Cooperative spectrum sensing (CSS) has been recognized as a forceful approach to promote the utilization of spectrum bands. Nevertheless, all secondary users (SU) are assumed as honest in CSS, thus giving opportunities for attackers to launch the spectrum sensing data falsification (SSDF) attack. To defend against such attack, many efforts have been made to trust mechanism. In this paper, we argue that securing CSS with only trust mechanism is not enough and report the description of dynamic-collusive SSDF attack (DC-SSDF attack). To escape the detection of trust mechanism, DC-SSDF attackers can maintain high trust by submitting true sensing data dynamically and then fake sensing data in the collaborative manner to increase their attack strength. Noting that the resonance phenomenon may appear in the trust value curve of DC-SSDF attackers, a defense scheme called TFCA is proposed from the design idea of trust fluctuation clustering analysis to suppress DC-SSDF attack. In the TFCA scheme, the decreasing property of trust value in the resonance phenomenon is adopted to measure the similarity distance between two attackers. Based on the similarity distance computation, the binary clustering algorithm is designed by electing initial binary samples to identify DC-SSDF attackers. Finally, trust mechanism can be perfected by TFCA to correct DC-SSDF attackers’ trust value. Simulation results show that our TFCA scheme can improve the accuracy of trust value calculation, thus reducing the strength of DC-SSDF attack successfully.
Read full abstract