Abstract

Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce spectrum resources. However, if CSS assumes that all secondary users (SU) are honest, it may offer opportunities for attackers to conduct a spectrum sensing data falsification (SSDF) attack. To suppress such a threat, recent efforts have been made to develop trust mechanisms. Currently, some attackers can collude with each other to form a collusive clique, and thus not only increase the power of SSDF attack but also avoid the detection of a trust mechanism. Noting the duality of sensing data, we propose a defense scheme called XDA from the perspective of XOR distance analysis to suppress a collusive SSDF attack. In the XDA scheme, the XOR distance calculation in line with the type of “0” and “1” historical sensing data is used to measure the similarity between any two SUs. Noting that collusive SSDF attackers hold high trust value and the minimum XOR distance, the algorithm to detect collusive SSDF attackers is designed. Meanwhile, the XDA scheme can perfect the trust mechanism to correct collusive SSDF attackers’ trust value. Simulation results show that the XDA scheme can enhance the accuracy of trust evaluation, and thus successfully reduce the power of collusive SSDF attack against CSS.

Highlights

  • In a recent study made by the Federal Communications Commission, it was found that most of the licensed radio frequency spectrum is not efficiently utilized by the primary users [1]

  • By further analyzing the characteristics of cooperative spectrum sensing (CSS) and the collusive attack demand, we have found that three types of threats can be achieved by collusive sensing data falsification (SSDF) attackers, namely: profit-driven, manipulate trust mechanism and disturb data fusion

  • We perform simulations to validate the performance of the XDA scheme and discuss the simulation results

Read more

Summary

Introduction

In a recent study made by the Federal Communications Commission, it was found that most of the licensed radio frequency spectrum is not efficiently utilized by the primary users [1]. To suppress SSDF attack, various trust mechanism studies have been presented [8,9,10,11] They evaluate whether an SU is trusted or not by his historical sensing behaviors and give the low weights to less trusted SUs or even delete their sensing data when making a final decision. Collusive SSDF attackers can improve their trust value with the help of each other, except for increasing the attack power They may bypass the detection of the trust mechanism. By reducing the increase of “the number of honest sensing data” with XDA, collusive SSDF attackers will not get a high trust value again. As a result, they can be detected by a trust mechanism.

Cooperative Spectrum Sensing
Trust Mechanism
Collusive SSDF Attack Overview
Design of XDA Scheme
XOR Distance Calculation
Collusive SSDF Detection
Perfect Trust Mechanism
Simulation Results and Discussion
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call