검색 전체 메뉴
PDF
맨 위로
OA 학술지
Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks
  • 비영리 CC BY-NC
  • 비영리 CC BY-NC
ABSTRACT
Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks
KEYWORD
Cognitive radio , Dempster-Shafer evidence theory , Hausdorff distance , Spectrum sensing data falsification (SSDF)
  • I. INTRODUCTION

    According to the Federal Communication Commission, most of radio spectrum is underutilized, which leads to inefficient usage of the allowed spectrum [1]. Cognitive radio (CR) technology has been studied as an approach to increase spectrum efficiency by allowing dynamic spectrum access. A major challenge in CR is spectrum sensing, which is used to detect whether a spectrum is occupied by a licensed user (LU). The sensing performance of a secondary user (SU) degrades because of the presence of channel effects such as fading, shadowing, and the hidden terminal problem. These problems are overcome by the use of cooperative spectrum sensing, which involves an exchange of local sensing results between multiple SUs by using a centralized or decentralized fusion center to arrive at the final decision regarding the presence or absence of an LU [2].

    However, multiple SUs sending their local sensing result to the fusion center also increases the number of security risks. One of the security issues is the spectrum sensing data falsification (SSDF) attack, where a malicious user (MU) purposely reports false local sensing data to the SUs, thereby negatively influencing the overall decision. In [3], the authors discussed the security threats from passive and active points of view; the authors discussed the physical layer security for a passive attack; and MU detection is introduced for an active attack by using signal detection techniques to reduce the system interference. In [4], the authors used a weighted sequential probability test (WSPRT) to identify MUs on the basis of their reputation, which is determined by the rating assigned to every user. In [5], the authors proposed a correlation of utilization and shadow fading to detect malicious users. In [6], the authors proposed a scheme where the maximization of the secondary secrecy rate is subject only to the maintenance of a certain level of quality of service for a primary user via the interference threshold. In [7], the authors considered cooperative spectrum sensing with the existence of an MU; the authors formulated the detailed detection performance to analyze the impact of incorrect information on the sensing. Further, an authentication mechanism is proposed to filter out the incorrect information from the system. In [8], the authors addressed the problem of cooperative spectrum sensing in a CR network: in the presence of misbehaving CRs, an iterative expectation maximization is formulated and solved for hypothesis verification and radio classification. Similarly, in [9], the authors proposed a cross-layered approach to provide SUs with the ability to differentiate between a primary user and an MU by using a hidden Markov model at the media access control (MAC) sublayer. In [10], the authors presented a decentralized scheme for detecting MUs in cooperative spectrum sensing.

    The authors of [11] and [12] explored the DempsterShafer (D-S) evidence theory in cooperative spectrum sensing but have not taken into account the MU’s activity. In [13], the authors proposed a reliable method based on clustering cooperating sensors; a cluster with no malicious user was found by using a fast sensor search algorithm. The authors’ model is based on trusted sensors and uses only the results obtained by these sensors; thus, the information of malicious sensors is not considered in the spectrum decision process. In [14], the authors utilized both the advantages of the D-S evidence theory combined with an enhanced weighted stage and the capability of robust statistics used for the elimination of MUs. In [15], the authors proposed a robust cooperative spectrum sensing scheme based on the D-S theory and the calculation of the trustworthiness degree. In [16], the authors developed a trust-based data aggregation scheme to tackle an MU attack; the scheme combined firsthand and second-hand sensing evidence to guarantee performance and adopt a static game model to discourage MUs from fake reporting. In [17], the authors proposed a similarity degree that calculated the reliability of evidence and then combined reliable sets of evidence sent by honest users, but the authors did not consider the physical position of the users, and MUs were found on the basis of its cardinality, which was practically unreliable.

