Telecommunications Science ›› 2017, Vol. 33 ›› Issue (1): 95-105.doi: 10.11959/j.issn.1000-0801.2017022
• Overview • Previous Articles Next Articles
Guangyue LU,Hang SU
Revised:
2017-01-06
Online:
2017-01-01
Published:
2017-06-04
Supported by:
CLC Number:
Guangyue LU,Hang SU. Survey on SSDF attack and defense for distributed cooperative cognitive radio[J]. Telecommunications Science, 2017, 33(1): 95-105.
[1] | 卢光跃, 徐偲, 叶迎晖 , 等. 基于拟合优度的频谱感知技术研究[J]. 电信科学, 2016,32(5): 52-61. |
LU G Y , XU C , YE Y H , et al. Survey on the research of spectrum sensing technologies based on goodness of fit[J]. Telecommunications Science, 2016,32(5): 52-61. | |
[2] | ZHANG R , LIANG Y C . Exploiting multi-antennas for opportunistic spectrum sharing in cognitive radio networks[J]. IEEE Journal of Selected Topics in Signal Processing, 2015,2(1):88-102. |
[3] | 卢光跃, 弥寅, 包志强 , 等. 基于特征结构的频谱感知算法[J]. 西安邮电大学学报, 2014,19(2): 1-12. |
LU G Y , MI Y , BAO Z Q , et al. Cooperative spectrum sensing algorithms based on eigenvaluestructure of the received signal[J]. Journal of Xi'an University of Posts and Telecommunications, 2014,19(2): 1-12. | |
[4] | EBRAHIMZADEH A , NAJIMI M , ANDARGOLI S M H , et al. Sensor selection and optimal energy detection threshold for efficient cooperative spectrum sensing[J]. IEEE Transactions on Vehicular Technology, 2015,64(4):1565-1577. |
[5] | HAGHIGHAT M , SADOUGH S M S . Cooperative spectrum sensing for cognitive radio networks in the presence of smart malicious users[J]. AEU-International Journal of Electronics and Communications, 2014,68(6):520-527. |
[6] | SONG Q , HAMOUDA W A . Performance analysis and optimization of multi-selective scheme for cooperative sensing in fading channels[J]. AEU-International Journal of Electronics and Communications, 2016:1. |
[7] | LUAN H , LI O , ZHANG X . Cooperative spectrum sensing with energy-efficient sequential decision fusion rule [C]//2014 23rd Wireless and Optical Communication Conference, May9-10,2014, New York,NJ,USA. New Jersey: IEEE Press, 2014:1-4. |
[8] | ZHANG W , GUO Y , LIU H , et al. Distributed consensus-based weight design for cooperative spectrum sensing[J]. IEEE Transactions on Parallel & Distributed Systems, 2015,26(1): 54-64. |
[9] | CHEN R , PARK J M , HOU Y T , et al. Toward secure distributed spectrum sensing in cognitive radio networks[J]. IEEE Communications Magazine, 2008,46(4): 50-55. |
[10] | BAZERQUE J A , GIANNAKIS G B . Distributed spectrum sensing for cognitive radio networks by exploiting sparsity[J]. IEEE Transactions on Signal Processing, 2010,58(3): 1847-1862. |
[11] | MALEKI S , LEUS G , CHATZINOTAS S , et al. To AND or to OR:on energy-efficient distributed spectrum sensing with combined censoring and sleeping[J]. IEEE Transactions on Wireless Communications, 2015,14(8): 1. |
[12] | TEGUIG D , SCHEERS B , NIR V L , et al. Consensus algorithms for distributed spectrum sensing based on goodness of fit test in cognitive radio networks [C]//2015 International Conference on Military Communications and Information Systems, May18-19,2015, Cracow,Poland. New Jersey: IEEE Press, 2015:1-5. |
[13] | AMJAD M F , ASLAM B , ZOU C C . Reputation aware collaborative spectrum sensing for mobile cognitive radio networks [C]//2013 Military Communications Conference, November18-20,2013, San Diego,California,USA. New Jersey: IEEE Press, 2013:951-956. |
[14] | SUCASAS V , ALTHUNIBAT S , RADWAN A , et al. Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks[J]. Security &Communication Networks, 2015. |
