Abstract
Cognitive Internet of Things (CIoT) uses cognitive radio technology in the Internet of Things (IoT). It can effectively solve the problem of spectrum shortage and enable IoT devices to better access the network. But malicious IoT devices (MIDs) in the CIoT may launch Spectrum Sensing Data Forgery (SSDF) attacks to disrupt network performance. Especially when these MIDs collude, the consequences may be more serious. For solving these problems, This paper adopts an association rule mining algorithm to detect collusion SSDF attacks. For a large number of devices in CIoT, the FP-growth detection algorithm based on cluster division is proposed in the paper. We divide IoT devices in a certain area into sever sevices in each sub-cluster only need to send the perception report to the sub-fusion center (S-FC) to which it belongs, and execute the FP-growth detection algorithm based on cluster division in the S-FC to identify colluding malicious IoT devices (C-MIDs) and filter them out. Its sensing report, only the perception data of is finally sent to the fusion center (FC), and the FC performs data fusion on the received sensing report and makes a global decision. Simulation results show that the proposed FP-growth detection algorithm based on cluster division is superior to traditional methods in detection accuracy and execution time, and achieves better detection results for different types of collusion SSDF attacks in CIoT.








Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Data Availability
No datasets were generated or analysed during the current study.
References
Li, S., Xu, L.D., Zhao, S.: The internet of things: a survey. Inform. Syst. Front. 17, 243–259 (2015). https://doi.org/10.1007/s10796-014-9492-7
Zhou, I., et al.: Internet of things 2.0: concepts, applications, and future directions. IEEE Access 9, 70961–71012 (2021). https://doi.org/10.1109/ACCESS.2021.3078549
Lombardi, M., Pascale, F., Santaniello, D.: Internet of things: a general overview between architectures, protocols and applications. Information 12(2), 87 (2021). https://doi.org/10.3390/info12020087
Xing, L.: Reliability in internet of things: current status and future perspectives. IEEE Internet Things J. 7(8), 6704–6721 (2020). https://doi.org/10.1109/JIOT.2020.2993216
Miao, L., et al.: IoT adaptive threshold energy management algorithm based on energy harvesting. Ad Hoc Netw. 149, 103241 (2023). https://doi.org/10.1016/j.adhoc.2023.103241
Čolaković, A., Hadžialić, M.: Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues. Comput. Netw. 144, 17–39 (2018). https://doi.org/10.1016/j.comnet.2018.07.017
Salameh, H.B., et al.: Intelligent jamming-aware routing in multi-hop IoT-based opportunistic cognitive radio networks. Ad Hoc Netw. 98, 102035 (2020). https://doi.org/10.1016/j.adhoc.2019.102035
Tarek, D., et al.: A new strategy for packets scheduling in cognitive radio internet of things. Comput. Netw. 178, 107292 (2020). https://doi.org/10.1016/j.comnet.2020.107292
Amini, M.R., Baidas, M.W.: Availability-reliability-stability trade-offs in ultra-reliable energy-harvesting cognitive radio IoT networks. IEEE Access 8, 82890–82916 (2020). https://doi.org/10.1109/ACCESS.2020.2991861
Chatterjee, P. S.: Systematic survey on ssdf attack and detection mechanism in cognitive wireless sensor network. In: 2021 International Conference on Intelligent Technologies (CONIT). IEEE, 2021. https://doi.org/10.1109/CONIT51480.2021.9498386
Aloqaily, M., et al.: A multi-stage resource-constrained spectrum access mechanism for cognitive radio IoT networks: time-spectrum block utilization. Future Gener. Comput. Syst. 110, 254–266 (2020). https://doi.org/10.1016/j.future.2020.04.022