    In this paper, we propose a method using the Hausdorff distance and a similarity measure matrix. First, the Hausdorff distance is used for measuring the difference between two sets of evidence, and then, the similarity measure matrix is used for calculating the similarity between each normal user’s evidence and identifying MUs. The credibility (reliability) of MUs is less than that of normal users, and by using this value, we can remove the MUs. Finally, after removing the MUs, we use the D-S evidence theory to combine the normal users and estimate the performance of cooperative spectrum sensing.

    The rest of this paper is organized as follows: In Section II, we describe the system model of the proposed system. In Section III, we describe the proposed cooperative spectrum sensing-based Hausdorff distance method and the D-S evidence theory. In Section IV, we discuss the simulation results. Finally, we conclude the paper in Section V.

    II. SYSTEM MODEL

    We consider a CR network, which consists of a LU, cognitive user (CU), MU, and fusion center (FC), as shown in Fig. 1. In the proposed system, we consider a multiple energy detector (MED), which has M energy detectors, each having a single antenna; the result of these antennas is combined at the CU by using the equal gain combining (EGC) method, as shown in Fig. 2.

    In the first step, each CU performs local sensing by using MED. The local sensing at each CU (with a single energy detector) can be formulated as a binary hypothesis as follows:

    image

    where Ho and H1 denote the absence or presence of the LU, respectively.

    In the case of MED, local sensing can be formulated as follows:

    image

    where i = 1,2,3... Nc denotes the number of CUs, j = 1,2,3... M represents the number of antennas, n = 1,2,3... N indicates the number of samples, s(n) refers to the LU signal, hi, j denotes the fading channel coefficient of the ith CU at the jth antenna, and wi, j (n) represents the additive white Gaussian noise.

    The signal received at each antenna is multiplied by a weight ω. The energy received at each antenna is measured and is given as follows:

    image

    The energy of each CU received from M antennas is given as follows:

    image

    The energy calculated at each detector is combined using the EGC method, which is given as follows:

    image

    where Xi,j (n) denotes the sample of the received signal and N = 2TW, where T represents the detection time and W indicates the bandwidth. When N is sufficiently large, E can be well approximated by the Gaussian random variable in the cases of both hypotheses H0 and H1, and can be expressed as follows [18]:

    image

    where μ0 and μ1 denote the mean of E, and and represent the variances of E in the cases of hypotheses H0 and H1, respectively, and γi, j indicates the signal-to-noise ratio of the primary signal at the CU.

    III. PROPOSED COOPERATIVE SPECTRUM SENSING BASED ON HAUSDORFF DISTANCE AND D-S THEORY OF COMBINATION

    In this section, we provide a detailed description of the proposed method for the detection of an MU and the mitigation of its adverse effects. First, we measure all the users’ evidence by using the basic probability assignment (BPA) method. Then, we calculate the differences among the sets of evidence by using the Hausdorff distance and formulate the similarity measure matrix. After forming the similarity measure matrix, we calculate the credibility of the sets of evidence and compare it with a fixed threshold value. If the credibility value is greater than the threshold value, the user is considered a normal user, and if it is less than the threshold value, the user is considered to be an MU. Finally, we combine the evidence of the normal users at the fusion center. The overall flow chart of the proposed system is shown in Fig. 3.

      >  A. Basic Probability Assignment

    The D-S evidence theory is one of the candidates for the decision-making to combine users’ evidence, where the system faces an uncertainty problem. In the D-S evidence theory, the frame of discernment A can be defined as {H1,H0, Ω}, where Ω denotes the ignorance hypothesis, which describes whether the hypothesis is true. After MED performs sensing, each CU collects the local information from MED by using the EGC method and then, measures the basic BPA m(H0) and m(H1)by using hypotheses H0 and H1, respectively. The BPA function is defined as a cumulative density function as follows [12]:

    image
    image
    image

    where mi (H0), mi (H1), and mi (Ω) represent the BPA function of the ith CU.

