Professional Documents
Culture Documents
Defense Against SSDF Attack in Cognitive Radio Networks: Attack-Aware Collaborative Spectrum Sensing Approach
Defense Against SSDF Attack in Cognitive Radio Networks: Attack-Aware Collaborative Spectrum Sensing Approach
Defense Against SSDF Attack in Cognitive Radio Networks: Attack-Aware Collaborative Spectrum Sensing Approach
1, JANUARY 2016
93
I. I NTRODUCTION
1558-2558 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
94
The local measured energy E j is compared with a predefined threshold and the comparison result is sent to FC via
Common Control Channel (CCC). In the current study, the
CCC is assumed to be error free. Since E j is the sum of absolute
of Gaussian variables, it is distributed as Chi-square random
variable with M degrees of freedom. But, according to central limit theorem, if a large number of samples are considered
(i.e. M > 10), E j can be assumed to be Gaussian distributed as
follows:
N (M, 2M)
H0
Ej
(4)
H1
N M ( + 1) , 2M( + 1)2
Let us assume that v j represents the binary sensed result by
user j. Then, the probabilities of false alarm and miss detection
rate of a user are P f a and Pm , respectively [9].
M
P f a = P v j = 1 |H0 = P E j > |H0 = Q
2M
Pm = P v j = 0 |H1 = P E j < |H1
M( + 1)
(5)
=Q
( + 1) 2M
where Q(.) is the Q-function for standard normal distribution.
The local threshold is determined by the target false alarm
probability.
III. T HE P ROPOSED ATTACK -AWARE C OLLABORATIVE
S PECTRUM S ENSING
The attacker makes its local binary decision v j and produces
a bit u j = 1 v j as sensing report. Obviously, for benign CR
users, the sensing result v j is the same as its sensing report u j .
The local binary hypotheses (for benign or malicious user) can
be formulated as
P v j = 0 = P v j = 0 |H0 0 + P v j = 0 |H1 1
= 1 P f a 0 + Pm 1
P v j = 1 = P f a 0 + (1 Pm ) 1
(6)
where 0 and 1 denote the actual idle and busy rate of the
channel, respectively. The probability function of sensing report
u j , can also be written as
P u j = 0 = P u j = 0 v j = 0 P(v j = 0)
+ P u j = 0 v j = 1 P(v j = 1)
P u j = 1 = P u j = 1 v j = 0 P(v j = 0)
+ P u j = 1 v j = 1 P(v j = 1)
(7)
Assuming that the sensing and decision strategy is the same
among all benign and malicious users, thus,
fromthe FC point
of view, two
conditional
probabilities
P
u j = 0 v j = 1 and
P u j = 1 v j = 0 are the same and equal to . The parameter
is called attack strength through the study and is defined as
= P u j = v j v j = V
V = 0, 1
= P u j = v j v j = V, S j = M P S j = M
+ P u j = v j v j = V, S j = b P S j = b
= 1 (Na /N ) + 0 ((N Na ) /N ) = Na /N
(8)
(1 P f a ) + (1 )P f a P f a
=k
N
+ (1 )(1 P f a )
Q m (k) =
k1
N
[ Pm + (1 )(1 Pm )] [(1 Pm )
=0
+ (1 )Pm ] N
(10)
1
1
P(Decision = HU |HV ) V CU V
U =0 V =0
= Q f a (k)0 C f a + Q m (k)1 Cm
(11)
where C f a and Cm are the costs of the false alarm and miss
detection events, respectively. We investigate the impact of
attack strength on the Bayes risk. In high SNR regime
and with a very effective sensing method, two conditions
P f a << and Pm << simultaneously hold. Then, Q f a (k)
and Q m (k) can be respectively approximated as
Q f a (k) Q f a (k) =
N
N
=k
Q m (k) Q m (k) =
k1
N
=0
(1 ) N
(1 ) N
(12)
(13)
SHARIFI AND MUSEVI NIYA: DEFENSE AGAINST SSDF ATTACK IN COGNITIVE RADIO NETWORKS
95
The above equation is a lower bound for (k). We can also provide upper bounds applying a worst case analysis (i.e. P f a +
Pm = 1), applying (10) in (11) lead to
A + (B A)Q m (k) (k) B + (A B)Q f a (k)
(14)
where A = 0 P f a and B = 1 Pm .
The lower bound is attained for Pm = 0 and P f a = 1. The
upper bound is reached in the case Pm = 1 and P f a = 0. Note
that since Q m (k) is an increasing function of k and Q f a (k) is
a decreasing function of k, the SSDF attacks affect more the
second bound for lower value of k than the first one. The opposite statement is valid for higher k values. Using the fact that
(k) presents a single minimum [9], the optimum k will be the
smallest integer that satisfies
(k + 1) (k) 0
(15)
log 0 C f a /1 Cm
(16)
j=1
E(U ) =
N
1
E(u j )
N
(18)
j=1
where
E(u j ) =
1
u j =0
and
u j P(u j ) = P(u j = 1)
= (1 )P(v j = 1) + P(v j = 0)
(20)
P(u j = 1) = (1 ) P f a 0 + (1 Pm )1
+ (1 P f a )0 + Pm 1
Thus, E(U ) can be rewritten as
E(U ) = (1 ) P f a 0 + (1 Pm )1
+ (1 P f a )0 + Pm 1
(21)
(22)
= 0
(23)
N
1
u j,
N
P(u j = 1) = P(u j = 1 v j = 1 )P(v j = 1)
+ P(u j = 1 v j = 0 )P(v j = 0)
(17)
U=
(19)
Results are provided to illustrate the advantage of the proposed ACSS method. The number of collaborative CR users
N is assumed to be 40 and two probabilities 0 and 1 are
assumed to be 0.8 and 0.2, respectively. The average SNR
between the CR users and the PU is equal to -5 dB and the
number of samples within a detection interval (M) is equal to
20. The local false alarm probability is fixed to constant value
0.1 to obtain the local detection threshold . Two parameters
C f a and Cm are set to 0.3 and 0.7, respectively.
Fig. 2 shows the convergences of attack strength for =
0.3 and 0.7. The estimated value for is converged to constant values after applying almost 300 rounds of sensing. In the
simulation, the initial stage can be set as the first 500 sensing
intervals where the attack strength is estimated and then used to
improve the CSS performance.
Fig. 3 displays the Bayes risk versus parameter k for several
different values of attackers. As shown, in small scale attacks,
96
Fig. 3. The Bayes risk versus k for several different number of attackers.
Fig. 5. The Bayes risk versus threshold for different values of k with = 0.2.
VI. C ONCLUSION
In this study, Collaborative Spectrum Sensing (CSS) in the
presence of the SSDF attacks was investigated. The probability
that a specific user is attacker was estimated and innovatively
applied in koutN rule to obtain the optimal value of k that
minimizes Bayes risk. The obtained results verified that the
proposed approach is a robust defense method against SSDF
attacks.
R EFERENCES
Fig. 4. The Bayes risk versus attack strength .