2011 IEEE Wireless Communications and Networking Conference 2011
DOI: 10.1109/wcnc.2011.5779320
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive learning of Byzantines' behavior in cooperative spectrum sensing

Abstract: This paper considers the problem of Byzantine attacks on cooperative spectrum sensing in cognitive radio networks. Our major contribution is a technique to learn about the cognitive radio (CR) potential malicious behavior over time and thereby identifies the Byzantines and then estimates their probabilities of false alarm (P f a ) and detection (PD). We show that for a given set of data over time, the Byzantines can be identified for any α (percentage of Byzantines). It has also been shown that these estimates… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
47
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 57 publications
(47 citation statements)
references
References 8 publications
0
47
0
Order By: Relevance
“…One can achieve this system in practice if there is an underlying scheme as proposed by [5] or [6] in the network, which lets the FC identify the Byzantine nodes. The nodes which are tagged honest, are later informed to employ SR through some feedback mechanism, while the nodes that are tagged Byzantine are left ignorant.…”
Section: ) Case-1 (Sr Employed Only At the Honest Nodes)mentioning
confidence: 99%
See 1 more Smart Citation
“…One can achieve this system in practice if there is an underlying scheme as proposed by [5] or [6] in the network, which lets the FC identify the Byzantine nodes. The nodes which are tagged honest, are later informed to employ SR through some feedback mechanism, while the nodes that are tagged Byzantine are left ignorant.…”
Section: ) Case-1 (Sr Employed Only At the Honest Nodes)mentioning
confidence: 99%
“…Note that this scheme works only when the percentage of Byzantines in the network is less than 50%. On the other hand, the adaptive learning scheme proposed by Vempaty et al in [6] works for any fraction of Byzantines in the network. They learnt the operating points of each and every node in the inference network not only to identify the Byzantines, but also to use the learnt Byzantine parameters in an adaptive fusion rule in order to improve the detection performance over Rawat et al's scheme [5].…”
Section: Introductionmentioning
confidence: 99%
“…While Byzantine attacks (originally proposed in [10]) may, in general, refer to many types of malicious behavior, our focus in this paper is on data-falsification attacks [11]- [18]. Thus far, research on detection in the presence of Byzantine attacks has predominantly focused on addressing these attacks under the centralized April 15, 2015 DRAFT model [13], [14], [18], [19]. A few attempts have been made to address the security threats in the distributed or consensus based schemes in recent research [20]- [25].…”
Section: Introductionmentioning
confidence: 99%
“…As shown in our earlier work [18] in the context of distributed detection with one-bit measurements under a centralized model, an intelligent way to improve the performance of the network is to use the information of the identified Byzantines to the network's benefit. More specifically, learning based techniques have the potential to outperform the existing exclusion based techniques.…”
Section: Introductionmentioning
confidence: 99%
“…In order to mitigate the attack, the FC removes nodes which are tagged Byzantine node from the fusion rule. Another mitigation scheme was proposed by Vempaty et al [21], where each sensor's behavior is learnt over time and compared to the known behavior of the honest nodes. Any significant deviation in the learnt behavior from the expected honest behavior is labelled Byzantine node.…”
Section: Introductionmentioning
confidence: 99%