      >  B. Detection of Malicious User and Mitigation of Its Adverse Effects Using Hausdorff Distance

    An MU falsifies the local detection results, and thus, its evidence is different from that of a normal user to some extent. Several alternatives for quantifying a similarity between focal elements have been proposed [19]. In this paper, we propose a method using the Hausdorff distance to measure the difference between the evidence of two different sources, because the Hausdorff distance measures the degree of mismatch between two sets; we then form a similarity matrix to find the similarity between the sets of evidence. After the similarity matrix formation, malicious users and normal users are separated on the basis of their credibility values.

    The Hausdorff distance provides a simple method for quantifying the distance between two sets of evidence mi and mj, and is one of the most widely used measures for quantifying such a distance. It can quantify the distance between two sets of evidence as follows:

    image

    where h(mi,mj) denotes the distance between two elements of the sets and can be defined as any valid distance in the measurement space [20].

    The similarity measure Sim(mi,mj) between sets of evidence is defined as follows:

    image

    Suppose that we have n sets of evidence; after obtaining the degree of similarity between the sets of evidence, we can construct the similarity measure matrix (SMM), which expresses the agreement between the sets of evidence as follows:

    image

    The degree of support of the evidence of a CU with respect to the evidence of other CUs is given as follows:

    image

    The credibility degree of evidence is given as follows:

    image

    After calculating the credibility of the evidence, we compare it with a fixed threshold value. If the credibility is greater than the threshold value, the user is authenticated as a normal user, and if the credibility is less than the threshold value, the user is considered to be an MU and is prevented from sending its evidence to the fusion center for the final decision.

      >  C. Final Decision at Fusion Center

    Once MUs are removed by using the proposed method using the Hausdorff distance, the sets of evidence of the normal users are sent to the fusion center. The fusion center combines these sets of evidence by using the D-S evidence theory. At the fusion center, BPAs are sequentially combined in the order of the arrival of normal evidence as follows:

    image

    where j = 0,1, mk,global (Hj) and mk-1,global (Hj) denote the k-th and (k-1)-th global BPA hypothesis Hj, respectively, and the combination operator ⊕ is defined on the basis of the evidence theory as follows:

    image

    where j = 0,1 and a and b denote the two arbitrary combining sources.

    The final decision fd at the fusion center can be calculated as follows:

    image

    where λ denotes the threshold for the hypotheses H0 and H1, respectively.

    IV. SIMULATION RESULTS AND ANALYSIS

    This section presents the results of MATLAB simulations of the proposed method and compares the performance of the proposed method with that of the k-means and Jaccard distance methods. Simulations consider scenarios with and without MUs. According to the CR system, every CU should vacate the channel if an LU signal is detected. Thus, the existence of an MU will degrade the performance of cooperative spectrum sensing.

    In scenarios with MUs, five CUs are randomly placed, among which one is an MU. The energy of each CU is measured using MED, and the information from MED is combined at each CU by using the EGC method; the number of MEDs = 2. The probability of the presence of an LU is set to 0.5, the bandwidth is set to 6 MHz, and the sensing time is set to 50 μs. The fusion center combines the sets of evidence of the normal users sequentially and forms a global decision.

    We consider three types of SSDF attacks: always busy (AB), always free (AF), and random attack in the network. In an AB attack, the MU changes the evidence of mi (H1) in the absence of an LU , which increases the probability of a false alarm and decreases the probability of detection. In an AF attack, the malicious user changes the evidence of mi (H0) in the presence of an LU, which increases the probability of misdetection and decreases the probability of a false alarm, whereas in the case of a random attack, the MU carries out the AB and AF attacks randomly with probability p.

    In Fig. 4, we have drawn the receiver operating characteristic (ROC) curve of the proposed method for an AB attack and compared its performance with the performance of the k-means and Jaccard distance methods. We have shown the performance of the proposed method with and without an MU attack in the network. It can be observed that when an AB attack occurs in the network, the probability of a false alarm increases and the probability of detection decreases; for example, when the probability of a false alarm equals 0.2, the probability of detection decreases from 0.9 to 0.1. The proposed method is able to detect and remove an MU from the network, resulting in better performance than the Jaccard distance and k-means methods.

