Securing Cooperative Spectrum Sensing Against Collusive False Feedback Attack in Cognitive Radio Networks.

Jingyu Feng,Shaoping Li,Shaoqing Lv,Honggang Wang,Anmin Fu
DOI: https://doi.org/10.1109/tvt.2018.2841362
IF: 6.8
2018-01-01
IEEE Transactions on Vehicular Technology
Abstract:Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce spectrum resources. However, CSS assumes that all secondary users (SU) always are honest, thus offering opportunities for attackers to launch spectrum sensing data falsification (SSDF) attack. To combat such threat, recent efforts have been made to trust mechanism. In this paper, we argue that powering CSS with trust mechanism is not enough. A vulnerability for trust mechanism is found, that is, the feedback data from initiator SUs are generally unchecked. Such feedback data corresponding to the spectrum status of primary users can be exploited by attackers to disturb trust mechanism in a collusive manner. Especially, collusive false feedback (CFF) attackers would form a clique to help each other. One of CFF attackers can disguise as an initiator SU who sends the feedback in accordance with the sensing data of their conspirators who play the role of cooperating SUs, resulting in promoting their conspirators' sensing trust quickly. With high sensing trust, attackers can avoid the detection of trust mechanism and, hence, launch SSDF attack (fake sensing data) more easily. We conduct an in-depth investigation on CFF attack and propose a two-level defense scheme called FeedGuard from the design ideas of feedback trust and I-C frequency correlation analysis. Simulation results show that the FeedGuard scheme can enhance the accuracy of sensing trust evaluation, thus successfully reducing the power of CFF attack against CSS.
What problem does this paper attempt to address?