Skip to main content

Advertisement

Log in

Cognitive IoT Collusion SSDF Attack Detection Based on FP-Growth Algorithm

  • Original Article
  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

Cognitive Internet of Things (CIoT) uses cognitive radio technology in the Internet of Things (IoT). It can effectively solve the problem of spectrum shortage and enable IoT devices to better access the network. But malicious IoT devices (MIDs) in the CIoT may launch Spectrum Sensing Data Forgery (SSDF) attacks to disrupt network performance. Especially when these MIDs collude, the consequences may be more serious. For solving these problems, This paper adopts an association rule mining algorithm to detect collusion SSDF attacks. For a large number of devices in CIoT, the FP-growth detection algorithm based on cluster division is proposed in the paper. We divide IoT devices in a certain area into sever sevices in each sub-cluster only need to send the perception report to the sub-fusion center (S-FC) to which it belongs, and execute the FP-growth detection algorithm based on cluster division in the S-FC to identify colluding malicious IoT devices (C-MIDs) and filter them out. Its sensing report, only the perception data of is finally sent to the fusion center (FC), and the FC performs data fusion on the received sensing report and makes a global decision. Simulation results show that the proposed FP-growth detection algorithm based on cluster division is superior to traditional methods in detection accuracy and execution time, and achieves better detection results for different types of collusion SSDF attacks in CIoT.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

Data Availability

No datasets were generated or analysed during the current study.

References

  1. Li, S., Xu, L.D., Zhao, S.: The internet of things: a survey. Inform. Syst. Front. 17, 243–259 (2015). https://doi.org/10.1007/s10796-014-9492-7

    Article  Google Scholar 

  2. Zhou, I., et al.: Internet of things 2.0: concepts, applications, and future directions. IEEE Access 9, 70961–71012 (2021). https://doi.org/10.1109/ACCESS.2021.3078549

    Article  Google Scholar 

  3. Lombardi, M., Pascale, F., Santaniello, D.: Internet of things: a general overview between architectures, protocols and applications. Information 12(2), 87 (2021). https://doi.org/10.3390/info12020087

    Article  Google Scholar 

  4. Xing, L.: Reliability in internet of things: current status and future perspectives. IEEE Internet Things J. 7(8), 6704–6721 (2020). https://doi.org/10.1109/JIOT.2020.2993216

    Article  Google Scholar 

  5. Miao, L., et al.: IoT adaptive threshold energy management algorithm based on energy harvesting. Ad Hoc Netw. 149, 103241 (2023). https://doi.org/10.1016/j.adhoc.2023.103241

    Article  Google Scholar 

  6. Čolaković, A., Hadžialić, M.: Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues. Comput. Netw. 144, 17–39 (2018). https://doi.org/10.1016/j.comnet.2018.07.017

    Article  Google Scholar 

  7. Salameh, H.B., et al.: Intelligent jamming-aware routing in multi-hop IoT-based opportunistic cognitive radio networks. Ad Hoc Netw. 98, 102035 (2020). https://doi.org/10.1016/j.adhoc.2019.102035

    Article  Google Scholar 

  8. Tarek, D., et al.: A new strategy for packets scheduling in cognitive radio internet of things. Comput. Netw. 178, 107292 (2020). https://doi.org/10.1016/j.comnet.2020.107292

    Article  Google Scholar 

  9. Amini, M.R., Baidas, M.W.: Availability-reliability-stability trade-offs in ultra-reliable energy-harvesting cognitive radio IoT networks. IEEE Access 8, 82890–82916 (2020). https://doi.org/10.1109/ACCESS.2020.2991861

    Article  Google Scholar 

  10. Chatterjee, P. S.: Systematic survey on ssdf attack and detection mechanism in cognitive wireless sensor network. In: 2021 International Conference on Intelligent Technologies (CONIT). IEEE, 2021. https://doi.org/10.1109/CONIT51480.2021.9498386

  11. Aloqaily, M., et al.: A multi-stage resource-constrained spectrum access mechanism for cognitive radio IoT networks: time-spectrum block utilization. Future Gener. Comput. Syst. 110, 254–266 (2020). https://doi.org/10.1016/j.future.2020.04.022

    Article  Google Scholar 

  12. Nallarasan, V., Kottilingam, K.: Spectrum management analysis for cognitive radio IoT. In: 2021 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2021. https://doi.org/10.1109/ICCCI50826.2021.9402690

  13. Yadav, K., Roy, S.D., Kundu, S.: Defense against spectrum sensing data falsification attacker in cognitive radio networks. Wirel. Personal Commun. 112(2), 849–862 (2020). https://doi.org/10.1007/s11277-020-07077-9

    Article  Google Scholar 

  14. Kumar, S., Singh, A.K.: A localized algorithm for clustering in cognitive radio networks. J. King Saud Univ.-Comput. Inform. Sci. 33(5), 600–607 (2021). https://doi.org/10.1016/j.jksuci.2018.04.004

    Article  Google Scholar 

  15. Zhang, M., et al.: Cognitive internet of things: concepts and application example. Int. J. Comput. Sci. Issues (IJCSI) 9(6), 151 (2012)

    Google Scholar 

  16. Wu, Q., et al.: Cognitive internet of things: a new paradigm beyond connection. IEEE Internet Things J. 1(2), 129–143 (2014). https://doi.org/10.1109/JIOT.2014.2311513

    Article  Google Scholar 

  17. Akyildiz, I.F., Lo, B.F., Balakrishnan, R.: Cooperative spectrum sensing in cognitive radio networks: a survey. Phys. Commun. 4(1), 40–62 (2011). https://doi.org/10.1016/j.phycom.2010.12.003

    Article  Google Scholar 

  18. Liu, M., et al.: The optimization algorithm for cr system based on optimal wavelet filter. Wirel. Commun. Mob. Comput. (2019). https://doi.org/10.1155/2019/3158584

    Article  Google Scholar 

  19. Nasser, A., et al.: Spectrum sensing for cognitive radio: recent advances and future challenge. Sensors 21(7), 2408 (2021). https://doi.org/10.3390/s21072408

    Article  Google Scholar 

  20. Ahmed, R., et al.: CR-IoTNet: machine learning based joint spectrum sensing and allocation for cognitive radio enabled IoT cellular networks. Ad Hoc Netw. 112, 102390 (2021). https://doi.org/10.1016/j.adhoc.2020.102390

    Article  Google Scholar 

  21. Salama, G. M., Taha, S. A.: Cooperative spectrum sensing and hard decision rules for cognitive radio network.In: 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2020. https://doi.org/10.1109/ICCAIS48893.2020.9096740

  22. Xie, X., et al.: An active and passive reputation method for secure wideband spectrum sensing based on blockchain. Electronics 10(11), 1346 (2021). https://doi.org/10.3390/electronics10111346

    Article  Google Scholar 

  23. Tarek, D., et al.: Survey on spectrum sharing/allocation for cognitive radio networks Internet of Things. Egypt. Inform. J. 21(4), 231–239 (2020). https://doi.org/10.1016/j.eij.2020.02.003

    Article  Google Scholar 

  24. Wu, J., et al.: Analysis of Byzantine attack strategy for cooperative spectrum sensing. IEEE Commun. Lett. 24(8), 1631–1635 (2020). https://doi.org/10.1109/LCOMM.2020.2990869

    Article  Google Scholar 

  25. Khan, M.S., et al.: A genetic algorithm-based soft decision fusion scheme in cognitive IoT networks with malicious users. Wirel. Commun. Mob. Comput. 2020, 1–10 (2020). https://doi.org/10.1155/2020/2509081

    Article  Google Scholar 

  26. Wu, J., et al.: Sequential fusion to defend against sensing data falsification attack for cognitive internet of things. ETRI J. 42(6), 976–986 (2020). https://doi.org/10.4218/etrij.2019-0388

    Article  Google Scholar 

  27. Nanjundaswamy, M.K., et al.: Mitigation of spectrum sensing data falsification attack using multilayer perception in cognitive radio networks. Acta IMEKO 11(1), 1–7 (2022)

    Article  Google Scholar 

  28. Mthulisi, V., Issah, N., Semaka, M. S.: Spectrum sensing data falsification attack reputation and Q-out-of-M rule security scheme. In: Proceedings of Sixth International Congress on Information and Communication Technology: ICICT 2021, London. Springer Singapore, 2022. https://doi.org/10.1007/978-981-16-2380-6_2

  29. Mapunya, S., Makgolane, B., Velempini, M.: Investigating the effectiveness of spectrum sensing data falsification attacks defense mechanisms in cognitive radio Ad Hoc Networks. In: International conference on Ad Hoc Networks. Springer, Cham (2021)

    Google Scholar 

  30. Fu, Y., He, Z.: Energy-efficient joint spectrum sensing and power allocation in cognitive IoT under SSDF attack. IEEE Internet Things J. 12, 186 (2024)

    Google Scholar 

  31. Ye, F., Zhang, X., Li, Y.: Comprehensive reputation-based security mechanism against dynamic SSDF attack in cognitive radio networks. Symmetry 8(12), 147 (2016). https://doi.org/10.3390/sym8120147

    Article  Google Scholar 

  32. Zhang, S., et al.: Clustering algorithm-based data fusion scheme for robust cooperative spectrum sensing. IEEE Access 8, 5777–5786 (2020). https://doi.org/10.1109/ACCESS.2019.2963512

    Article  Google Scholar 

  33. Khan, M.S., et al.: Support vector machine-based classification of malicious users in cognitive radio networks. Wirel. Commun. Mob. Comput. 2020, 1–11 (2020). https://doi.org/10.1155/2020/8846948

    Article  Google Scholar 

  34. Zhu, G., et al.: Cost and benefit tradeoff of SSDF attack in cooperative spectrum sensing in cognitive wireless sensor networks. IEEE Sens. Lett. (2024). https://doi.org/10.1109/LSENS.2024.3381830

    Article  Google Scholar 

  35. Bhattacharjee, S., Rajkumari, R. Marchang, N.: Effect of colluding attack in collaborative spectrum sensing. In: 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2015. https://doi.org/10.1109/SPIN.2015.7095266

  36. Feng, J., et al.: Securing cooperative spectrum sensing against collusive SSDF attack using XOR distance analysis in cognitive radio networks. Sensors 18(2), 370 (2018). https://doi.org/10.3390/s18020370

    Article  Google Scholar 

  37. Mousavifar, S.A., Leung, C.: Centralized collusion attack in cognitive radio collaborative spectrum sensing. In: 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall). IEEE, 2014. https://doi.org/10.1109/VTCFall.2014.6965900

  38. Shrivastava, S., et al.: Preventing collusion attacks in cooperative spectrum sensing. In: 2018 International Conference on Signal Processing and Communications (SPCOM). IEEE, 2018. https://doi.org/10.1109/SPCOM.2018.8724473

  39. Zhao, Q., Bhowmick, S.S.: Association rule mining: a survey, p. 135. Nanyang Technological University, Singapore (2003)

    Google Scholar 

  40. Jin, F., Varadharajan, V., Tupakula, U.: An eclat algorithm based energy detection for cognitive radio networks. In: 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.358

  41. Bhattacharjee, S., Keitangnao, R., Marchang, N.: Association rule mining for detection of colluding ssdf attack in cognitive radio networks. In: 2016 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2016. https://doi.org/10.1109/ICCCI.2016.7480001

  42. Yao, D., et al.: An enhanced cooperative spectrum sensing scheme against SSDF attack based on Dempster-Shafer evidence theory for cognitive wireless sensor networks. IEEE Access 8, 175881–175890 (2020). https://doi.org/10.1109/ACCESS.2020.3026738

    Article  Google Scholar 

  43. Zhang, W., Liao, H., Zhao, N.: Research on the FP growth algorithm about association rule mining. In: 2008 International Seminar on Business and Information Management. Vol. 1. IEEE, 2008. https://doi.org/10.1109/ISBIM.2008.177

Download references

Acknowledgements

The project was supported in part by the Fundamental project: Natural Science Foundation of Heilongjiang Province (LH2022F004) and Wuxi University Research Start-up Fund for Introduced Talents.

Funding

The study was funded by the Fundamental project: Natural Science Foundation of Heilongjiang Province (LH2022F004) and Wuxi University Research Start-up Fund for Introduced Talents.

Author information

Authors and Affiliations

Authors

Contributions

Liu Miao, Longxi Liu and Xu Di wrote the main manuscript text. All authors reviewed the manuscript.

Corresponding author

Correspondence to Miao Liu.

Ethics declarations

Competing Interests

The authors declare no competing interests.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, M., Liu, L., Xu, D. et al. Cognitive IoT Collusion SSDF Attack Detection Based on FP-Growth Algorithm. J Netw Syst Manage 33, 25 (2025). https://doi.org/10.1007/s10922-025-09900-9

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10922-025-09900-9

Keywords