    In an AF attack, the probability of a false alarm decreases, while the probability of misdetection increases, which increases the interference in the network. In Fig. 5, we have plotted the ROC curve with and without an MU in the network. It can be observed that the proposed method detects an MU and mitigates its adverse effects more effectively than the Jaccard distance method. The k-means method matches the performance of the proposed method at some points because it randomly selects the starting point for differentiating between the MU evidence and the normal user evidence.

    The simulation results of a random attack by an MU are shown in Fig. 6. The performance of the proposed method is better than that of the k-means and Jaccard distance approaches. From the simulation results, we can conclude that in all cases, i.e., AB, AF, and random attacks, the proposed method is better than the Jaccard distance and k-means methods in detecting an MU and mitigating its adverse effects on cooperative spectrum sensing.

    In Fig. 7, we have shown the ROC curve for scenarios with and without an MU and different values of reliability. As the reliability of the CU increases, it allows more sets of evidence to be sent to the FC and yields better results, which can be observed in Fig. 7, when the reliability increases from 0.4 to 0.7, because more sets of evidence reach the FC to help formulate a better decision.

    V. CONCLUSION

    In this paper, we proposed a method using the Hausdorff distance and a similarity measure matrix with the D-S evidence theory to detect an MU in a network and mitigate its adverse effects. The D-S evidence theory is one of the candidates to deal with the uncertainty of the evidence and improve the spectrum sensing performance. In this work, we considered three types of SSDF attacks, i.e., AB, AF, and random attacks. In our simulation, we compared the proposed method with the Jaccard distance method, which is also based on similarity, and with the k-means method. On the basis of the simulation results, we have shown that the proposed method is more effective than the other methods with respect to SSDF attacks.