[15] | NGUYEN-THANH N , CIBLAT P , PHAM A T , et al. Attack and surveillance strategies for selfish primary user emulator in cognitive radio network [C]//2014 IEEE Global Conference on Signal and Information Processing, Dec3-5,2014, Atlanta,GA,USA. New Jersey: IEEE Press, 2014:1199-1203. |
[16] | 李红宁, 裴庆祺, 李子 . 认知无线网络中收敛感知算法安全性检测[J]. 西安电子科技大学学报:自然科学版, 2014,41(3): 157-161. |
LI H N , PEI Q Q , LI Z . Security detection of the consensus-based spectrum sensing algorithm in cognitive networks[J]. Journal of Xidian University:Natural Science, 2014,41(3): 157-161. | |
[17] | ZHOU M , SHEN J , CHEN H , et al. A cooperative spectrum sensing scheme based on the Bayesian reputation model in cognitive radio networks[C]//2013 Wireless Communications and Networking Conference(WCNC), April7-10,2013, Shanghai,China. New Jersey: IEEE Press, 2013:614-619. |
[18] | HUO Y , WANG Y , LIN W , et al. Three-layer Bayesian model based spectrum sensing to detect malicious attacks in cognitive radio networks [C]//2015 IEEE International Conference on Communication Workshop, June8-12,2015, London,UK. New Jersey: IEEE Press, 2015:1640-1645. |
[19] | SHARIFI A A , MUSEVI NIYA M J . Defense against SSDF attack in cognitive radio networks:attack-aware collaborative spectrum sensing approach[J]. IEEE Communications Letters, 2016,20(1):93-96. |
[20] | CHEN R , PARK J M J , BIAN K . Robustness against Byzantine failures in distributed spectrum sensing[J]. Computer Communications, 2012,35(17):2115-2124. |
[21] | SHARIFI A A , GHAZIJAHANI H A , NIYA M J M . Secure collaborative spectrum sensing for distributed cognitive radio networks[EB/OL]. 2015-06-20 2016-08-01. |
[22] | FENG J , ZHANG Y , LU G , et al. Defend against collusive SSDF attack using trust in cooperative spectrum sensing environment [C]//2013 12th IEEE International Conference on Trust,Security and Privacy in Computing and Communications, July16-18,2013, Melbourne,Australia. New Jersey: IEEE Press, 2013:1656-1661. |
[23] | HYDER C S , GREBUR B , LI X , et al. ARC:adaptive reputation based clustering against spectrum sensing data falsification attacks[J]. IEEE Transactions on Mobile Computing, 2014,13(8):1707-1719. |
[24] | SAGDUYU Y E . Securing cognitive radio networks with dynamic trust against spectrum sensing data falsification[C]//2014 Military Communications Conference (MILCOM), Oct1-8,2014, Baltimore,MD,USA. New Jersey: IEEE Press, 2014:235-241. |
[25] | DU J , WEN X , SHANG L , et al. A byzantine attack defender for censoring-enabled cognitive radio networks [C]//2015 International Conference on Wireless Communications & Signal Processing, Oct11-13,2015, Nanjing,China. New Jersey: IEEE Press, 2015:1-6. |
[26] | SHARIFI A A , NIYA J M . Securing collaborative spectrum sensing against malicious attackers in cognitive radio networks[J]. Wireless Personal Communications, 2016:1-17. |
[27] | HAN Y , CHEN Q , WANG J X . An enhanced D-S theory cooperative spectrum sensing algorithm against SSDF attack[C]//2012 75th IEEE Vehicular Technology Conference (VTC Spring), May6-9,2012, Yokohama,Japan. New Jersey: IEEE Press, 2012:1-5. |
[28] | CHATTERJEE P S , ROY M . A regression based spectrum-sensing data-falsification attack detection technique in CWSN[C]//2015 IEEE International Conference on Information Technology, Dec21-13,2015, Bhubaneswar,India. New Jersey: IEEE Press, 2015:48-53. |
[29] | TANG H , YU F R , HUANG M , et al. Distributed consensus-based security mechanisms in cognitive radio mobile Ad Hoc networks[J]. IET Communications, 2012,6(8):974-983. |
[30] | EJAZ W , HASAN N U , KIM H S . Distributed cooperative spectrum sensing in cognitive radio for Ad Hoc networks[J]. Computer Communications, 2013,36(12):1341-1349. |
