Visible to the public The Detection of the Spectrum Sensing Data Falsification Attack in Cognitive Radio Ad Hoc Networks

TitleThe Detection of the Spectrum Sensing Data Falsification Attack in Cognitive Radio Ad Hoc Networks
Publication TypeConference Paper
Year of Publication2018
AuthorsNgomane, I., Velempini, M., Dlamini, S. V.
Conference Name2018 Conference on Information Communications Technology and Society (ICTAS)
ISBN Number978-1-5386-1001-5
KeywordsAd hoc networks, Cognitive radio, cognitive radio ad hoc networks, Cognitive Radio Security, cognitive radio technology, Cognitive Radios, Copper, decision making, fading channels, Licenced users, modified Z-test, performance evaluation, pubcrawl, q-out-of-m rule scheme, resilience, Resiliency, Sensors, signal detection, spectrum band, spectrum observations, spectrum scarcity challenges, spectrum sensing data falsification attack, telecommunication security, unlicensed cognitive devices
Abstract

Cognitive radio technology addresses the spectrum scarcity challenges by allowing unlicensed cognitive devices to opportunistically utilize spectrum band allocated to licensed devices. However, the openness of the technology has introduced several attacks to cognitive radios, one which is the spectrum sensing data falsification attack. In spectrum sensing data falsification attack, malicious devices share incorrect spectrum observations to other cognitive radios. This paper investigates the spectrum sensing data falsification attack in cognitive radio networks. We use the modified Z-test to isolate extreme outliers in the network. The q-out-of-m rule scheme is implemented to mitigate the spectrum sensing data falsification attack, where a random number m is selected from the sensing results and q is the final decision from m. The scheme does not require the services of a fusion Centre for decision making. This paper presents the theoretical analysis of the proposed scheme.

URLhttps://ieeexplore.ieee.org/document/8368742
DOI10.1109/ICTAS.2018.8368742
Citation Keyngomane_detection_2018