discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/283042143
READS
15
2 AUTHORS, INCLUDING:
Muhammad SAJJAD Khan
University of Ulsan
5 PUBLICATIONS 2 CITATIONS
SEE PROFILE
Regular paper
Abstract
In cognitive radios, spectrum sensing plays an important role in accurately detecting the presence or absence of a licensed user.
However, the intervention of malicious users (MUs) degrades the performance of spectrum sensing. Such users manipulate the
local results and send falsified data to the data fusion center; this process is called spectrum sensing data falsification (SSDF).
Thus, MUs degrade the spectrum sensing performance and increase uncertainty issues. In this paper, we propose a method
based on the Hausdorff distance and a similarity measure matrix to measure the difference between the normal user evidence
and the malicious user evidence. In addition, we use the Dempster-Shafer theory to combine the sets of evidence from each
normal user evidence. We compare the proposed method with the k-means and Jaccard distance methods for malicious user
detection. Simulation results show that the proposed method is effective against an SSDF attack.
Index Terms: Cognitive radio, Dempster-Shafer evidence theory, Hausdorff distance, Spectrum sensing data falsification
(SSDF)
I. INTRODUCTION
___________________________________________________________________________________________
Received 02 February 2015, Revised 30 March 2015, Accepted 28 April 2015
*Corresponding Author Insoo Koo (E-mail: iskoo@ulsan.ac.kr, Tel: +82-52-259-1249)
School of Electrical Engineering, University of Ulsan, 93 Daehak-ro, Nam-gu, Ulsan 680-749, Korea.
Open Access
http://dx.doi.org/10.6109/jicce.2015.13.2.074
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/li-censes/bync/3.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Copyright The Korea Institute of Information and Communication Engineering
74
Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks
CU
CU
FC
MU
LU
CU
CU
75
http://jicce.org
w(n) : H o
Xi
hi (n)s(n) w( n) : H1
(1)
w i, j (n) : H o
X i, j
hi , j (n)s(n) wi , j (n) : H1
(2)
Ei , j i, j | Xi , j (n) |2
(3)
n 1
Ei Ei , j
(4)
j 1
E Ei
(5)
i 1
02 2MN
H 0 : 0 MN ,
H1 : 1 MN ( i , j 1), 1 2MN (2 i , j 1)
http://dx.doi.org/10.6109/jicce.2015.13.2.074
(6)
Fig. 3.
76
Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks
Ei
m i ( H1 )
Ei
( x 0i ) 2
exp
dx
2 20i
2 0i
(7)
( x 1i ) 2
exp
dx
2 21i
2 1i
(8)
mi () 1 mi ( H 0 ) mi ( H1 )
Sim(mi ,m j ) 1 H(mi ,m j ) .
(11)
SMM
Sim(m1,m 2 )
1
Sim(m 2 ,m1 ) 1
Sim(m ,m )
1
i 1
Sim(m ,m )
n
1
Sim(m1,m n )
Sim(m 2 ,m n )
Sim(mi ,m n )
(12)
Support(mi ) Sim(mi ,m j ) .
Credibility (mi )
Support(mi )
n
Support(mi )
(14)
i 1
H(mi , m j ) max{ sup inf h(mi , m j ), sup inf h(m j , mi )}, (10)
miAi m j Aj
(13)
j 1
i j
mk , global ( H j ) mk 1, global ( H j ) mk ( H j ) ,
m j Aj miAi
(15)
77
http://jicce.org
ma ( H j )mb () ma ( H j ) m b (H j ) ma ()mb ( H j )
1 [(ma ( H j ) m b (H1 j ) ma ( H1 j ) m b (H j )]
, (16)
H1
fd
H
0
m( H 1)
m( H 0)
,
m( H 1)
;
m( H 0)
(17)
http://dx.doi.org/10.6109/jicce.2015.13.2.074
78
Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks
ACKNOWLEDGMENTS
REFERENCES
[ 1 ] Federal Communications Commission, Spectrum Policy Task
Force (ET Docket No. 02-135). Washington, DC: Federal
Communications Commission, 2002.
[ 2 ] A. Ghasemi and E. S. Sousa, Collaborative spectrum sensing for
opportunistic access in fading environments, in Proceedings of
the 1st IEEE International Symposium on New Frontiers in
Dynamic Spectrum Access Networks (DySPAN 2005), Baltimore,
MD, pp. 131-136, 2005.
[ 3 ] J. Li, Z. Feng, Z. Feng, and P. Zhang, A survey of security issues
in cognitive radio networks, China Communications, vol. 12, no.
3, pp. 132-150, 2015.
[ 4 ] R. Chen, J. M. Park, and K. Bian, Robust distributed spectrum
sensing in cognitive radio networks, in Proceedings of the 27th
Conference on Computer Communications (INFOCOM 2008),
Phoenix, AZ, pp. 1876-1884, 2008.
[ 5 ] A. W. Min, K. G. Shin, and X. Hu, Secure cooperative sensing in
IEEE 802.22 WRANs using shadow fading correlation, IEEE
transactions on Mobile Computing, vol. 10, no. 10, pp. 1434-1447,
2011.
[ 6 ] N. Mokari, S. Parsaeefard, H. Saeedi, and P. Azmi, Cooperative
secure resource allocation in cognitive radio networks with
guaranteed secrecy rate for primary users, IEEE Transactions on
Wireless Communications, vol. 13, no. 2, pp. 1058-1073, 2014.
[ 7 ] S. Liu and B. Hu, Analysis of sensing efficiency for cooperative
spectrum sensing with malicious users in cognitive radio networks,
IEEE Communications Letters, vol. 18, no. 9, pp. 1645-1648, 2014.
[ 8 ] E. Soltanmohammadi and M. Naraghi-Pour, Fast detection of
malicious behavior in cooperative spectrum sensing, IEEE
Journal on Selected Areas in Communications, vol. 32, no. 3, pp.
377-386, 2014.
[ 9 ] A. U. Aisha, J. Qadir, and A. Baig, Mitigating the effect of
malicious users in cognitive networks, in Proceedings of 2013
Fig. 7.
V. CONCLUSION
In this paper, we proposed a method using the Hausdorff
distance and a similarity measure matrix with the D-S
79
http://jicce.org
[10]
[11]
[12]
[13]
[14]
Insoo Koo
received his B.E. degree from Konkuk University, Seoul, Korea, in 1996, and his M.S. and Ph.D. degrees from
Gwangju Institute of Science and Technology (GIST), Gwangju, Korea, in 1998 and 2002, respectively. From 2002 to
2004, he worked with Ultrafast Fiber-Optic Networks (UFON) Research Center in GIST, as a research professor. For
one year from September 2003, he was a visiting scholar at Royal Institute of Science and Technology, Sweden. In
2005, he joined University of Ulsan, where he is now a full professor. His research interests include next-generation
wireless communication systems and wireless sensor networks.
http://dx.doi.org/10.6109/jicce.2015.13.2.074
80