Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Document Type : Research Article


Department of Electrical Engineering, University of Bonab, Bonab, Iran


Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deliberately report falsified local sensing results to a data collector or Fusion Center (FC) and, then, affect the global sensing decision. In the present study, we investigate an analytical model for a hard SSDF attack and propose a robust defense strategy against such an attack. We show that FC can apply learning and estimation methods to obtain the attack parameters and use a better defense strategy. We further assume a log-normal shadow fading wireless environment and discuss the attack parameters that can affect the strength of SSDF attack. Simulation results illustrate the effectiveness of the proposed defense method against SSDF attacks, especially when the malicious users are in the majority.


Main Subjects

[1] J. Mitola, GQ. Maguire, Cognitive radio: making software radios more personal, IEEE Personal Communication, 6(4) (1999) 13-18.
[2] S. Haykin, Cognitive radio: brain-empowered wireless communications, IEEE Journal on Selected Areas in Communications, 23(2) (2005) 201-220.
[3] IF. Akyildiz, WY. Lee, MC. Vuran, S. Mohanty, NeXt generation/dynamic spectrum access cognitive radio wireless networks: A survey, Computer Networks, 50(13) (2006) 2127-2159.
[4] T. Yucek, H. Arsalan, A survey of spectrum sensing algorithms for cognitive radio applications, IEEE Communications Surveys & Tutorials, 11(1) (2009) 116- 130.
[5] SM. Mishra, A. Sahai, RW. Brodersen, Cooperative sensing among cognitive radios, In Proceedings of the IEEE International Conference on Communications, (2006) 1658-1663.
[6] IF. Akyildiz, Lo BF, R. Balakrishnan, Cooperative spectrum sensing in cognitive radio networks: A survey, Physical Communication, 40(1) (2011) 40-62.
[7] R. Chen, J. m. Park, Y. T. Hou, J. H. Reed, Toward secure distributed spectrum sensing in cognitive radio networks, IEEE Communications Magazine, 46(4) (2008) 50-55.
[8] R. Chen, J. Park, K. Bian, Robust distributed spectrum sensing in cognitive radio networks, In Proceedings of IEEE International Conference on Computer Communications (INFOCOM), (2008) 31-35.
[9] AS. Rawat, P. Anand, H. Chen, PK. Varshney, Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks, IEEE Transactions on Signal Processing, 59(2) (2011) 774- 786.
[10] R. Chen, J. Park, K. Bian, Robustness against Byzantine failures in distributed spectrum sensing, Computer Communication, 35(17) (2012) 2115-2124.
[11] CY. Chen, YH. Chou, HC. Chao, Lo. CH, Secure centralized spectrum sensing for cognitive radio networks, Wireless Networks, 18(6) (2012) 667-677.
[12] K. Arshad, K. Moessner, Robust collaborative spectrum sensing in the presence of deleterious users, IET Communications, 7(1) (2013) 49-56.
[13] V. Chen, M. Song, C. Xin, CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks, Wireless Networks, 20(8) (2014) 2521-2528.
[14] C. S. Hyder, B. Grebur, L. Xiao, M. Ellison, ARC: Adaptive reputation based clustering against spectrum sensing data falsification attacks, IEEE Transactions on Mobile Computing, 13(8) (2014) 1707-1719.
[15] A. A. Sharifi, M. Sharifi, J. Musevi Niya, Reputation-based likelihood ratio test with anchor nodes assistance, 8th International Symposium on Telecommunications, (2016) 51-56.
[16] A. A. Sharifi, M. J. Musevi Niya, Defense against SSDF attack in cognitive radio networks: attack-aware collaborative spectrum sensing approach, IEEE Communications Letters, 20(1) (2016) 93-96.
[17] A. G. Fragkiadakis, E. Z. Tragos, I. G. Askoxylakis, A survey on security threats and detection techniques in cognitive radio networks, IEEE Communications Surveys & Tutorials, 15(1) (2013) 428-445.
[18] L. Zhang, G. Ding, Q. Wu, Y. Zou, Z. Han, J. Wang, Byzantine attack and defense in cognitive radio networks: A survey, IEEE Communications Surveys & Tutorials, 17(3) (2015) 1342-1363.
[19] H. Urkowitz, Energy detection of unknown deterministic signals, Proceedings of the IEEE, 55(4) (1967) 523-531.
[20] F. F. Digham, M. S. Alouini, M. K. Simon, On the energy detection of unknown signals over fading channels, IEEE Transactions on Communications, 55(1) (2007) 21-24.
[21] T. S. Rappaport, Wireless communications: Principles and Practice, Prentice Hall, (1996).
[22] PK. Varshney, Distributed detection and data fusion, Springer-Verlag, (1997).