DocumentCode :
3167675
Title :
Trust computation through anomaly monitoring in distributed cognitive radio networks
Author :
Bhattacharjee, Shameek ; Debroy, Saptarshi ; Chatterjee, Mainak
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Univ. of Central Florida, Orlando, FL, USA
fYear :
2011
fDate :
11-14 Sept. 2011
Firstpage :
593
Lastpage :
597
Abstract :
The open philosophy of cognitive radio networks makes them vulnerable to various types of attacks which compromises the efficiency of these networks. One such attack is the Spectrum Sensing Data Falsification (SSDF) attack where malicious nodes report false spectrum occupancy data to others which when used leads to inference that is far from the true spectrum occupancy. Thus, there is a need to identify the malicious nodes or at least find the trustworthiness of nodes such that the data sent by malicious nodes could be filtered out. This paper proposes a scheme for trust based fusion by monitoring anomalies in advertised spectrum usage reports by secondary nodes. Such monitoring leads to evaluation of trust of a node by its neighbors. The calculated trust is then used to determine if a neighbor node´s advertised data could be used for fusion or not. We provide a heuristic trust threshold for nodes to disregard malicious nodes while fusing the data, which holds good for any probability of attack. To validate our model we conduct extensive simulation experiments. Our results show that majority of the nodes are able to fuse data with greater accuracy for various probabilities or intensities of attack. We also compare our results with blind fusion scheme and observe improvement in accuracy of fusion from individual nodes´ as well as overall network´s perspective. We also report a very counter-intuitive observation: at lower probabilities of attack, a malicious node´s contribution to the overall gain in cooperation is more than the damage done.
Keywords :
cognitive radio; probability; radiofrequency interference; SSDF attack; advertised spectrum usage reports; anomaly monitoring; attack probability; counter-intuitive observation; distributed cognitive radio networks; heuristic trust threshold; malicious nodes; secondary nodes; spectrum sensing data falsification attack; trust based fusion; trust computation; Accuracy; Ad hoc networks; Cognitive radio; Fuses; Monitoring; Sensors; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Personal Indoor and Mobile Radio Communications (PIMRC), 2011 IEEE 22nd International Symposium on
Conference_Location :
Toronto, ON
ISSN :
pending
Print_ISBN :
978-1-4577-1346-0
Electronic_ISBN :
pending
Type :
conf
DOI :
10.1109/PIMRC.2011.6140031
Filename :
6140031
Link To Document :
بازگشت