Abstract
In cognitive radio networks, the cooperation of different network entities holds great promise for attaining high-precision spectrum sensing decisions. It makes it possible for network users to cooperatively share sensing measurements to track the primary spectrum occupancy. However, this has made it easier for hostile secondary users (SUs) to launch a variety of attacks or interference into the system by sending false observations from local sensing. Our proposal is based on two techniques of detecting anomalies in spectrum data to inform whether there exists a malicious user (MU) or not. These techniques are the partial periodic pattern mining (PPPM) and the moving average time series (MATS) anomaly detection which compare the power allocation factors (PAFs) of the user signals both over time and in real time. An anomaly detection scheme combining the two techniques is presented and analyzed. The results indicate that combining the MATS and the PPPM techniques results in a balance between sensitivity to variations in PAF, specificity in detecting the true anomalies and reliability in anomaly detection. The proposed technique has good precision and F1 score performance when K = 2.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Chege, T. Walingo, Energy efficient resource allocation for uplink hybrid power domain sparse code nonorthogonal multiple access heterogeneous networks with statistical channel estimation. Trans. Emerg. Tel. Tech. 32, e4185 (2021). https://doi.org/10.1002/ett.4185
G. Sharma, R. Sharma, A review on recent advances in spectrum sensing, energy efficiency and security threats in cognitive radio network, in 2015 International Conference on Microwave, Optical and Communication Engineering (ICMOCE), (Bhubaneswar, 2015), pp. 114–117. https://doi.org/10.1109/ICMOCE.2015.7489704
A.S. Hamood, S.B. Sadkhan, Cognitive radio network security status and challenges, in 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), (Baghdad, 2017), pp. 1–6. https://doi.org/10.1109/NTICT.2017.7976105
H. Pirayesh, H. Zeng, Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey. IEEE Commun Surv Tutor 24(2), 767–809 (2022). https://doi.org/10.1109/COMST.2022.3159185
D.K. Jasim, S.B. Sadkhan, Cognitive radio network: Security and reliability trade-off - status, challenges, and future trend, in 2021 1st Babylon International Conference on Information Technology and Science (BICITS), (Babil, 2021), pp. 149–153. https://doi.org/10.1109/BICITS51482.2021.9509929
N. Sureka, K. Gunaseelan, Detection & Defense against primary user emulation attack in dynamic cognitive radio networks, in 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), (Chennai, 2019), pp. 505–510. https://doi.org/10.1109/ICONSTEM.2019.8918819
S. Hossain, S. Miah, Machine learning-based malicious user detection for reliable cooperative radio spectrum sensing in cognitive radio-internet of things. Machine Learning with Applications 5, 100052 (2021). https://doi.org/10.1016/j.mlwa.2021.100052
V. Ponnusamy, K. Kottursamy, T. Karthick, B. Mukeshkrishnan, D. Malathi, T. Ahanger, Primary user emulation attack mitigation using neural network. Comput. Electr. Eng. 88, 106849 (2020). https://doi.org/10.1016/j.compeleceng.2020.106849
J. Wu, Y. Yu, H. Zhu, T. Song, J. Hu, Cost-benefit tradeoff of byzantine attack in cooperative Spectrum sensing. IEEE Syst. J. 14(2), 2532–2543 (2020). https://doi.org/10.1109/JSYST.2019.2952395
T.Y. Alkhamees, L.B. Milstein, Impact of sharing disruption in MC CR-NOMA. IEEE Access 11, 82871–82881 (2023). https://doi.org/10.1109/ACCESS.2023.3300659
V.N. Vo et al., Outage probability minimization in secure NOMA cognitive radio systems with UAV relay: A machine learning approach. IEEE Trans. Cognit. Commun. Networking 9(2), 435–451 (2023). https://doi.org/10.1109/TCCN.2022.3226184
