Document Type : Review Article

Authors

1 Department of Electrical Engineering, Bonab Branch, Islamic Azad University, Bonab, Iran

2 Faculty of Electrical and computer Engineering, University of Tabriz Tabriz, Iran

Abstract

Spectrum sensing is a key function of Cognitive Radio (CR) networks. An accurate spectrum sensing scheme can improve spectrum utilization. But, in practice, detection performance is often degraded with multipath fading, shadowing and receiver uncertainty issues. To overcome the impact of these issues, Collaborative Spectrum Sensing (CSS) has been shown to be an effective approach to improve the detection performance by exploiting diversity. The reliability of CSS can be severely degraded by Spectrum Sensing Data Falsification (SSDF) attacks. Protecting the CR networks against SSDF attacks, Weighted Sequential Probability Ratio Test (WSPRT) has been proposed. Compared with conventional SPRT, the WSPRT improves correct sensing probability at the cost of increasing sampling overhead. In the present study, weighted majority rule is introduced and combined with the WSPRT to improve trustworthiness of collaborative spectrum sensing in the presence of SSDF attackers. Furthermore, to avoid increasing the sampling overhead, Roulette Wheel Selection (RWS) algorithm is used to collaborative node selection. The proposed method is called Developed WSPRT (DWSPRT). Simulation results show that the DWSPRT is an effective data fusion approach against SSDF attacks, especially for CR networks located in hostile environments.  

Keywords

[1] J. Mitola III, G. Q. Maguire, “Cognitive radio: making software radios more personal,” IEEE
Pers. Commun., Vol. 6, pp. 13-18, Aug. 1999.
[2] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Selected Areas in Communications, Vol. 23, pp. 201–220, Feb. 2005.
[3] I. F. Akyildiz, W.-Y. Lee, M.C. Vuran, S. Mohanty, “NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey,” Computer Networks, pp. 2127–2159, 2006.
[4] S. Mishra, A. Sahai, and R. Brodersen, “Cooperative sensing among cognitive radios,” in Proc. IEEE Int. Conf. Commun, Vol. 2, pp. 1658–1663, May 2006.
[5] I. F. Akyildiz, B. F. Lo, R. Balakrishnan, “Cooperative spectrum sensing in cognitive radio networks: A survey,” Physical Communication, Vol. 4, pp. 40-62, 2011.
[6] G. Ganesan, Y. Li, “Cooperative spectrum sensing in cognitive radio, part I: two user networks,” IEEE Transactions on wireless communications, Vol. 6, pp. 2204-2212, 2007.
[7] G. Ganesan, Y. Li, “Cooperative spectrum sensing in cognitive radio, part II: multiuser networks,” IEEE Transactions on wireless communications, Vol. 6, pp. 2214-2222, 2007.
[8] A. Ghasemi, E. S. Sousa, “Collaborative spectrum sensing for opportunistic access in fading environments,” In Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Vol. 2, pp. 131-136, 2005.
[9] A. Ghasemi and E. S. Sousa, “Opportunistic spectrum access in fading channels through collaborative sensing,” Journal Commun, Vol. 2, pp. 71-82, 2007.
[10] R. Chen, J. M. Park, Y. T. Hou, J. H. Reed, “Toward secure distributed spectrum sensing in cognitive radio networks,” IEEE Communications Magazine, Vol. 46, pp. 50-55, 2008.
[11] V. Chen, M. Song, C. Xin, “CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks,” Wireless Networks, Vol. 20, pp. 2521-2528, 2014.
[12] C. H. Hyder, B. Grebur, L. Xiao, M. Ellison, “ARC: Adaptive Reputation based Clustering Against Spectrum Sensing Data Falsification Attacks,” IEEE Transactions on mobile computing, Vol. 13, pp. 1707-1719, 2014.
[13] A. S. Rawat, P. Anand, H. Chen, P. K. Varshney, “Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks,” IEEE Transactions on Signal Processing, Vol. 59, pp. 774-786, 2011.
[14] R. Chen, J. Park, K. Bian, “Robust distributed spectrum sensing in cognitive radio networks,” INFOCOM 2008. IEEE 27th Conference on Computer Communications, pp. 1876–1884, 2008.
0204060801001201401600.950.9550.960.9650.970.9750.980.9850.990.9951Number of Attackers (Na)Correct Sensing Ratio (Qc) WSPRTProposed (DWSPRT)02040608010012014016033.544.555.56Number of Attackers (Na)Number of Samples WSPRTProposed (DWSPRT)
Majlesi Journal of Electrical Engineering Vol. 9, No. 2, June 2015
66
[15] R. Chen, J-M. J. Park and K. Bian, “Robustness against Byzantine failures in distributed spectrum sensing,” Computer Communication, Vol. 35, pp. 2115-2124, 2012.
[16] C. Y. Chen, Y. H. Chou, H. C. Chao and C. H. Lo, “Secure centralized spectrum sensing for cognitive radio networks,” Wireless Networks, Vol. 18, pp. 667-677, 2012.
[17] H. Urkowitz, “Energy detection of unknown deterministic signals,” In Proceedings of the IEEE, Vol. 55, pp. 523- 531, 1967.
[18] F. F. Digham, M. S. Alouini, M. K. Simon, “On the energy detection of unknown signals over fading channels,” IEEE Transaction on Communications, Vol. 55, pp. 21-24, 2007.
[19] C. Bettstetter, G. Resta, P. Santi, “The node distribution of the random waypoint mobility model for wireless ad hoc networks,” IEEE Trans. Mobile Comput, Vol. 2, 2003.
[20] T. S. Rappaport, “Wireless Communications: Principle and Practice,” Prentice Hall, 1996.
[21] P. K. Varshney, “Distributed Detection and Data Fusion,” Springer-Verlag, New York, 1997