pirayesh, H. Zeng, Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey. IEEE Commun Surv Tutor 24(2), 767–809 (2022). https://doi.org/10.1109/COMST.2022.3159185

    Article  MATH  Google Scholar 

  5. D.K. Jasim, S.B. Sadkhan, Cognitive radio network: Security and reliability trade-off - status, challenges, and future trend, in 2021 1st Babylon International Conference on Information Technology and Science (BICITS), (Babil, 2021), pp. 149–153. https://doi.org/10.1109/BICITS51482.2021.9509929

  6. N. Sureka, K. Gunaseelan, Detection & Defense against primary user emulation attack in dynamic cognitive radio networks, in 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), (Chennai, 2019), pp. 505–510. https://doi.org/10.1109/ICONSTEM.2019.8918819

  7. S. Hossain, S. Miah, Machine learning-based malicious user detection for reliable cooperative radio spectrum sensing in cognitive radio-internet of things. Machine Learning with Applications 5, 100052 (2021). https://doi.org/10.1016/j.mlwa.2021.100052

    Article  MATH  Google Scholar 

  8. V. Ponnusamy, K. Kottursamy, T. Karthick, B. Mukeshkrishnan, D. Malathi, T. Ahanger, Primary user emulation attack mitigation using neural network. Comput. Electr. Eng. 88, 106849 (2020). https://doi.org/10.1016/j.compeleceng.2020.106849

    Article  Google Scholar 

  9. J. Wu, Y. Yu, H. Zhu, T. Song, J. Hu, Cost-benefit tradeoff of byzantine attack in cooperative Spectrum sensing. IEEE Syst. J. 14(2), 2532–2543 (2020). https://doi.org/10.1109/JSYST.2019.2952395

    Article  MATH  Google Scholar 

  10. T.Y. Alkhamees, L.B. Milstein, Impact of sharing disruption in MC CR-NOMA. IEEE Access 11, 82871–82881 (2023). https://doi.org/10.1109/ACCESS.2023.3300659

    Article  MATH  Google Scholar 

  11. V.N. Vo et al., Outage probability minimization in secure NOMA cognitive radio systems with UAV relay: A machine learning approach. IEEE Trans. Cognit. Commun. Networking 9(2), 435–451 (2023). https://doi.org/10.1109/TCCN.2022.3226184

    Article  MATH  Google Scholar 

  12. P. Yan et al., EH cognitive network with NOMA: Perspective on impact of passive and active eavesdropping. IEEE Internet Things J. 11(3), 5050–5062 (2024). https://doi.org/10.1109/JIOT.2023.3301631

    Article  MATH  Google Scholar 

  13. S. Xia, X. Tao, N. Li, S. Wang, Malicious user detection in non-orthogonal multiple access based on Spectrum analysis. IEEE Signal Process Lett. 27, 1390–1394 (2020). https://doi.org/10.1109/LSP.2020.3012826

    Article  MATH  Google Scholar 

  14. Q. Dong, Z. Yang, Y. Chen, X. Li, K. Zeng, Anomaly detection in cognitive radio networks exploiting singular Spectrum analysis, in Computer Network Security. MMM-ACNS 2017, Lecture Notes in Computer Science(), ed. by J. Rak, J. Bay, I. Kotenko, L. Popyack, V. Skormin, K. Szczypiorski, vol. 10446, (Springer, Cham, 2017). https://doi.org/10.1007/978-3-319-65127-9_20

    Chapter  MATH  Google Scholar 

  15. S.M.N. Uddin, N. Mansoor, M. Rahman, N. Mohammed, S. Hossain, A framework for event anomaly detection in cognitive radio based smart community, in International Workshop on Computational Intelligence (IWCI), vol. 2016, (Dhaka, 2016), pp. 148–152. https://doi.org/10.1109/IWCI.2016.7860356

  16. A. Toma, A. Krayani, L. Marcenaro, Y. Gao, C.S. Regazzoni, Deep learning for spectrum anomaly detection in cognitive mmWave radios, in IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 2020, (London, 2020), pp. 1–7. https://doi.org/10.1109/PIMRC48278.2020.9217240

  17. L. Lopez-Lopez, Á.G. Andrade, G. Galaviz, Cooperative spectrum sensing based on Anomaly detection and K nearest neighbors, in 2022 IEEE Future Networks World Forum (FNWF), vol. 2022, (Montreal), pp. 238–242. https://doi.org/10.1109/FNWF55208.2022.00049

  18. A. Parmar, K. Shah, K.M. Captain, M. López-Benítez, J.R. Patel, Gaussian mixture model-based anomaly detection for defense against byzantine attack in cooperative Spectrum sensing. IEEE Trans. Cognit. Commun. Networking 10(2), 499–509 (2024). https://doi.org/10.1109/TCCN.2023.3342409

    Article  Google Scholar 

  19. S.M.R. Islam, N. Avazov, O.A. Dobre, K.-s. Kwak, Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges. IEEE Commun Surv Tutor 19(2), 721–742 (2017). https://doi.org/10.1109/COMST.2016.2621116

    Article  Google Scholar 

  20. P. Huang, C.-J. Liu, X. Yang, L. Xiao, J. Chen, Wireless Spectrum occupancy prediction based on partial periodic pattern mining. IEEE Trans Parallel Distrib Syst 25(7), 1925–1934 (2014). https://doi.org/10.1109/TPDS.2013.283

    Article  MATH  Google Scholar 

  21. R.S. Jebur, R.H. Thaher, Multiple FBG wavelength peaks detection using Z-score algorithm, in 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), vol. 2022, (Ankara), pp. 223–226. https://doi.org/10.1109/ISMSIT56059.2022.9932700

  22. A. Malki, E. Atlam, I. Gad, Machine learning approach of detecting anomalies and forecasting time-series of IoT devices. Alex. Eng. J. 61(11), 8973–8986 (2022). https://doi.org/10.1016/j.aej.2022.02.038

    Article  MATH  Google Scholar 

  23. A.A. Sharifi, M.J. Musevi Niya, Defense against SSDF attack in cognitive radio networks: Attack-aware collaborative Spectrum sensing approach. IEEE Commun. Lett. 20(1), 93–96 (2016). https://doi.org/10.1109/LCOMM.2015.2499286

    Article  Google Scholar 

Download references

Acknowledgments

The authors appreciate the support of the Centre for Radio Access and Rural Technologies (CRART) at the University of KwaZulu Natal (UKZN) in producing this work.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Machani, G., Chege, S., Walingo, T. (2025). Anomaly Detection in PD-NOMA Cognitive Radio IoT Networks. In: Woungang, I., Dhurandher, S.K. (eds) The 7th International Conference on Wireless, Intelligent and Distributed Environment for Communication. WIDECOM 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 237. Springer, Cham. https://doi.org/10.1007/978-3-031-80817-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-80817-3_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-80816-6

  • Online ISBN: 978-3-031-80817-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics