The Detection of the Spectrum Sensing Data Falsification Attack in Cognitive Radio Ad Hoc Networks
Title | The Detection of the Spectrum Sensing Data Falsification Attack in Cognitive Radio Ad Hoc Networks |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Ngomane, I., Velempini, M., Dlamini, S. V. |
Conference Name | 2018 Conference on Information Communications Technology and Society (ICTAS) |
ISBN Number | 978-1-5386-1001-5 |
Keywords | Ad hoc networks, Cognitive radio, cognitive radio ad hoc networks, Cognitive Radio Security, cognitive radio technology, Cognitive Radios, Copper, decision making, fading channels, Licenced users, modified Z-test, performance evaluation, pubcrawl, q-out-of-m rule scheme, resilience, Resiliency, Sensors, signal detection, spectrum band, spectrum observations, spectrum scarcity challenges, spectrum sensing data falsification attack, telecommunication security, unlicensed cognitive devices |
Abstract | Cognitive radio technology addresses the spectrum scarcity challenges by allowing unlicensed cognitive devices to opportunistically utilize spectrum band allocated to licensed devices. However, the openness of the technology has introduced several attacks to cognitive radios, one which is the spectrum sensing data falsification attack. In spectrum sensing data falsification attack, malicious devices share incorrect spectrum observations to other cognitive radios. This paper investigates the spectrum sensing data falsification attack in cognitive radio networks. We use the modified Z-test to isolate extreme outliers in the network. The q-out-of-m rule scheme is implemented to mitigate the spectrum sensing data falsification attack, where a random number m is selected from the sensing results and q is the final decision from m. The scheme does not require the services of a fusion Centre for decision making. This paper presents the theoretical analysis of the proposed scheme. |
URL | https://ieeexplore.ieee.org/document/8368742 |
DOI | 10.1109/ICTAS.2018.8368742 |
Citation Key | ngomane_detection_2018 |
- pubcrawl
- unlicensed cognitive devices
- telecommunication security
- spectrum sensing data falsification attack
- spectrum scarcity challenges
- spectrum observations
- spectrum band
- signal detection
- sensors
- Resiliency
- resilience
- q-out-of-m rule scheme
- Ad hoc networks
- performance evaluation
- modified Z-test
- Licenced users
- fading channels
- Decision Making
- Copper
- Cognitive Radios
- cognitive radio technology
- Cognitive Radio Security
- cognitive radio ad hoc networks
- cognitive radio