2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN) 2010
DOI: 10.1109/dyspan.2010.5457893
|View full text |Cite
|
Sign up to set email alerts
|

Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks

Abstract: Collaborative Sensing is an important enabling technique for realizing opportunistic spectrum access in white space (cognitive radio) networks. We consider the security ramifications of crowdsourcing of spectrum sensing in presence of malicious users that report false measurements. We propose viewing the area of interest as a grid of square cells and using it to identify and disregard false measurements. The proposed mechanism is based on identifying outlier measurements inside each cell, as well as corroborat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
53
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 68 publications
(55 citation statements)
references
References 32 publications
0
53
0
Order By: Relevance
“…Malady and Silva [23] propose a centralized soft-decision approach employing a rule that computes a weighted sum of the signal strengths reported by the sensing SUs, again with the channel being considered busy if the computed value is greater than a particular threshold. Fatemieh, Chandra, and Gunter [25] discuss that the usage of a statistical median provides results that are more robust to excessively high or low reports by malicious or deeply faded nodes than when using a mean value. In their proposal, they jointly employ both estimators in order to achieve a mix of accuracy (mean) and robustness (median) in the decision process.…”
Section: Deployment Of Dedicated Trusty Sensorsmentioning
confidence: 99%
“…Malady and Silva [23] propose a centralized soft-decision approach employing a rule that computes a weighted sum of the signal strengths reported by the sensing SUs, again with the channel being considered busy if the computed value is greater than a particular threshold. Fatemieh, Chandra, and Gunter [25] discuss that the usage of a statistical median provides results that are more robust to excessively high or low reports by malicious or deeply faded nodes than when using a mean value. In their proposal, they jointly employ both estimators in order to achieve a mix of accuracy (mean) and robustness (median) in the decision process.…”
Section: Deployment Of Dedicated Trusty Sensorsmentioning
confidence: 99%
“…Such techniques only work if a minority of nodes in a cell are compromised. There has also been efforts to detect cells that are dominated by attackers [9]. The authors consider the averages of neighboring cells in a hierarchy and detect cells with outlying averages as attacker-dominated.…”
Section: A Detecting Attacker-dominated Cellsmentioning
confidence: 99%
“…Much of the existing work aims to detect malicious nodes by identifying their measurements as abnormal or outlying [9], [11], [16]; if a majority of nodes in a given cell provide a reading in a common range, the other nodes may be identified as outliers. Such techniques only work if a minority of nodes in a cell are compromised.…”
Section: A Detecting Attacker-dominated Cellsmentioning
confidence: 99%
See 1 more Smart Citation
“…First, their effectiveness is limited by relying solely on sensor data for inferring (dis)trust. Second, they assume limits on the penetration of attackers in an area; attackers either constitute a small fraction of nodes in a small local neighborhood [30], or if they control the majority of nodes in a neighborhood, the preponderance of adjacent neighborhoods must be un-compromised [18].…”
Section: Introductionmentioning
confidence: 99%