Smart contract-based secure cooperative spectrum sensing algorithm

2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110586
Author(s):  
Chu Ji ◽  
Qi Zhu

Spectrum sensing is the key technology of cognitive radio. In this article, we apply blockchain technology in spectrum sensing process and propose a related algorithm based on reputation. The algorithm builds a system model based on smart contract in blockchain and applies blockchain asymmetric encryption algorithm and digital signature technology in the process of secondary users’ transmitting local judgments to the secondary user base station. The algorithm can resist spectrum sensing data falsification (SSDF) attack launched by malicious users. This article comprehensively considers the channel error rate, detection probability, secondary user base station budget and remaining energy of the secondary users (SUs) and then establishes the SU’s utility function as well as the game model. By solving the Nash equilibrium, the SU determines whether it uploads sensing data. Finally, the SU base station selects registered SUs by calculating and updating their reputation, obtaining the final judgment by voting rule. With simulations, we prove that the algorithm proposed in this article increases the accuracy and security of spectrum sensing and can effectively resist SSDF attack.

2021 ◽  
Vol 8 (2) ◽  
pp. 92-100
Author(s):  
Laila Nassef ◽  
Reemah Alhebshi ◽  

Cognitive radio is a promising technology to solve the spectrum scarcity problem caused by inefficient utilization of radio spectrum bands. It allows secondary users to opportunistically access the underutilized spectrum bands assigned to licensed primary users. The local individual spectrum detection is inefficient, and cooperative spectrum sensing is employed to enhance spectrum detection accuracy. However, cooperative spectrum sensing opens up opportunities for new types of security attacks related to the cognitive cycle. One of these attacks is the spectrum sensing data falsification attack, where malicious secondary users send falsified sensing reports about spectrum availability to mislead the fusion center. This internal attack cannot be prevented using traditional cryptography mechanisms. To the best of our knowledge, none of the previous work has considered both unreliable communication environments and the spectrum sensing data falsification attack for cognitive radio based smart grid applications. This paper proposes a fuzzy inference system based on four conflicting descriptors. An attack model is formulated to determine the probability of detection for both honest and malicious secondary users. It considers four independent malicious secondary users’ attacking strategies of always yes, always no, random, and opposite attacks. The performance of the proposed fuzzy fusion system is simulated and compared with the conventional fusion rules of AND, OR, Majority, and the reliable fuzzy fusion that does not consider the secondary user’s sensing reputation. The results indicate that incorporating sensing reputation in the fusion center has enhanced the accuracy of spectrum detection and have prevented malicious secondary users from participating in the spectrum detection fusion


Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 1038 ◽  
Author(s):  
Noor Gul ◽  
Muhammad Sajjad Khan ◽  
Su Min Kim ◽  
Junsu Kim ◽  
Atif Elahi ◽  
...  

Cooperative spectrum sensing (CSS) has the ability to accurately identify the activities of the primary users (PUs). As the secondary users’ (SUs) sensing performance is disturbed in the fading and shadowing environment, therefore the CSS is a suitable choice to achieve better sensing results compared to individual sensing. One of the problems in the CSS occurs due to the participation of malicious users (MUs) that report false sensing data to the fusion center (FC) to misguide the FC’s decision about the PUs’ activity. Out of the different categories of MUs, Always Yes (AY), Always No (AN), Always Opposite (AO) and Random Opposite (RO) are of high interest these days in the literature. Recently, high sensing performance for the CSS can be achieved using machine learning techniques. In this paper, boosted trees algorithm (BTA) has been proposed for obtaining reliable identification of the PU channel, where the SUs can access the PU channel opportunistically with minimum disturbances to the licensee. The proposed BTA mitigates the spectrum sensing data falsification (SSDF) effects of the AY, AN, AO and RO categories of the MUs. BTA is an ensemble method for solving spectrum sensing problems using different classifiers. It boosts the performance of some weak classifiers in the combination by giving higher weights to the weak classifiers’ sensing decisions. Simulation results verify the performance improvement by the proposed algorithm compared to the existing techniques such as genetic algorithm soft decision fusion (GASDF), particle swarm optimization soft decision fusion (PSOSDF), maximum gain combination soft decision fusion (MGCSDF) and count hard decision fusion (CHDF). The experimental setup is conducted at different levels of the signal-to-noise ratios (SNRs), total number of cooperative users and sensing samples that show minimum error probability results for the proposed scheme.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Feng Zhao ◽  
Shaoping Li ◽  
Jingyu Feng

