skip to main content
10.1145/2070425.2070439acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Trust based fusion over noisy channels through anomaly detection in cognitive radio networks

Published: 14 November 2011 Publication History

Abstract

Byzantine attacks have been identified as one of the key vulnerabilities in cognitive radio networks, where malicious nodes advertise false spectrum occupancy data in a cooperative environment. In such cases, the resultant fused data is very different from the actual scenario. Thus, there is a need to identify the malicious nodes or at least find the trustworthiness of nodes such that the data sent by malicious nodes could be filtered out. The process is complicated by presence of noise in the channel which makes it harder to distinguish anomalies caused by malicious activity and those caused due to unreliable noisy channels.
This paper proposes a scheme for trust based fusion by monitoring anomalies in spectrum usage reports advertised over unreliable channels by secondary nodes which leads to evaluation of trust of a node by its neighbors. The calculated trust is then used to determine if a neighboring node's advertised data could be used for fusion or not. We provide a heuristic trust threshold for nodes to disregard malicious nodes while fusing the data, which holds good for any probability of attack. A trust coefficient is calculated based on interactions with peers in a distributed manner. Results show that even at higher probabilities of attack (0.8 and above), 95% of the nodes generate fused data with accuracy as high as 84%. We compare our results of trust based fusion with blind fusion scheme and observe improvement in accuracy of fusion from individual nodes' as well as overall network's perspective. We also analyze an alternative weighted trust fusion technique and evaluate its performance. We find that at lower probabilities of attack a malicious node's contribution to the overall gain in cooperation is more than the damage done. We observe that above a critical value for probability of attack of 0.40, the overall gain in cooperation is compromised if the malicious nodes are considered in fusion. We also discover that an honest node's benefit due to cooperation depends on its relative position with respect to the spatial orientation of malicious nodes.

References

[1]
R. Chen, Jung-Min Park, K. Bian, "Robust Distributed Spectrum Sensing in Cognitive Radio Networks," Proc. IEEE INFOCOM, 2008.
[2]
K. Chen, P. Chen, N. Prasad, Y. Liang and S. Sun, "Trusted Cognitive Radio Networking," Journal Wireless Communications and Mobile Computing, Vol. 10 Issue 4, April 2010.
[3]
G. Ganesan and Y. Li, "Cooperative spectrum sensing in cognitive radio, Part II: Multiuser networks," IEEE Trans. Wireless Commun., Vol. 6, pp. 2214--2233, 2007.
[4]
A. Ghasemi and E. S. Sousa, Collaborative spectrum sensing for opportunistic access in fading environments, The 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN, Nov. 2005.
[5]
Jorg Hillenbrand, Timo A. Weiss, and Friedrich K. Jondral, "Calculation of Detection and False Alarm Probabilities in Spectrum Pooling Systems," IEEE Communications Letters, VOL. 9, NO. 4, April 2005.
[6]
S.-W. Jeon, N. Devroye, M. Vu, S.-Y. Chung and V. Tarokh, "Cognitive networks achieve throughput scaling of a homogeneous network", in IEEE Trans. Inform. Theory, March 2008.
[7]
H. Li and Z. Han, "Catching attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach", Proc of IEEE DySpan, 2010
[8]
S. Marano, V. Matta and Lang Tong, "Distributed Detection in Presence of of Byzantine Attacks in Large Wireless Sensor Networks," In proc. of MilCom, 2006.
[9]
S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," inProc. of ACM/1EEE International Conference on Mobile Computing and Networking (MOBICOM), 2000.
[10]
J. Mitola, "Cognitive Radio: An integrated Agent Architecture for Software Defined Radio," Ph.D. Thesis, KTH, Stockholm 2000.
[11]
S. Parvin, S. Han, L.Gao, F.Hussain and E.Chang, "Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks," In Proc. of IEEE International Conference on advanced Information networking and Applications, 2010.
[12]
Y. Sun, Z. Han, and K. J. Ray Liu, "Defense of Trust Management Vulnerabilities in Distributed Networks," IEEE Communications Magazine, Special Issue, Security in Mobile Ad Hoc and Sensor Networks, Vol. 46, Issue 2, pp. 112--119, Feb 2008.
[13]
J. Unnikrishnan and V. V. Veeravalli, "Cooperative Sensing for Primary Detection in Cognitive Radio," IEEE Journal of selected topics in signal processing, Vol. 2, no. 1, pp. 18--27, February, 2008.
[14]
http://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/wifich2.html#wp1049544.

Cited By

View all
  • (2018)Design of a novel dynamic trust model for spectrum management in WRANs of TV white spaceJournal of Network and Computer Applications10.1016/j.jnca.2017.09.007100:C(1-10)Online publication date: 28-Dec-2018
  • (2018)Trust and reputation management in cognitive radio networksSecurity and Communication Networks10.1002/sec.8997:11(2160-2179)Online publication date: 20-Dec-2018
  • (2016)Comprehensive Reputation-Based Security Mechanism against Dynamic SSDF Attack in Cognitive Radio NetworksSymmetry10.3390/sym81201478:12(147)Online publication date: 3-Dec-2016
  • Show More Cited By

Index Terms

  1. Trust based fusion over noisy channels through anomaly detection in cognitive radio networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      SIN '11: Proceedings of the 4th international conference on Security of information and networks
      November 2011
      276 pages
      ISBN:9781450310208
      DOI:10.1145/2070425
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      • SDU: Suleyman Demirel University
      • AOARD: Asian Office of Aerospace Research and Development
      • RDECOM: U.S. Army Research, Development and Engineering Command
      • US Army ITC-PAC Asian Research Office
      • AFOSR: AFOSR
      • ONRGlobal: U.S. Office of Naval Research Global
      • Macquarie University-Sydney

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 14 November 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. anomaly detection
      2. attacks
      3. cognitive radio networks
      4. fusion
      5. trust coefficient

      Qualifiers

      • Research-article

      Conference

      SIN 2011

      Acceptance Rates

      Overall Acceptance Rate 102 of 289 submissions, 35%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 14 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)Design of a novel dynamic trust model for spectrum management in WRANs of TV white spaceJournal of Network and Computer Applications10.1016/j.jnca.2017.09.007100:C(1-10)Online publication date: 28-Dec-2018
      • (2018)Trust and reputation management in cognitive radio networksSecurity and Communication Networks10.1002/sec.8997:11(2160-2179)Online publication date: 20-Dec-2018
      • (2016)Comprehensive Reputation-Based Security Mechanism against Dynamic SSDF Attack in Cognitive Radio NetworksSymmetry10.3390/sym81201478:12(147)Online publication date: 3-Dec-2016
      • (2013)Utilizing misleading information for cooperative spectrum sensing in cognitive radio networks2013 IEEE International Conference on Communications (ICC)10.1109/ICC.2013.6654929(2612-2616)Online publication date: Jun-2013
      • (2013)A sensing and etiquette reputation-based trust management for centralized cognitive radio networksNeurocomputing10.1016/j.neucom.2012.08.005101(129-138)Online publication date: Feb-2013
      • (2012)A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable NetworksAdvances in Computer Science, Engineering & Applications10.1007/978-3-642-30111-7_85(883-896)Online publication date: 2012

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media