Malicious User Detection in a Cognitive Radio Cooperative Sensing System

被引:140
作者
Kaligineedi, Praveen [1 ]
Khabbazian, Majid [2 ]
Bhargava, Vijay K. [1 ]
机构
[1] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
[2] MIT, Comp Sci & Artificial Intelligence Lab, Cambridge, MA 02139 USA
基金
加拿大自然科学与工程研究理事会;
关键词
Cognitive radio; cooperative sensing; malicious user detection; outlier detection;
D O I
10.1109/TWC.2010.061510.090395
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Reliable detection of primary users (PUs) is an important task for cognitive radio (CR) systems. Cooperation among a few spectrum sensors has been shown to offer significant gain in the performance of the CR spectrum-sensing system by countering the shadow-fading effects. We consider a parallel fusion network in which the sensors send their sensing information to an access point which makes the final decision regarding presence or absence of the PU signal. It has been shown in the literature that the presence of malicious users sending false sensing data can severely degrade the performance of such a cooperative sensing system. In this paper, we investigate schemes to identify the malicious users based on outlier detection techniques for a cooperative sensing system employing energy detection at the sensors. We take into consideration constraints imposed by the CR scenario such as the lack of information about the primary signal propagation environment and the small size of the sensing data samples. Considering partial information of the PU activity, we propose a novel method to identify the malicious users. We further propose malicious user detection schemes that take into consideration the spatial information of the CR sensors. The performance of the proposed schemes are studied using simulations.
引用
收藏
页码:2488 / 2497
页数:10
相关论文
共 14 条
[1]  
[Anonymous], 1980, IDENTIFICATION OUTLI, DOI DOI 10.1007/978-94-015-3994-4
[2]  
[Anonymous], 02135 FED COMM COMM
[3]   AN ANALYSIS OF TRANSFORMATIONS [J].
BOX, GEP ;
COX, DR .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-STATISTICAL METHODOLOGY, 1964, 26 (02) :211-252
[4]  
BRYS G, DEV ROBUST STAT ICOR, P98
[5]   Defense against primary user emulation attacks in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min ;
Reed, Jeffrey H. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) :25-37
[6]  
Ganesan G, 2005, 2005 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, Conference Record, P137
[7]  
Ghasemi A, 2005, 2005 1ST IEEE INTERNATIONAL SYMPOSIUM ON NEW FRONTIERS IN DYNAMIC SPECTRUM ACCESS NETWORKS, CONFERENCE RECORD, P131
[8]   An adjusted boxplot for skewed distributions [J].
Hubert, M. ;
Vandervieren, E. .
COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2008, 52 (12) :5186-5201
[9]   Secure cooperative sensing techniques for Cognitive Radio systems [J].
Kaligineedi, Praveen ;
Khabbazian, Majid ;
Bhargava, Vijay K. .
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, :3406-3410