참고문헌
  • 1. 2002 Spectrum Policy Task Force (ET Docket No. 02-135). google
  • 2. Ghasemi A., Sousa E. S. 2005 “Collaborative spectrum sensing for opportunistic access in fading environments,” [in Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2005)] P.131-136 google
  • 3. Li J., Feng Z., Feng Z., Zhang P. 2015 “A survey of security issues in cognitive radio networks,” [China Communications] Vol.12 P.132-150 google cross ref
  • 4. Chen R., Park J. M., Bian K. 2008 “Robust distributed spectrum sensing in cognitive radio networks,” [in Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008)] P.1876-1884 google
  • 5. Min A. W., Shin K. G., Hu X. 2011 “Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation,” [IEEE transactions on Mobile Computing] Vol.10 P.1434-1447 google cross ref
  • 6. Mokari N., Parsaeefard S., Saeedi H., Azmi P. 2014 “Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users,” [IEEE Transactions on Wireless Communications] Vol.13 P.1058-1073 google cross ref
  • 7. Liu S., Hu B. 2014 “Analysis of sensing efficiency for cooperative spectrum sensing with malicious users in cognitive radio networks,” [IEEE Communications Letters] Vol.18 P.1645-1648 google cross ref
  • 8. Soltanmohammadi E., Naraghi-Pour M. 2014 “Fast detection of malicious behavior in cooperative spectrum sensing,” [IEEE Journal on Selected Areas in Communications] Vol.32 P.377-386 google cross ref
  • 9. Aisha A. U., Qadir J., Baig A. 2013 “Mitigating the effect of malicious users in cognitive networks,” [in Proceedings of 2013 11th International Conference on Frontiers of Information Technology (FIT)] P.7-12 google
  • 10. Chen C., Song M., Xin C., Alam M. 2012 “A robust malicious user detection scheme in cooperative spectrum sensing,” [in Proceedings of 2012 IEEE Global Communications Conference (GLOBECOM)] P.4856-4861 google
  • 11. Peng Q., Zeng K., Jun W., Li S. 2006 “A distributed spectrum sensing scheme based on credibility and evidence theory in cognitive radio context,” [in Proceedings of IEEE 17th international symposium on Personal, Indoor and Mobile Radio Communications] P.1-5 google
  • 12. Nguyen-Thanh N., Koo I. 2009 “An enhanced cooperative spectrum sensing scheme based on evidence theory and reliability source evaluation in cognitive radio context,” [IEEE Communications Letters] Vol.13 P.492-494 google cross ref
  • 13. Ghaznavi M., Jamshidi A. 2015 “A reliable spectrum sensing method in the presence of malicious sensors in distributed cognitive radio network,” [IEEE Sensors Journal] Vol.15 P.1810-1816 google
  • 14. Nguyen-Thanh N., Koo I. 2009 “A robust secure cooperative spectrum sensing scheme based on evidence theory and robust statistics in cognitive radio,” [IEICE Transactions on Communications] Vol.92 P.3644-3652 google cross ref
  • 15. Wang J., Feng S., Wu Q., Zheng X., Xu Y., Ding G. 2014 “A robust cooperative spectrum sensing scheme based on Dempster-Shafer theory and trustworthiness degree calculation in cognitive radio networks,” [EURASIP Journal on Advances in Signal Processing] Vol.2014 P.1-12 google cross ref
  • 16. Wang J., Chen I. R. 2014 “Trust-based data fusion mechanism design in cognitive radio networks,” [in Proceedings of 2014 IEEE Conference on Communications and Network Security (CNS)] P.53-59 google
  • 17. Han Y., Chen Q., Wang J. X. 2012 “An enhanced DS theory cooperative spectrum sensing algorithm against SSDF attack,” [in Proceedings of 2012 IEEE 75th Vehicular Technology Conference (VTC Spring)] P.1-5 google
  • 18. Khan M. S., Koo I. 2015 “An enhanced cooperative spectrum sensing scheme based on new rule of combining evidences in cognitive radio,” [in Ubiquitous Computing Application and Wireless Sensor: UCAWSN-14] P.77-87 google
  • 19. Diaz J., Rifqi M., Bouchon-Meunier B. 2006 “A similarity measure between basic belief assignments,” [in Proceedings of 2006 9th International Conference on Information Fusion] P.1-6 google
  • 20. Hausdorff F. 1957 Set Theory google
OAK XML 통계
이미지 / 테이블
  • [ Fig. 1. ]  System model of cognitive radio network. LU: licensed user, CU: cognitive user, MU: malicious user, FC: fusion center.
    System model of cognitive radio network. LU: licensed user, CU: cognitive user, MU: malicious user, FC: fusion center.
  • [ Fig. 2. ]  Multiple energy detector (MED) of each cognitive user (CU). LU: licensed user.
    Multiple energy detector (MED) of each cognitive user (CU). LU: licensed user.
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ Fig. 3. ]  Proposed cooperative spectrum sensing based on Hausdorff distance and Dempster-Shafer (D-S) evidence theory. LU: licensed user, CU: cognitive user.
    Proposed cooperative spectrum sensing based on Hausdorff distance and Dempster-Shafer (D-S) evidence theory. LU: licensed user, CU: cognitive user.
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ Fig. 4. ]  ROC curve in always busy attack. MU: malicious user.
    ROC curve in always busy attack. MU: malicious user.
  • [ Fig. 5. ]  ROC curve in always free attack. MU: malicious user.
    ROC curve in always free attack. MU: malicious user.
  • [ Fig. 6. ]  ROC curve in random attack. MU: malicious user.
    ROC curve in random attack. MU: malicious user.
  • [ Fig. 7. ]  ROC curve of proposed method for different reliability values. MU: malicious user.
    ROC curve of proposed method for different reliability values. MU: malicious user.
(우)06579 서울시 서초구 반포대로 201(반포동)
Tel. 02-537-6389 | Fax. 02-590-0571 | 문의 : oak2014@korea.kr
Copyright(c) National Library of Korea. All rights reserved.