P. Yan et al., EH cognitive network with NOMA: Perspective on impact of passive and active eavesdropping. IEEE Internet Things J. 11(3), 5050–5062 (2024). https://doi.org/10.1109/JIOT.2023.3301631
S. Xia, X. Tao, N. Li, S. Wang, Malicious user detection in non-orthogonal multiple access based on Spectrum analysis. IEEE Signal Process Lett. 27, 1390–1394 (2020). https://doi.org/10.1109/LSP.2020.3012826
Q. Dong, Z. Yang, Y. Chen, X. Li, K. Zeng, Anomaly detection in cognitive radio networks exploiting singular Spectrum analysis, in Computer Network Security. MMM-ACNS 2017, Lecture Notes in Computer Science(), ed. by J. Rak, J. Bay, I. Kotenko, L. Popyack, V. Skormin, K. Szczypiorski, vol. 10446, (Springer, Cham, 2017). https://doi.org/10.1007/978-3-319-65127-9_20
S.M.N. Uddin, N. Mansoor, M. Rahman, N. Mohammed, S. Hossain, A framework for event anomaly detection in cognitive radio based smart community, in International Workshop on Computational Intelligence (IWCI), vol. 2016, (Dhaka, 2016), pp. 148–152. https://doi.org/10.1109/IWCI.2016.7860356
A. Toma, A. Krayani, L. Marcenaro, Y. Gao, C.S. Regazzoni, Deep learning for spectrum anomaly detection in cognitive mmWave radios, in IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 2020, (London, 2020), pp. 1–7. https://doi.org/10.1109/PIMRC48278.2020.9217240
L. Lopez-Lopez, Á.G. Andrade, G. Galaviz, Cooperative spectrum sensing based on Anomaly detection and K nearest neighbors, in 2022 IEEE Future Networks World Forum (FNWF), vol. 2022, (Montreal), pp. 238–242. https://doi.org/10.1109/FNWF55208.2022.00049
A. Parmar, K. Shah, K.M. Captain, M. López-Benítez, J.R. Patel, Gaussian mixture model-based anomaly detection for defense against byzantine attack in cooperative Spectrum sensing. IEEE Trans. Cognit. Commun. Networking 10(2), 499–509 (2024). https://doi.org/10.1109/TCCN.2023.3342409
S.M.R. Islam, N. Avazov, O.A. Dobre, K.-s. Kwak, Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges. IEEE Commun Surv Tutor 19(2), 721–742 (2017). https://doi.org/10.1109/COMST.2016.2621116
P. Huang, C.-J. Liu, X. Yang, L. Xiao, J. Chen, Wireless Spectrum occupancy prediction based on partial periodic pattern mining. IEEE Trans Parallel Distrib Syst 25(7), 1925–1934 (2014). https://doi.org/10.1109/TPDS.2013.283
R.S. Jebur, R.H. Thaher, Multiple FBG wavelength peaks detection using Z-score algorithm, in 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), vol. 2022, (Ankara), pp. 223–226. https://doi.org/10.1109/ISMSIT56059.2022.9932700
A. Malki, E. Atlam, I. Gad, Machine learning approach of detecting anomalies and forecasting time-series of IoT devices. Alex. Eng. J. 61(11), 8973–8986 (2022). https://doi.org/10.1016/j.aej.2022.02.038
A.A. Sharifi, M.J. Musevi Niya, Defense against SSDF attack in cognitive radio networks: Attack-aware collaborative Spectrum sensing approach. IEEE Commun. Lett. 20(1), 93–96 (2016). https://doi.org/10.1109/LCOMM.2015.2499286
Acknowledgments
The authors appreciate the support of the Centre for Radio Access and Rural Technologies (CRART) at the University of KwaZulu Natal (UKZN) in producing this work.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Machani, G., Chege, S., Walingo, T. (2025). Anomaly Detection in PD-NOMA Cognitive Radio IoT Networks. In: Woungang, I., Dhurandher, S.K. (eds) The 7th International Conference on Wireless, Intelligent and Distributed Environment for Communication. WIDECOM 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 237. Springer, Cham. https://doi.org/10.1007/978-3-031-80817-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-80817-3_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-80816-6
Online ISBN: 978-3-031-80817-3
eBook Packages: EngineeringEngineering (R0)