Professional Documents
Culture Documents
Fuzzy C-Means Clustering Based Secure Fusion Strategy in Collaborative Spectrum Sensing
Fuzzy C-Means Clustering Based Secure Fusion Strategy in Collaborative Spectrum Sensing
I.
INTRODUCTION
978-1-4799-2003-7/14/$31.00 2014 IEEE
1355
B. Attack Model
We adopt Sybil attack [10] as our attack model in this paper
since it can be easily launched by relay nodes in CRNs [17].
For intelligent SSDF with Sybil attack, a single attacker may
forge a large number of SUs with different flip rates in a
sensing period. Each SUs flip rate is assumed to be a
uniformly distributed random variable. The flip rates of SUs
are assumed to be i.i.d. The SUs forged by a Sybil attacker is
called malicious users in this paper. We consider the scenarios
with almost any malicious user ratio, which is the percentage
of forged malicious users in the total number of SUs.
III. FUZZY C-MEANS CLUSTERING BASED SECURE FUSION
STRATEGY
In this section, we propose a FCM Clustering based secure
fusion strategy for cooperative spectrum sensing to solve
problems concerned in our attack model.
>
E
Wh
W
^
Wh
^h
^h
^h
K
^
^
^h
^
E
^
^
^
E
^h
^ d
^
^ d
^ d
^ d
^ d ^ d
(1)
&
^h
Wh
Wh
^
(2)
Where and are false alarm rate and miss detection rate
of local spectrum sensing algorithm for each honest SU. The
malicious users joint sensing probability can be calculated by:
1356
(3)
TABLE I
FCM CLUSTERING BASED SECURE FUSION STRATEGY
where
and are false alarm rate and miss detection rate
of local spectrum sensing algorithm for each individual
malicious SU. is the malicious users flip rate.
Figure 2 shows typical joint sensing probability values of
honest and malicious users. The blue circles which closer to 1
are joint sensing probabilities for honest SUs. This is because
the honest users send correct sensing results, which is a
constant state value in a longer period relative to the sensing
period, with a high probability. The joint sensing probabilities
for malicious users distribute between 0.5 and 1 depends on
their flip rates. More properties of malicious users joint
sensing probability will be introduced in section IV.
0.55
0.6
0.65
0.7
0.75
0.8
Joint Sensing Probability Values
0.85
0.9
End for
End for
Malicious Users
Honest Users
0.5
if ,
0.95
go to step 3
End if
Step
5:
.
1) Derivation of False Alarm Rate
and
indicate the malicious and honest users
Let
joint sensing probability in the sensing period respectively.
According to equation (3), the joint sensing probability for
malicious user is:
(4)
1357
(5)
where
and indicates
the malicious users ratio.
According to equation (4), the range of joint sensing
probability for the malicious user is . The flip
rates for the honest users are 0, so the honest users joint
sensing probability value is . The probability mass function
is:
range of
. So we have
. According to the analysis above, we have:
(6)
.
probability value for the malicious user is greater than
where
(7)
(9)
where and
.
2) Derivation of Miss Detection Rate
In order to derive the miss detection rate, the primary user
is assumed to be present which is indicated by . Adopting
the same concept as shown in derivation of false alarm rate, the
conditional density function of malicious users joint sensing
probability is:
(8)
Where
And
.
where
The conditional density function of membership degree is
exactly identical with equation (7). The conditional expectation
and variance of fusion result under the condition that the
primary user is present can be expressed as:
1358
where
0.06
0.04
0.02
(10)
-60
-40
-20
20
0.04
0.02
0
60
Theoretical, = 0.2
Theoretical, = 0.4
Theoretical, = 0.6
Theoretical, = 0.8
Simulated, = 0.2
Simulated, = 0.4
Simulated, = 0.6
Simulated, = 0.8
-50
50
Threshold
Theoretical, = 0.2
Theoretical, = 0.4
Theoretical, = 0.6
Theoretical, = 0.8
Simulated, = 0.2
Simulated, = 0.4
Simulated, = 0.6
Simulated, = 0.8
0.8
False A larm
R ate
40
0.06
B. Optimization of Threshold
According to the analysis shown above, the false alarm rate
of FCM clustering based fusion strategy is inversely
proportional to the threshold. On the contrary, the miss
detection rate is proportional to the threshold. The optimized
threshold is the value which minimizes both the false alarm
rate and miss detection rate simultaneously. So, the optimized
threshold could be expressed as follows:
-80
0.08
Threshold
.
where and
Theoretical, = 0.2
Theoretical, = 0.4
Theoretical, = 0.6
Theoretical, = 0.8
Simulated, = 0.2
Simulated, = 0.4
Simulated, = 0.6
Simulated, = 0.8
0.08
Probability Density
Function
Probability Density
Function
0.6
0.4
Miss Detection
Rate
0.2
0
-80
-60
-40
-20
20
Theoretical, = 0.2
Theoretical, = 0.4
Theoretical, = 0.6
Theoretical, = 0.8
Simulated, = 0.2
Simulated, = 0.4
Simulated, = 0.6
Simulated, = 0.8
0.8
0.6
0.4
0.2
0
-40
40
-20
20
40
60
80
Threshold
Threshold
(11)
[3]. Their individual (sensing) miss detection
rates are set as
. A flip rate vector was
generated following uniform distribution in the range for
each malicious user. For the FCM clustering algorithm, we set
the maximum iteration number as 10, the accepted error
, initial cluster center point and
threshold .
B. Threshold Optimization
In this sub-section, we analyze the selection of optimum
threshold. Figures 4a and 4b depict the simulated false alarm
rate and miss detection rate of FCM clustering based fusion
strategy with malicious user ratios of 0.1 through 0.9.
Comparison of Miss Detection Rate
with Different Malicious Ratio
False Alarm
Rate
= 0.1
0.8
= 0.2
0.6
= 0.4
0.4
= 0.6
0.2
= 0.8
0
-100
Miss Detection
Rate
rate and miss detection rate. The solid curves in these two
figures are theoretical ones. These four figures verify that our
derived theoretical performances of FCM clustering based
fusion strategy are consistent with the simulated results.
= 0.3
= 0.5
= 0.7
0.8
0.6
0.4
0.2
= 0.9
-80
-60
-40
-20
Threshold
20
40
60
0
-50
=
=
=
=
=
=
=
=
=
-30
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
-10
10
30
50
Threshold
70
90
110
Fig. 4a Theoretical False Alarm Rate Fig. 4b Theoretical Miss Detection Rate
From figures 4a and 4b, the false alarm rate and miss
detection rate of FCM clustering based fusion strategy with the
same malicious user ratio are symmetrical to the threshold
equal to 0 no matter what the malicious user ratio is. Thus the
optimum threshold is 0. From theoretical perspective, since we
assume the secondary users individual false alarm rate and
1359
expressed
as:
where
REFERENCES
[1]
[2]
Comparison of Spectrum
Sensing Error Rate
10
[3]
Spectrum Sensing
Error Rate
[4]
-2
-4
-6
[5]
-8
-10
0.5
0.6
0.7
0.8
0.9
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
VI. CONCLUSION
We proposed a Fuzzy C-Means clustering based secure
fusion strategy to defend against SSDF attack for collaborative
spectrum sensing in CRNs. This fusion strategy is based on
soft decision concept which makes use of genuine sensing
information from all nodes (including attackers). Since our
[16]
[17]
1360