The presence of malicious attackers in cognitive radio networks (CRNs) deeply degrades the overall performance in terms of detection accuracy, throughput and energy efficiency. A popular attack, called spectrum sensing data falsification (SSDF) attack, invades the CRN during cooperative spectrum sensing process. SSDF attack is represented by a malicious user that sends false sensing results to the fusion center, trying to mislead the global decision regarding the spectrum occupancy. Detecting such type of attack becomes a challenge especially in cluster-based CRNs. In this paper we propose an attacker-identification and removal algorithm that is able to detect attackers in cluster-based CRNs. The proposed algorithm requires that each transmitting user should send a report about the delivery of its transmitted data. The delivery report is then used to assess the local decisions of all users in order to recognize attackers and remove them. Mathematical formulation and computer simulation...

Secure cluster-based cooperative spectrum sensing against malicious attackers

Althunibat, Saud Ghassan Abdul Kareem;Granelli, Fabrizio
2014-01-01

Abstract

The presence of malicious attackers in cognitive radio networks (CRNs) deeply degrades the overall performance in terms of detection accuracy, throughput and energy efficiency. A popular attack, called spectrum sensing data falsification (SSDF) attack, invades the CRN during cooperative spectrum sensing process. SSDF attack is represented by a malicious user that sends false sensing results to the fusion center, trying to mislead the global decision regarding the spectrum occupancy. Detecting such type of attack becomes a challenge especially in cluster-based CRNs. In this paper we propose an attacker-identification and removal algorithm that is able to detect attackers in cluster-based CRNs. The proposed algorithm requires that each transmitting user should send a report about the delivery of its transmitted data. The delivery report is then used to assess the local decisions of all users in order to recognize attackers and remove them. Mathematical formulation and computer simulation...
2014
2014 IEEE Globecom Workshops, GC Wkshps 2014
Piscataway, NJ, USA
Institute of Electrical and Electronics Engineers Inc.
9781479974702
9781479974702
Althunibat, Saud Ghassan Abdul Kareem; Denise, Birabwa J.; Granelli, Fabrizio
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/171686
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 9
  • ???jsp.display-item.citation.isi??? 7
  • OpenAlex ND
social impact