Abstract
Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce spectrum resources. However, if CSS assumes that all secondary users (SU) are honest, it may offer opportunities for attackers to conduct a spectrum sensing data falsification (SSDF) attack. To suppress such a threat, recent efforts have been made to develop trust mechanisms. Currently, some attackers can collude with each other to form a collusive clique, and thus not only increase the power of SSDF attack but also avoid the detection of a trust mechanism. Noting the duality of sensing data, we propose a defense scheme called XDA from the perspective of XOR distance analysis to suppress a collusive SSDF attack. In the XDA scheme, the XOR distance calculation in line with the type of “0” and “1” historical sensing data is used to measure the similarity between any two SUs. Noting that collusive SSDF attackers hold high trust value and the minimum XOR distance, the algorithm to detect collusive SSDF attackers is designed. Meanwhile, the XDA scheme can perfect the trust mechanism to correct collusive SSDF attackers’ trust value. Simulation results show that the XDA scheme can enhance the accuracy of trust evaluation, and thus successfully reduce the power of collusive SSDF attack against CSS.
Highlights
In a recent study made by the Federal Communications Commission, it was found that most of the licensed radio frequency spectrum is not efficiently utilized by the primary users [1]
By further analyzing the characteristics of cooperative spectrum sensing (CSS) and the collusive attack demand, we have found that three types of threats can be achieved by collusive sensing data falsification (SSDF) attackers, namely: profit-driven, manipulate trust mechanism and disturb data fusion
We perform simulations to validate the performance of the XDA scheme and discuss the simulation results
Summary
In a recent study made by the Federal Communications Commission, it was found that most of the licensed radio frequency spectrum is not efficiently utilized by the primary users [1]. To suppress SSDF attack, various trust mechanism studies have been presented [8,9,10,11] They evaluate whether an SU is trusted or not by his historical sensing behaviors and give the low weights to less trusted SUs or even delete their sensing data when making a final decision. Collusive SSDF attackers can improve their trust value with the help of each other, except for increasing the attack power They may bypass the detection of the trust mechanism. By reducing the increase of “the number of honest sensing data” with XDA, collusive SSDF attackers will not get a high trust value again. As a result, they can be detected by a trust mechanism.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.