• DocumentCode
    3434009
  • Title

    Pattern based anomalous user detection in cognitive radio networks

  • Author

    Rajasegarar, Sutharshan ; Leckie, Christopher ; Palaniswami, Marimuthu

  • Author_Institution
    Dept. of Comput. & Inf. Syst., Univ. of Melbourne, Melbourne, VIC, Australia
  • fYear
    2015
  • fDate
    19-24 April 2015
  • Firstpage
    5605
  • Lastpage
    5609
  • Abstract
    Cognitive radio (CR) provides the ability to sense the range of frequencies (spectrum) that are not utilized by the incumbent user (primary user) and to opportunistically use the unoccupied spectrum in a heterogeneous environment. This can use a collaborative spectrum sensing approach to detect the spectrum holes. However, this nature of the collaborative mechanism is vulnerable to security attacks and faulty observations communicated by the opportunistic users (secondary users). Detecting such malicious users in CR networks is challenging as the pattern of malicious behavior is unknown apriori. In this paper we present an unsupervised approach to detect those malicious users, utilizing the pattern of their historic behavior. Our evaluation reveals that the proposed scheme effectively detects the malicious data in the system and provides a robust framework for CR to operate in this environment.
  • Keywords
    cognitive radio; radio spectrum management; signal detection; telecommunication security; cognitive radio networks; collaborative spectrum sensing approach; heterogeneous environment; malicious data detection; pattern based anomalous user detection; security attacks; spectrum hole detection; unsupervised approach; Clustering algorithms; FCC; Geometry; History; Sensors; Systematics;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on
  • Conference_Location
    South Brisbane, QLD
  • Type

    conf

  • DOI
    10.1109/ICASSP.2015.7179044
  • Filename
    7179044