[31] | LI H , LIU X , XU L . Analysis of distributed consensus-based spectrum sensing algorithm in cognitive radio networks[C]//2014 10th International Conference on Computational Intelligence and Security, Nov15-16,2014, Kunming,China. New Jersey: IEEE Press, 2014:593-597. |
[32] | 王凡, 卢光跃, 弥寅 . 基于中值滤波的分布式扩散最小均方算法[J]. 西安邮电大学学报, 2015(5): 34-37. |
WANG F , LU G Y , MI Y . An improved distributed diffusion least mean square algorithm[J]. Journal of Xi'an University ofPosts and Telecommunications, 2015(5): 34-37. | |
[33] | ZENG K , PAWE C , PRZEMYS A , et al. Reputation-based cooperative spectrum sensing with trusted nodes assistance[J]. IEEE Communications Letters, 2010,14(3):226-228. |
[34] | BHATTACHARJEE S , DEBROY S , CHATTERJEE M . Trust computation through anomaly monitoring in distributed cognitive radio networks [C]//2011 IEEE International Symposium on Personal,Indoor and Mobile Radio Communications, Sept11-14,2011, Toronto,Canada. New Jersey: IEEE Press, 2011:593-597. |
[35] | ZHANG T , SAFAVI-NAINI R , LI Z . ReDiSen:reputation-based securecooperativesensingindistributedcognitiveradionetworks[C]//2013 IEEE International Conference on Communications, June9-13,2013, Budapest,Hungary. New Jersey: IEEE Press, 2013:2601-2605. |
[36] | WANG J , CHEN I R , TSAI J J P , et al. Trust-based cooperative spectrum sensing against SSDF attacks in distributed cognitive radio networks[C]//2016 IEEE International Workshop Technical Committee on Communications Quality and Reliability, May10-12,2016, Stevenson,WA,USA. New Jersey: IEEE Press, 2016:1-6. |
[37] | WEI Z , TANG H , YU F R . A trust based framework for both spectrum sensing and data transmission in CR-MANETs[C]//2015 IEEE International Conference on Communication Workshop, June8-12,2015, London,UK. New Jersey: IEEE Press, 2015:562-567. |
[38] | LIN H , HU J , HUANG C , et al. A secure cooperative spectrum sensing strategy for distributed cognitive radio networks[C]//IEEE International Conference on Computer and Information Technology;Ubiquitous Computing and Communications;Dependable,Autonomic and Secure Computing;Pervasive Intelligence and Computing, Oct26-28,2015, Liverpool,UK. New Jersey: IEEE Press, 2015:2198-2205. |
[39] | LI F , LIU F , ZHU J , et al. Reputation-based secure spectrum situation fusion in distributed cognitive radio networks[J]. Journal of China Universities of Posts&Telecommunications, 2015,22(3):110-117. |
[40] | CHEN H , ZHOU M , XIE L , et al. Joint spectrum sensing and resource allocation scheme in cognitive radio networks with spectrum sensing data falsification attack[J]. IEEE Transactions on Vehicular Technology, 2016:1. |
[41] | CHEN C , SONG M , XIN C S . A density based scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks [C]//2013 IEEE Global Communications Conference (GLOBECOM 2013), Dec9-13,2013, Atlanta,GA,USA. New Jersey: IEEE Press, 2013:623-628. |
[42] | 冯景瑜, 卢光跃, 包志强 . 认知无线电安全研究综述[J]. 西安邮电大学学报, 2012,17(2): 47-52. |
FENG J Y , LU G Y , BAO Z Q . A survey on cognitive radiosecurity[J]. Journal of Xi'an University of Posts and Telecommunications, 2012,17(2): 47-52. | |
[43] | 曹龙, 赵杭生, 鲍丽娜 , 等. 协作频谱感知及 SSDF攻击研究[J]. 计算机科学, 2013,40(S1): 307-310. |
CAO L , ZHAO H S , BAO L N , et al. Research on cooperative spectrum sensing and SSDF attacks[J]. Computer Science, 2013,40(S1): 307-310. | |
[44] | 冯景瑜 . 协作频谱感知中的SSDF攻击及其策略研究[J]. 电信科学, 2014,30(1): 67-72. |
FENG J Y . Research on SSDF attack and defense for cooperative spectrum sensing[J]. Telecommunications Science, 2014,30(1): 67-72. | |
[45] | VEGI M K . Study of Byzantine attackers and countermeasures in spectrum sensing[J]. International Journal of Health Promotion &Education, 2014,3(3):100. |