Nallarasan, V., Kottilingam, K.: Spectrum management analysis for cognitive radio IoT. In: 2021 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2021. https://doi.org/10.1109/ICCCI50826.2021.9402690
Yadav, K., Roy, S.D., Kundu, S.: Defense against spectrum sensing data falsification attacker in cognitive radio networks. Wirel. Personal Commun. 112(2), 849–862 (2020). https://doi.org/10.1007/s11277-020-07077-9
Kumar, S., Singh, A.K.: A localized algorithm for clustering in cognitive radio networks. J. King Saud Univ.-Comput. Inform. Sci. 33(5), 600–607 (2021). https://doi.org/10.1016/j.jksuci.2018.04.004
Zhang, M., et al.: Cognitive internet of things: concepts and application example. Int. J. Comput. Sci. Issues (IJCSI) 9(6), 151 (2012)
Wu, Q., et al.: Cognitive internet of things: a new paradigm beyond connection. IEEE Internet Things J. 1(2), 129–143 (2014). https://doi.org/10.1109/JIOT.2014.2311513
Akyildiz, I.F., Lo, B.F., Balakrishnan, R.: Cooperative spectrum sensing in cognitive radio networks: a survey. Phys. Commun. 4(1), 40–62 (2011). https://doi.org/10.1016/j.phycom.2010.12.003
Liu, M., et al.: The optimization algorithm for cr system based on optimal wavelet filter. Wirel. Commun. Mob. Comput. (2019). https://doi.org/10.1155/2019/3158584
Nasser, A., et al.: Spectrum sensing for cognitive radio: recent advances and future challenge. Sensors 21(7), 2408 (2021). https://doi.org/10.3390/s21072408
Ahmed, R., et al.: CR-IoTNet: machine learning based joint spectrum sensing and allocation for cognitive radio enabled IoT cellular networks. Ad Hoc Netw. 112, 102390 (2021). https://doi.org/10.1016/j.adhoc.2020.102390
Salama, G. M., Taha, S. A.: Cooperative spectrum sensing and hard decision rules for cognitive radio network.In: 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2020. https://doi.org/10.1109/ICCAIS48893.2020.9096740
Xie, X., et al.: An active and passive reputation method for secure wideband spectrum sensing based on blockchain. Electronics 10(11), 1346 (2021). https://doi.org/10.3390/electronics10111346
Tarek, D., et al.: Survey on spectrum sharing/allocation for cognitive radio networks Internet of Things. Egypt. Inform. J. 21(4), 231–239 (2020). https://doi.org/10.1016/j.eij.2020.02.003
Wu, J., et al.: Analysis of Byzantine attack strategy for cooperative spectrum sensing. IEEE Commun. Lett. 24(8), 1631–1635 (2020). https://doi.org/10.1109/LCOMM.2020.2990869
Khan, M.S., et al.: A genetic algorithm-based soft decision fusion scheme in cognitive IoT networks with malicious users. Wirel. Commun. Mob. Comput. 2020, 1–10 (2020). https://doi.org/10.1155/2020/2509081
Wu, J., et al.: Sequential fusion to defend against sensing data falsification attack for cognitive internet of things. ETRI J. 42(6), 976–986 (2020). https://doi.org/10.4218/etrij.2019-0388
Nanjundaswamy, M.K., et al.: Mitigation of spectrum sensing data falsification attack using multilayer perception in cognitive radio networks. Acta IMEKO 11(1), 1–7 (2022)
Mthulisi, V., Issah, N., Semaka, M. S.: Spectrum sensing data falsification attack reputation and Q-out-of-M rule security scheme. In: Proceedings of Sixth International Congress on Information and Communication Technology: ICICT 2021, London. Springer Singapore, 2022. https://doi.org/10.1007/978-981-16-2380-6_2
Mapunya, S., Makgolane, B., Velempini, M.: Investigating the effectiveness of spectrum sensing data falsification attacks defense mechanisms in cognitive radio Ad Hoc Networks. In: International conference on Ad Hoc Networks. Springer, Cham (2021)
Fu, Y., He, Z.: Energy-efficient joint spectrum sensing and power allocation in cognitive IoT under SSDF attack. IEEE Internet Things J. 12, 186 (2024)
