Abstract

AbstractTo improve spectrum utilization, cognitive radio (CR) enables unauthorized internet of thing (IoT) devices to opportunistically access the channel underutilized by the primary user (PU) in a cognitive IoT (CIoT). To this end, cooperative spectrum sensing (CSS) plays a crucial role in CR technology, which leverages the spatial diversity of corroborative IoT devices to accurately detect the PU signal. However, this open cooperative paradigm may suffer from spectrum sensing data falsification (SSDF) attack in which malicious IoT devices intentionally mislead the fusion center (FC) by providing false sensing results to make an incorrect global decision regarding the PU status. To effectively characterize the attack behavior of malicious IoT devices, we propose a massive SSDF attack model described by the attack cycle and malicious ratio within a sensing period to characterize the malicious behaviors. Additionally, we introduce a delivery evaluation mechanism and propose a dynamic sliding window‐CSS (DSW‐CSS) to mitigate the impact of massive SSDF attack. Moreover, we introduce a sequential reporting mechanism to further reduce the number of samples required by the global decision‐making of the FC. Finally, simulation results show the flexibility and aggressiveness of the proposed attack model and demonstrate the correctness and effectiveness of DSW‐CSS.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.