Dynamic Sliding Window‐cooperative Spectrum Sensing Against Massive SSDF Attack in Interweave Cognitive Internet of Things

Gefei Zhu,Jun Wu,Mingkun Su,Xiaorong Xu,Mingyuan Dai,Lei Qiao,Jipeng Gan,Jiangtao He,Weiwei Cao
DOI: https://doi.org/10.1002/ett.4955
IF: 3.6
2024-01-01
Transactions on Emerging Telecommunications Technologies
Abstract:To improve spectrum utilization, cognitive radio (CR) enables unauthorized internet of thing (IoT) devices to opportunistically access the channel underutilized by the primary user (PU) in a cognitive IoT (CIoT). To this end, cooperative spectrum sensing (CSS) plays a crucial role in CR technology, which leverages the spatial diversity of corroborative IoT devices to accurately detect the PU signal. However, this open cooperative paradigm may suffer from spectrum sensing data falsification (SSDF) attack in which malicious IoT devices intentionally mislead the fusion center (FC) by providing false sensing results to make an incorrect global decision regarding the PU status. To effectively characterize the attack behavior of malicious IoT devices, we propose a massive SSDF attack model described by the attack cycle and malicious ratio within a sensing period to characterize the malicious behaviors. Additionally, we introduce a delivery evaluation mechanism and propose a dynamic sliding window‐CSS (DSW‐CSS) to mitigate the impact of massive SSDF attack. Moreover, we introduce a sequential reporting mechanism to further reduce the number of samples required by the global decision‐making of the FC. Finally, simulation results show the flexibility and aggressiveness of the proposed attack model and demonstrate the correctness and effectiveness of DSW‐CSS.
What problem does this paper attempt to address?