Ye, F., Zhang, X., Li, Y.: Comprehensive reputation-based security mechanism against dynamic SSDF attack in cognitive radio networks. Symmetry 8(12), 147 (2016). https://doi.org/10.3390/sym8120147
Zhang, S., et al.: Clustering algorithm-based data fusion scheme for robust cooperative spectrum sensing. IEEE Access 8, 5777–5786 (2020). https://doi.org/10.1109/ACCESS.2019.2963512
Khan, M.S., et al.: Support vector machine-based classification of malicious users in cognitive radio networks. Wirel. Commun. Mob. Comput. 2020, 1–11 (2020). https://doi.org/10.1155/2020/8846948
Zhu, G., et al.: Cost and benefit tradeoff of SSDF attack in cooperative spectrum sensing in cognitive wireless sensor networks. IEEE Sens. Lett. (2024). https://doi.org/10.1109/LSENS.2024.3381830
Bhattacharjee, S., Rajkumari, R. Marchang, N.: Effect of colluding attack in collaborative spectrum sensing. In: 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2015. https://doi.org/10.1109/SPIN.2015.7095266
Feng, J., et al.: Securing cooperative spectrum sensing against collusive SSDF attack using XOR distance analysis in cognitive radio networks. Sensors 18(2), 370 (2018). https://doi.org/10.3390/s18020370
Mousavifar, S.A., Leung, C.: Centralized collusion attack in cognitive radio collaborative spectrum sensing. In: 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall). IEEE, 2014. https://doi.org/10.1109/VTCFall.2014.6965900
Shrivastava, S., et al.: Preventing collusion attacks in cooperative spectrum sensing. In: 2018 International Conference on Signal Processing and Communications (SPCOM). IEEE, 2018. https://doi.org/10.1109/SPCOM.2018.8724473
Zhao, Q., Bhowmick, S.S.: Association rule mining: a survey, p. 135. Nanyang Technological University, Singapore (2003)
Jin, F., Varadharajan, V., Tupakula, U.: An eclat algorithm based energy detection for cognitive radio networks. In: 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.358
Bhattacharjee, S., Keitangnao, R., Marchang, N.: Association rule mining for detection of colluding ssdf attack in cognitive radio networks. In: 2016 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2016. https://doi.org/10.1109/ICCCI.2016.7480001
Yao, D., et al.: An enhanced cooperative spectrum sensing scheme against SSDF attack based on Dempster-Shafer evidence theory for cognitive wireless sensor networks. IEEE Access 8, 175881–175890 (2020). https://doi.org/10.1109/ACCESS.2020.3026738
Zhang, W., Liao, H., Zhao, N.: Research on the FP growth algorithm about association rule mining. In: 2008 International Seminar on Business and Information Management. Vol. 1. IEEE, 2008. https://doi.org/10.1109/ISBIM.2008.177
Acknowledgements
The project was supported in part by the Fundamental project: Natural Science Foundation of Heilongjiang Province (LH2022F004) and Wuxi University Research Start-up Fund for Introduced Talents.
Funding
The study was funded by the Fundamental project: Natural Science Foundation of Heilongjiang Province (LH2022F004) and Wuxi University Research Start-up Fund for Introduced Talents.
Author information
Authors and Affiliations
Contributions
Liu Miao, Longxi Liu and Xu Di wrote the main manuscript text. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Competing Interests
The authors declare no competing interests.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Liu, M., Liu, L., Xu, D. et al. Cognitive IoT Collusion SSDF Attack Detection Based on FP-Growth Algorithm. J Netw Syst Manage 33, 25 (2025). https://doi.org/10.1007/s10922-025-09900-9
Accepted:
Published:
DOI: https://doi.org/10.1007/s10922-025-09900-9