Abstract:Cooperative spectrum sensing can be regarded as a promising method to resolve the spectrum scarcity owing to achieving spatial diversity gain in cognitive radio sensor networks. However, the spectrum sensing data falsification attack launched by the malicious nodes will result in the wrong decision in the fusion center owing to the falsified observations. It will cause a serious security threat and degrade the decision making process. In this paper, we propose a secure cooperative spectrum sensing strategy bas… Show more
“…In [ 26 ], to defend against spectrum sensing data falsification (SSDF) attacks, the authors proposed a collaborative spectrum secure (CSS) sensing technology based on the mechanism’s reputation for wireless cognitive sensor networks. The CSS devised a dynamic confidence assessment methodology that identified the reputation value for perceptual sensor nodes based on their past sensor activities by utilizing a beta reputation model.…”
Cognitive radio (CR) has emerged as one of the most investigated techniques in wireless networks. Research is ongoing in terms of this technology and its potential use. This technology relies on making full use of the unused spectrum to solve the problem of the spectrum shortage in wireless networks based on the excessive demand for spectrum use. While the wireless network technology node’s range of applications in various sectors may have security drawbacks and issues leading to deteriorating the network, combining it with CR technology might enhance the network performance and improve its security. In order to enhance the performance of the wireless sensor networks (WSNs), a lightweight authentication medium access control (MAC) protocol for CR-WSNs that is highly compatible with current WSNs is proposed. Burrows–Abadi–Needham (BAN) logic is used to prove that the proposed protocol achieves secure and mutual authentication. The automated verification of internet security protocols and applications (AVISPA) simulation is used to simulate the system security of the proposed protocol and to provide formal verification. The result clearly shows that the proposed protocol is SAFE under the on-the-fly model-checker (OFMC) backend, which means the proposed protocol is immune to passive and active attacks such as man-in-the-middle (MITM) attacks and replay attacks. The performance of the proposed protocol is evaluated and compared with related protocols in terms of the computational cost, which is 0.01184 s. The proposed protocol provides higher security, which makes it more suitable for the CR-WSN environment and ensures its resistance against different types of attacks.
“…In [ 26 ], to defend against spectrum sensing data falsification (SSDF) attacks, the authors proposed a collaborative spectrum secure (CSS) sensing technology based on the mechanism’s reputation for wireless cognitive sensor networks. The CSS devised a dynamic confidence assessment methodology that identified the reputation value for perceptual sensor nodes based on their past sensor activities by utilizing a beta reputation model.…”
Cognitive radio (CR) has emerged as one of the most investigated techniques in wireless networks. Research is ongoing in terms of this technology and its potential use. This technology relies on making full use of the unused spectrum to solve the problem of the spectrum shortage in wireless networks based on the excessive demand for spectrum use. While the wireless network technology node’s range of applications in various sectors may have security drawbacks and issues leading to deteriorating the network, combining it with CR technology might enhance the network performance and improve its security. In order to enhance the performance of the wireless sensor networks (WSNs), a lightweight authentication medium access control (MAC) protocol for CR-WSNs that is highly compatible with current WSNs is proposed. Burrows–Abadi–Needham (BAN) logic is used to prove that the proposed protocol achieves secure and mutual authentication. The automated verification of internet security protocols and applications (AVISPA) simulation is used to simulate the system security of the proposed protocol and to provide formal verification. The result clearly shows that the proposed protocol is SAFE under the on-the-fly model-checker (OFMC) backend, which means the proposed protocol is immune to passive and active attacks such as man-in-the-middle (MITM) attacks and replay attacks. The performance of the proposed protocol is evaluated and compared with related protocols in terms of the computational cost, which is 0.01184 s. The proposed protocol provides higher security, which makes it more suitable for the CR-WSN environment and ensures its resistance against different types of attacks.
“…The benefit of calculating SPRT in this way is obvious. The SUs with high RV can easily meet the decision result of (17), and the DFC can quickly obtain a reliable global decision, which minimizes the negative impact of the sensing results of SUs with low RV. Based on the above considerations, WS2 can be described as Algorithm 1.…”
Section: Rv Descending Ordermentioning
confidence: 99%
“…Lee et al proposed a detection scheme based on the order statistics and recursive updating algorithm with aging factor in Reference 16. By means of the beta reputation model, Luo proposed a secure CSS strategy based on reputation mechanism for cognitive wireless sensor networks to counter Byzantine attack in Reference 17. In Reference 18, a trust aware model is proposed by Kumar et al for the MU detection such that their sensing reports can be filter out from the final result.…”
Cognitive radio (CR) is regarded as a powerful technology to solve the problem of spectrum shortage and underutilization. As a key function of CR technology, cooperative spectrum sensing (CSS) allows secondary users (SUs) to detect the primary user (PU)'s signal so that they identify and opportunistically access the available spectrum. However, the openness of CSS paradigm makes cognitive radio networks (CRNs) suffer from Byzantine attack, thereby undermining the premise of CR framework. To this aim, we formulate a probabilistic hard Byzantine attack model, in which malicious users (MUs) can conduct various attack strategies, and make an in‐depth investigation on the blind scenario. On the one hand, in order to ensure the robustness of CSS, a method to evaluate the reliability of the secondary user (SU)'s sensing result based on the channel status detection is proposed and an innovative weight coefficient is considered to selectively utilize the sensing information from MUs. On the other hand, we design a sequential fusion method based on reputation value (RV) and differential mechanism, with the aim of improving the efficiency of CSS. According to above methods and mechanism, the weighted differential sequential symbol (WDS2) algorithm is designed, which integrates the weight evaluation into sequential method to make the global decision for CSS. Finally, compared to the existing various data fusion algorithms, simulation results show that the proposed WDS2 not only defends against various Byzantine attacks to secure the robustness of CSS, but also requires less samples in support of an accurate global decision to improve the efficiency of CSS.
“…Both [6] and [7] used a trusted node assistance to verify the correctness of reputation and data of participating CSS nodes, with the aim of securing CSS. In [8], the FC allocates a reasonable weight value (depending on historical sensing behavior of nodes) according to the submitted observations' evaluation to make the global decision. In [9], an algorithm was proposed by Z.…”
Cognitive radio (CR) is a feasible intelligent technology and can be used as an effective solution to spectrum scarcity and underutilization. As the key function of CR, cooperative spectrum sensing (CSS) is able to effectively prevent the harmful interference with primary users (PUs) and identify the available spectrum resources by exploiting the spatial diversity of multiple secondary users (SUs). However, the open nature of the cognitive radio networks (CRNs) framework makes CSS face many security threats, such as, the malicious user (MU) launches Byzantine attack to undermine CRNs. For this aim, we make an in-depth analysis of the motive and purpose from the MU's perspective in the interweave CR system, aiming to provide the future guideline for defense strategies. First, we formulate a dynamic Byzantine attack model by analyzing Byzantine behaviors in the process of CSS. On the basis of this, we further make an investigation on the condition of making the fusion center (FC) blind when the fusion rule is unknown for the MU. Moreover, the throughput and interference to the primary network are taken into consideration to evaluate the impact of Byzantine attack on the interweave CR system, and then analyze the optimal strategy of Byzantine attack when the fusion rule is known. Finally, theoretical proofs and simulation results verify the correctness and effectiveness of analyses about the impact of Byzantine attack strategy on the throughput and interference.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.