Skip to main content

Case Study III: CFC-Based Byzantine Attack Detection

  • Chapter
  • First Online:
Adversary Detection For Cognitive Radio Networks

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 312 Accesses

Abstract

The multi-HMM inference algorithm presented in the previous chapter can effectively assist the Byzantine attack detection when either the percentage of the malicious SUs or their flipping probability is not too high. To further enhance the detection performance, a tailor-designed Byzantine attack detection scheme, termed CFC, will be presented in this chapter. In this method, two natural yet effective CFC statistics that can capture the second-order properties of the underlying spectrum dynamics and the SUs spectrum sensing behaviors are constructed for Byzantine attacker identification. More specifically, we will first briefly clarify the underlying system model and then presents the CFC based Byzantine attack detection algorithm. In addition, performance analysis of this method will also be presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    As demonstrated in [12, 13], the Markov model is more appropriate to assist spectrum sensing decisions.

  2. 2.

    Note that we do not consider the case that both φ 01 and φ 10 are zeros. Because in that case, the malicious SUs actually reduce to the honest SUs, and there is no need to detect them.

  3. 3.

    Other than the majority voting rule, the fusion center may also use the AND rule [14], where the spectrum is decided to be occupied only if all the SUs report so. Another possible choice is the OR rule [15], where the spectrum will decided to be occupied as long as there is one SU reports so. As it can be seen, the AND rule is aggressive and the OR rule is conservative while the majority voting rule considered here is somewhere in between.

References

  1. X. He, H. Dai, and P. Ning. A Byzantine attack defender in cognitive radio networks: the conditional frequency check. IEEE Transactions on Wireless Communications, 12 (5): 2512–2523, 2013.

    Article  Google Scholar 

  2. A.W. Min, K.G. Shin, and X. Hu. Attack-tolerant distributed sensing for dynamic spectrum access networks. In Proc. of IEEE ICNP, 2009.

    Google Scholar 

  3. F. Adelantado and C. Verikoukis. A non-parametric statistical approach for malicious users detection in cognitive wireless ad-hoc networks. In Proc. of IEEE ICC, 2011.

    Google Scholar 

  4. A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney. Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks. IEEE Trans. Signal Process., 59 (2): 774–786, 2011.

    Article  MathSciNet  Google Scholar 

  5. S. Marano, V. Matta, and L. Tong. Distributed detection in the presence of Byzantine attacks. IEEE Trans. Signal Process., 57 (1): 16–29, 2009.

    Article  MathSciNet  Google Scholar 

  6. A. Vempaty, K. Agrawal, H. Chen, and P. Varshney. Adaptive learning of Byzantines’ behavior in cooperative spectrum sensing. In Proc. of IEEE WCNC, 2011.

    Google Scholar 

  7. D. Zhao, X. Ma, and X. Zhou. Prior probability-aided secure cooperative spectrum sensing. In Proc. of IEEE WiCOM, 2011.

    Google Scholar 

  8. H. Li and Z. Han. Catch me if you can: An abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Trans. Wireless Commun., 9 (11): 3554–3565, 2010.

    Article  Google Scholar 

  9. Q. Zhao, L. Tong, A. Swami, and Y. Chen. Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework. IEEE J. Sel. Areas Commun., 25 (3): 589–600, 2007.

    Article  Google Scholar 

  10. K. Kim, IA Akbar, KK Bae, J. Urn, CM Spooner, and JH Reed. Cyclostationary approaches to signal detection and classification in cognitive radio. In Proc. of IEEE DySPAN, 2007.

    Google Scholar 

  11. Y. Chen, Q. Zhao, and A. Swami. Joint design and separation principle for opportunistic spectrum access in the presence of sensing errors. IEEE Trans. Inf. Theory, 54 (5): 2053–2071, 2008.

    MathSciNet  MATH  Google Scholar 

  12. T. Clancy and B. Walker. Predictive dynamic spectrum access. In Proc. of SDR Forum Technical Conference, 2006.

    Google Scholar 

  13. N. Noorshams, M. Malboubi, and A. Bahai. Centralized and decentralized cooperative spectrum sensing in cognitive radio networks: A novel approach. In Proc. of IEEE SPAWC, 2010.

    Google Scholar 

  14. T. Yucek and H. Arslan. A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surveys Tuts., 11 (1): 116–130, 2009.

    Article  Google Scholar 

  15. W. Zhang, R. K. Mallik, and K. B. Letaief. Optimization of cooperative spectrum sensing with energy detection in cognitive radio networks. IEEE transactions on wireless communications, 8 (12), 2009.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

He, X., Dai, H. (2018). Case Study III: CFC-Based Byzantine Attack Detection. In: Adversary Detection For Cognitive Radio Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-75868-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75868-8_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75867-1

  • Online ISBN: 978-3-319-75868-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics