skip to main content
10.1145/3640824.3640836acmotherconferencesArticle/Chapter ViewAbstractPublication PagescceaiConference Proceedingsconference-collections
research-article

An Improved Wireless Spectrum Anomaly Detection Model with Adaptive Attention Mechanism

Published:08 March 2024Publication History

ABSTRACT

Wireless spectrum anomaly detection aims to identify anomaly signals in the environment and spectrum usage behavior, holding significant implications for spectrum regulation. Due to the complexity of frequency bands composition and the diversity of anomalies, spectrum anomaly detection faces numerous challenges. This paper proposes an improved wireless spectrum anomaly detection model with adaptive attention mechanism, intending to cope the impact of unsupervised anomaly detection on noise floor in spectrum and enhance anomaly detection accuracy. The proposed adaptive attention mechanism adjusts the model's attention to different parts of the spectrum, alleviates the attention to noise floor in spectrum, and optimizes the model feature extraction process. A novel anomaly scoring is introduced to provide a more accurate metric for anomaly detection in different scenarios, particularly in low interference-to-signal ratio environments, significantly improving the model's detection accuracy. Experimental validation on collected spectrum data demonstrates that the proposed model outperforms existing models in terms of performance.

References

  1. Ding G, Jiao Y, Wang J, Spectrum inference in cognitive radio networks: Algorithms and applications[J]. IEEE Communications Surveys & Tutorials, 2017, 20(1): 150-182.Google ScholarGoogle ScholarCross RefCross Ref
  2. Mu X M, Shi G Q, Liu Y A contract based on the cognitive network collaborative spectrum sharing strategy [J]. Journal of zhengzhou university (engineering science), 2016, 5 (3) : 1-5. DOI: 10.13705 / j.i SSN. 1671-6833.2016.03.001.Google ScholarGoogle Scholar
  3. Rajendran S, Pollin S. Large‐scale Wireless Spectrum Monitoring: Challenges and Solutions based on Machine Learning[J]. Spectrum Sharing: The Next Frontier in Wireless Networks, 2020: 321-339.Google ScholarGoogle Scholar
  4. Kingma D P, Welling M. Auto-encoding variational bayes[J]. arXiv preprint arXiv:1312.6114, 2013.Google ScholarGoogle Scholar
  5. Sarala B, Devi S R, Sheela J J J. Spectrum energy detection in cognitive radio networks based on a novel adaptive threshold energy detection method[J]. Computer Communications, 2020, 152: 1-7.Google ScholarGoogle ScholarCross RefCross Ref
  6. Shbat M, Tuzlukov V. Primary signal detection algorithms for spectrum sensing at low SNR over fading channels in cognitive radio[J]. Digital Signal Processing, 2019, 93: 187-207.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Dong Q, Yang Z, Chen Y, Exploration of singular spectrum analysis for online anomaly detection in crns[J]. EAI Endorsed Transactions on Security and Safety, 2017, 4(12).Google ScholarGoogle Scholar
  8. Shao G, Chen Y, Wei Y. Deep fusion for radar jamming signal classification based on CNN[J]. IEEE Access, 2020, 8: 117236-117244.Google ScholarGoogle ScholarCross RefCross Ref
  9. Hou Y, Ren H, Lv Q, Radar-Jamming Classification in the Event of Insufficient Samples Using Transfer Learning[J]. Symmetry, 2022, 14(11): 2318.Google ScholarGoogle ScholarCross RefCross Ref
  10. O'Shea T J, Clancy T C, McGwier R W. Recurrent neural radio anomaly detection[J]. arXiv preprint arXiv:1611.00301, 2016.Google ScholarGoogle Scholar
  11. Feng Q, Zhang Y, Li C, Anomaly detection of spectrum in wireless communication via deep auto-encoders[J]. The Journal of Supercomputing, 2017, 73: 3161-3178.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Rajendran S, Meert W, Lenders V, Unsupervised wireless spectrum anomaly detection with interpretable features[J]. ieee transactions on cognitive communications and networking, 2019, 5(3): 637-647.Google ScholarGoogle Scholar
  13. Zhou X, Xiong J, Zhang X, A radio anomaly detection algorithm based on modified generative adversarial network[J]. IEEE Wireless Communications Letters, 2021, 10(7): 1552-1556.Google ScholarGoogle ScholarCross RefCross Ref
  14. Tschimben S. Anomaly Detection in Shared Spectrum[D]. University of Colorado at Boulder, 2022.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Horn R A. The hadamard product[C]//Proc. Symp. Appl. Math. 1990, 40: 87-169.Google ScholarGoogle Scholar
  16. Tian Y, Liao H, Xu J, Unsupervised spectrum anomaly detection method for unauthorized bands[J]. Space: Science & Technology, 2022.Google ScholarGoogle ScholarCross RefCross Ref
  17. Zhang F, Shi X F, ZHANG X Z. Simulation and Analysis of Welch power Spectrum Estimation Algorithm [J]. Journal of Xi 'an Technological University,2009,29(04):353-356.Google ScholarGoogle Scholar
  18. He K, Zhang X, Ren S, Deep residual learning for image recognition[C]//Proceedings of the IEEE conference on computer vision and pattern recognition. 2016: 770-778.Google ScholarGoogle Scholar

Index Terms

  1. An Improved Wireless Spectrum Anomaly Detection Model with Adaptive Attention Mechanism
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            CCEAI '24: Proceedings of the 2024 8th International Conference on Control Engineering and Artificial Intelligence
            January 2024
            297 pages
            ISBN:9798400707971
            DOI:10.1145/3640824

            Copyright © 2024 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 8 March 2024

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited
          • Article Metrics

            • Downloads (Last 12 months)13
            • Downloads (Last 6 weeks)7

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format