Cooperative spectrum sensing (CSS) has been recognized as a forceful approach to promote the utilization of spectrum bands. Nevertheless, all secondary users (SU) are assumed as honest in CSS, thus giving opportunities for attackers to launch the spectrum sensing data falsification (SSDF) attack. To defend against such attack, many efforts have been made to trust mechanism. In this paper, we argue that securing CSS with only trust mechanism is not enough and report the description of dynamic-collusive SSDF attack (DC-SSDF attack). To escape the detection of trust mechanism, DC-SSDF attackers can maintain high trust by submitting true sensing data dynamically and then fake sensing data in the collaborative manner to increase their attack strength. Noting that the resonance phenomenon may appear in the trust value curve of DC-SSDF attackers, a defense scheme called TFCA is proposed from the design idea of trust fluctuation clustering analysis to suppress DC-SSDF attack. In the TFCA scheme, the decreasing property of trust value in the resonance phenomenon is adopted to measure the similarity distance between two attackers. Based on the similarity distance computation, the binary clustering algorithm is designed by electing initial binary samples to identify DC-SSDF attackers. Finally, trust mechanism can be perfected by TFCA to correct DC-SSDF attackers’ trust value. Simulation results show that our TFCA scheme can improve the accuracy of trust value calculation, thus reducing the strength of DC-SSDF attack successfully.


2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
S. Tephillah ◽  
J. Martin Leo Manickam

Security is a pending challenge in cooperative spectrum sensing (CSS) as it employs a common channel and a controller. Spectrum sensing data falsification (SSDF) attacks are challenging as different types of attackers use them. To address this issue, the sifting and evaluation trust management algorithm (SETM) is proposed. The necessity of computing the trust for all the secondary users (SUs) is eliminated based on the use of the first phase of the algorithm. The second phase is executed to differentiate the random attacker and the genuine SUs. This reduces the computation and overhead costs. Simulations and complexity analyses have been performed to prove the efficiency and appropriateness of the proposed algorithm for combating SSDF attacks.


2018 ◽  
Vol 7 (2.20) ◽  
pp. 335
Author(s):  
Shweta Alpna ◽  
Amrit Mukherjee ◽  
Amlan Datta

The proposed work illustrates a novel technique for cooperative spectrum sensing in a cognitive radio (CR) network. The work includes an approach of identifying secondary users (SUs) based on Hierarchical Maximum Likelihood (HML) technique followed by Vector Quantization. Initially, the arrangement of the SUs are been observed using HML with respect to a spatial domain and then the active SUs among them are identified using VQ. The approach will not only save the energy, but the decision of the real-time and dynamic cooperative communication network becomes more accurate as we can predict the behavior of SUs movement and spectrum sensing by each individual SU at that particular  place. The results and simulations of the real-time experiment justifies with the proposed approach. 


2021 ◽  
Vol 235 ◽  
pp. 03020
Author(s):  
Qian Liao ◽  
Mimi Shao

Features like the distributed ledger, consensus mechanism, asymmetric encryption technology, smart contract and Token of blockchain can lower transaction cost, enhance trust between customers and merchants, as well as eliminate false payment and consumer information leakage, problems which are common in current payment of cross-border E-Commerce platform. Based on the analysis of existing scholars, this paper studied two payment models: digital cash payment based on blockchain technology and the application of blockchain in third-party payment platform. Then the paper discussed the mechanism of blockchain in cross-border e-commerce payment platform, and creatively proposed a blockchain cross-border e-commerce payment platform, serving as reference and guidance for further development of blockchain technology in cross-border payment.1


2020 ◽  
Author(s):  
Rahil Sarikhani ◽  
Farshid Keynia

Abstract Cognitive Radio (CR) network was introduced as a promising approach in utilizing spectrum holes. Spectrum sensing is the first stage of this utilization which could be improved using cooperation, namely Cooperative Spectrum Sensing (CSS), where some Secondary Users (SUs) collaborate to detect the existence of the Primary User (PU). In this paper, to improve the accuracy of detection Deep Learning (DL) is used. In order to make it more practical, Recurrent Neural Network (RNN) is used since there are some memory in the channel and the state of the PUs in the network. Hence, the proposed RNN is compared with the Convolutional Neural Network (CNN), and it represents useful advantages to the contrast one, which is demonstrated by simulation.


2014 ◽  
Vol 556-562 ◽  
pp. 5219-5222
Author(s):  
Wei Wu ◽  
Xiao Fei Zhang ◽  
Xiao Ming Chen

Compared with the single user spectrum sensing, cooperative spectrum sensing is a promising way to improve the detection precision. However, cooperative spectrum sensing is vulnerable to a variety of attacks, such as the spectrum sensing data falsification attack (SSDF attack). In this paper, we propose a concise cooperative spectrum sensing scheme based on a reliability threshold. We analyze the utility function of SSDF attacker in this scheme, and present the least reliability threshold for the fusion center against SSDF attack. Simulation results show that compared with the traditional cooperative spectrum sensing scheme, the SSDF attacker has a much lower utility in our proposed scheme, which drives it not to attack any more.


Sign in / Sign up

Export Citation Format

Share Document