[46] | ZHANG L , DING G , WU Q , et al. Byzantine attack and defense in cognitive radio networks:a survey[J]. IEEE Communications Surveys&Tutorials, 2015,17(3):1. |
[47] | YUCEK T , ARSLAN H . A survey of spectrum sensing algorithms for cognitive radio applications[J]. IEEE Communications Surveys&Tutorials, 2009,11(1):116-130. |
[48] | SOBRON I , DINIZ P S R , MARTINS W , et al. Energy detection technique for adaptive spectrum sensing[J]. IEEE Transactions on Communications, 2015,63(3):617-627. |
[49] | BLAZE M , FEIGENBAUM J , STRAUSS M . Compliance checking in the policymaker trust management system[J]. Financial Cryptography, 1998(1465):254-274. |
[50] | MOOD A M , GRATBILL F A . 统计学导论[M]. 北京: 科学出版社, 1978. |
MOOD A M , GRATBILL F A . Introductory statistics[M]. Beijing: Science Press, 1978. |
[1] | Yueyu JIANG, Haoxin CHENG, Kang WANG, Wenjun DAI, Xiaoyu LIU. Design method of energy efficiency optimization in PLC-RF wireless transmission networks [J]. Telecommunications Science, 2023, 39(4): 111-119. |
[2] | Haijiang GE, Ning JIA, Kaikai CHI, Yunzhi CHEN. Secondary throughput maximization scheme for non-linear energy harvesting cognitive radio networks [J]. Telecommunications Science, 2023, 39(2): 103-117. |
[3] | Zhongjie JIA, Ming JIN, Xiaoqun SONG. A multi-band spectrum sensing method based on sticky hidden Markov model [J]. Telecommunications Science, 2021, 37(1): 48-57. |
[4] | Lin XU,Zhijin ZHAO. A distributed CRN resource allocation algorithm based on CBR and cooperative Q-learning [J]. Telecommunications Science, 2019, 35(2): 35-42. |
[5] | Jie XIAO,Yuebin CHEN,Chutian CHEN,Ting ZHENG,Jiwu QIAN. Variable threshold energy detection algorithm based on trust degree [J]. Telecommunications Science, 2018, 34(8): 129-135. |
[6] | Hongyu DENG,Yiming WANG,Cheng WU. MRR scheduling based cognitive LTE-R eNode B and type of service value priority queue management strategy [J]. Telecommunications Science, 2018, 34(6): 80-90. |
[7] | Chang CAI,Yafang WANG,Bingmei MIAO,Hui JIANG. Dynamic spectrum allocation for cognitive radio sensor networks based on improved genetic algorithm [J]. Telecommunications Science, 2017, 33(8): 85-93. |
[8] | Yunchuan WANG,Xiaorong XU,Yingbiao YAO,Weiwei WU. Design and performance analysis of energy efficiency based CR primary user emulation attack defensive scheme [J]. Telecommunications Science, 2017, 33(8): 100-106. |
[9] | Jiang ZHU,Qingmin DU,Shaowei BA. Joint optimization of power and channel access in cognitive radio network [J]. Telecommunications Science, 2017, 33(2): 55-65. |
[10] | Xiaoyu LI,Shouyi YANG,Xiaojuan ZHAO,Ruizhe ZHANG. Multi-power cognitive access strategy based on multiple primary user traffic [J]. Telecommunications Science, 2017, 33(10): 50-57. |
[11] | Zhijin ZHAO,Xi LV,Shilian ZHENG. Spectrum sensing algorithm based on average value of middle part of power spectral density [J]. Telecommunications Science, 2016, 32(7): 53-60. |
[12] | Guangyue LU,Cai XU,Yinghui YE,Yin MI. Research on spectrum sensing technologies based on goodness of fit [J]. Telecommunications Science, 2016, 32(5): 52-61. |
[13] | Ying LIU,Li ZHENG,Yuansong LI. Performance evaluation of primary user and secondary user based on CSMA protocol in CRSN [J]. Telecommunications Science, 2016, 32(4): 36-43. |
[14] | Zhengjiang SONG,Xiaochen LI,Jiang CHEN. QoS boundary analysis of congestion control protocol based on stochastic network calculus in CRSN [J]. Telecommunications Science, 2016, 32(4): 44-51. |
[15] | Meiying WANG,Jingyu FENG,Guangyue LU,Dingkun HAN. A dynamic trust evaluation scheme for cooperative spectrum sensing [J]. Telecommunications Science, 2016, 32(3): 60-67. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|