Skip to main content

Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum Sensing in Cognitive Radio Networks

  • Conference paper
  • First Online:
Book cover Information Systems Security (ICISS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9478))

Included in the following conference series:

Abstract

In collaborative sensing, a cognitive radio node cooperates with others in the spectrum sensing process for a more accurate sensing decision. A malicious node may launch Spectrum Sensing Data Falsification (SSDF) in which the local sensing report is falsified before it reaches the fusion center (FC). The task of FC is to aggregate local sensing reports from the collaborating nodes, thereby arriving at a final sensing decision. In this paper, we propose two attack-resistant trust-based decision rules: WMR (Weighted Majority Rule) and WMRR (Weighted Majority Rule with Redemption). These rules are based on the weighted majority game. The key feature in these rules is that the contribution of a sensing report in the final decision depends not merely on the report but also on the trust that the FC has on the node sending out the report. We support the validity of the proposed rules through extensive simulation results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mitola, J.: Cognitive radio for flexible mobile multimedia communications. In: Proceedings of the IEEE International Workshop on Mobile Communications, pp. 3–10 (1999)

    Google Scholar 

  2. Mitola, J.: Cognitive Radio: An integrated agent architecture for software defined radio, Ph.D. thesis in Royal Institute of Technology (KTH) (2000)

    Google Scholar 

  3. Carlos, C., Challapali, K., Birru, D., Sai Shankar, N.: IEEE 802.22: the first worldwide wireless standard based on cognitive radios. In: Proceedings of the First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005, pp. 328–337 (2005). doi:10.1109/DYSPAN.2005.1542649

  4. Shen, J., Liu, S., Zhang, R., Liu, Y.: Soft versus hard cooperative energy detection under low SNR. In: Proceedings of the Third International Conference on Communications and Networking in China, pp. 128–131 (2008)

    Google Scholar 

  5. Gura, E.-Y., Maschler, M.B.: Insights into Game Theory. Cambridge University Press, Cambridge (2008)

    Book  MATH  Google Scholar 

  6. Wang, W., Li, H., Sun, Y., Han, Z.: Attack-proof collaborative spectrum sensing in cognitive radio networks. In: Proceedings of CISS, pp. 130–134 (2009)

    Google Scholar 

  7. Rawat, A., Anand, P., Chen, H., Varshney, P.: Countering byzantine attacks in cognitive radio networks. In: Proceedings of ICASSP, pp. 3098–3101 (2010)

    Google Scholar 

  8. Chen, R., Park, J., Bian, K.: Robust distributed spectrum sensing in cognitive radio networks. In: Proceedings of Milcom, pp. 1876–1884 (2008)

    Google Scholar 

  9. Noon, E., Li, H.: Defending against hit-and-run attackers in collaborative spectrum sensing of cognitive radio networks: a point system. In: VTC, pp. 1–5 (2010)

    Google Scholar 

  10. Li, H., Han, Z.: Catching attacker(s) for collaborative spectrum sensing in cognitive radio systems: an abnormality detection approach. In: DySPAN, pp. 1–12 (2010)

    Google Scholar 

  11. Li, H., Han, Z.: Catch me if you can: an abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Trans. Wirel. Commun. 9(11), 3554–3565 (2010)

    Article  Google Scholar 

  12. Kang, X., Liang, Y.-C., Garg, H.K., Zhang, L.: Sensing-based spectrum sharing in cognitive radio networks. IEEE Trans. Veh. Technol. 58(8), 4649–4654 (2009)

    Article  Google Scholar 

  13. Min, A., Shin, K., Hu, X.: Attack-tolerant distributed sensing for dynamic spectrum access networks. In: Proceedings of ICNP, pp. 294–303 (2009)

    Google Scholar 

  14. Zhu, F., Seo, S.: Enhanced robust cooperative spectrum sensing in cognitive radio. J. Commun. Netw. 11, 122–133 (2009)

    Article  Google Scholar 

  15. Wang, W., Li, H., Sun, Y., Han, Z.: CatchIt: detect malicious nodes in collaborative spectrum sensing. In: Proceedings of the 28th IEEE Conference on Global Telecommunications, GLOBECOM 2009, pp. 5071–5076 (2009). ISBN- 978-1-4244-4147-1

    Google Scholar 

  16. Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proc. IEEE 98(10), 1755–1772 (2010)

    Article  Google Scholar 

  17. Chen, R., Park, J.-M., Hou, Y.T., Reed, J.H.: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun. Mag. 46(4), 50–55 (2008)

    Article  Google Scholar 

  18. Yifeng, C., Liu, C., Pelechrinis, K., Krishnamurthy, P., Weiss, M.B.H., Mo, Y.: Decoupling trust and wireless channel induced effects on collaborative sensing attacks. In: 2014 IEEE International Symposium on Dynamic Spectrum Access Nteworks (DYSPAN), pp. 224–235, 1–4 April 2014

    Google Scholar 

  19. Abdelhakim, M., Zhang, L., Ren, J., Li, T.: Cooperative sensing in cognitive networks under malicious attack. In: 2011 IEEE International Conference on Acoustics, Speech Processing (ICASSP), pp. 3004–3007, 22–27 May 2011

    Google Scholar 

  20. Mousavifar, S.A., Leung, C.: Energy efficient collaborative spectrum sensing based on trust managemnt in cognitive radio networks. IEEE Trans. Wirel. Commun. 14(4), 1927–1939 (2015)

    Article  Google Scholar 

  21. Wang, J., Chen, I.-R.: Trust-based data fusion mechanism design in cognitive radio networks. In: 2014 IEEE Conference on Communications and Network Security (CNS), pp. 53–59, 29–31 Oct 2014

    Google Scholar 

  22. Sagduyu, Y.E.: Securing cognitive radio networks with dynamic trust against spectrum sensing data falsification. In: 2014 IEEE Military Communications Conference (MILCOM), pp. 235–241, 6–8 Oct 2014

    Google Scholar 

  23. Wang, W., Chen, L., Shin, K.G., Duan, L.: Thwarting intelligent malicious behaviours in cooperative spectrum sensing. IEEE Trans. Mob. Comput. 14, 2392–2405 (2015)

    Article  Google Scholar 

  24. Bhattacharjee, S., Rajkumari, R., Marchang, N.: Effect of colluding attack in collaborative spectrum sensing. In: 2015 IEEE 2nd International Conference on Signal Processing and Integrated Networks (SPIN), pp. 223–227, 19–20 Feb 2015

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suchismita Bhattacharjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Bhattacharjee, S., Marchang, N. (2015). Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum Sensing in Cognitive Radio Networks. In: Jajoda, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2015. Lecture Notes in Computer Science(), vol 9478. Springer, Cham. https://doi.org/10.1007/978-3-319-26961-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26961-0_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26960-3

  • Online ISBN: 978-3-319-26961-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics