Skip to main content
Log in

Mitigating spectrum sensing data falsification attacks in hard-decision combining cooperative spectrum sensing

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

In this paper we propose a simple yet robust secure cooperative spectrum sensing scheme with hard decision combining for Opportunistic Spectrum Access (OSA) networks. Based on the historical sensing records and the assistance of trusted OSA nodes, the proposed approach effectively mitigates spectrum sensing data falsification attacks by excluding misbehaving OSA nodes from the process of cooperation. Both analyses and numerical results are provided for various performance metrics, including overall detection probability. Comparison of the proposed method with existing well-known secure spectrum sensing methods verifies the robustness and effectiveness of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Staple G, Werbach K. The end of spectrum scarcity. IEEE Spectrum, 2004, 41: 48–52

    Article  Google Scholar 

  2. Ghasemi A, Sousa E S. Collaborative spectrum sensing for opportunistic access in fading environments. In: Proceedings of IEEE DySPAN, Baltimore, 2005. 131–136

    Google Scholar 

  3. Zhang W, Letaief K B. Cooperative communications for cognitive radio networks. Proc IEEE, 2009, 97: 878–893

    Article  Google Scholar 

  4. Mishra S M, Sahai A, Brodersen R W. Cooperative sensing among cognitive radios. In: Proceedings of IEEE International Conference on Communications, Istanbul, 2006. 1658–1663

    Google Scholar 

  5. Visotsky E, Kuffner S, Peterson R. On collaborative detection of TV transmissions in support of dynamic spectrum sharing. In: Proceedings of IEEE DySPAN, Baltimore, 2005. 338–345

    Google Scholar 

  6. Chen R L, Park J M, Hou T, et al. Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun Mag, 2008, 26: 50–55

    Article  Google Scholar 

  7. Kaligineedi P, Khabbazian M, Bhargava V K. Secure cooperative sensing techniques for cognitive radio systems. In: Proceedings of IEEE International Conference on Communications, Beijing, 2008. 3406–3410

    Google Scholar 

  8. Zhao T T, Zhao Y. A new cooperative detection technique with malicious user suppression. In: Proceedings of IEEE International Conference on Communications, Dresden, 2009. 1–5

    Google Scholar 

  9. Wang W, Li H, Sun Y, et al. Attack-proof collaborative spectrum sensing in cognitive radio networks. In: Proceedings of the 43rd Annual Conference on Information Sciences and Systems, Baltimore, 2009. 130–134

    Google Scholar 

  10. Wang W, Li H, Sun Y, et al. Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks. EURASIP J Adv Signal Process, 2010, 2010: 4

    Google Scholar 

  11. Nhan N, Koo I. A secure distributed spectrum sensing scheme in cognitive radio. In: Proceedings of the Intelligent computing 5th International Conference on Emerging Intelligent Computing Technology and Applications, Ulsan, 2009. 698–707

    Google Scholar 

  12. Zeng K, Paweczak P, Čabrić D. Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Commun Lett, 2010, 14: 226–228

    Article  Google Scholar 

  13. Chen R L, Park J M, Bian K. Robust distributed spectrum sensing in cognitive radio networks. In: Proceedings of IEEE INFOCOM, Phoenix, 2008. 1876–1884

    Google Scholar 

  14. Ma J, Zhao G, Li Y. Soft combination and detection for cooperative spectrum sensing in cognitive radio networks. IEEE Trans Wirel Commun, 2008, 7: 4502–4507

    Article  Google Scholar 

  15. Zhang W, Mallik R K, Letaief K B. Optimization of cooperative spectrum sensing with energy detection in cognitive radio networks. IEEE Trans Wirel Commun, 2009, 8: 5761–5766

    Article  Google Scholar 

  16. Varshney P K. Distributed Detection and Data Fusion. New York: Springer-Verlag, 1997

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kun Zeng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zeng, K., Peng, Q. & Tang, Y. Mitigating spectrum sensing data falsification attacks in hard-decision combining cooperative spectrum sensing. Sci. China Inf. Sci. 57, 1–9 (2014). https://doi.org/10.1007/s11432-013-4847-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-013-4847-0

Keywords

Navigation