A SSDF Defense Algorithm Under a Probabilistic Cooperative Attack Model in CRNs

Chen, Lingling
DOI: https://doi.org/10.1007/s40998-023-00617-6
2023-06-25
Abstract:Due to the openness of wireless networks, cooperative spectrum sensing (CSS) is extremely vulnerable to attacks by spectrum sensing data falsification (SSDF) as the core part of cognitive radio. To ensure data security for spectrum sensing, this paper proposes a soft byzantine attack with a variable attack probability (VAP) model, where the attackers change the attack probability continuously according to their trust value through cooperation. In this model, the attackers are classified into primary attackers (PA) and cooperative attackers (CA). The CAs are restricted to passively receiving the attack report of the PAs, thus reducing the attack cost. Under the VAP model, there is a catastrophic blow struck against many of the existing trust defence algorithms when using SSDF for constantly changing the attack parameters and for the cooperating attacks. Therefore, a frequency change rate (FCR) defence algorithm is proposed based on the frequency of change of the trust value in the traditional algorithm. PA and CA can be eliminated by the FCR algorithm, and it can ensure that large quantities of honest users with perceptual errors will not be eliminated. In the system simulation process performed with Python, the model and the defence algorithm are taken into consideration. Compared with the traditional static attack model, the VAP attack model proposed in this study is more destructive to the channel, which renders the traditional trust algorithm invalid. Both the PA and CA are distinctive for their use of the FCR algorithm. Compared with the traditional trust algorithm, the trust value of the attackers is effectively reduced, with the final detection probability improved by approximately 40%. Moreover, the detection probability is improved by approximately 20% when compared with the no-defence algorithm.
engineering, electrical & electronic
What problem does this paper attempt to address?