YE Fang,BAI Ping,and TIAN Yuan
College of Information and Communication Engineering,Harbin Engineering University,Harbin 150001,China
Abstract: In cognitive radio networks, spectrum sensing is one of the most important functions to identify available spectrum for improving the spectrum utilization. Due to the open characteristic of the wireless electromagnetic environment,the wireless network is vulnerable to be attacked by malicious users (MUs), and spectrum sensing data falsification (SSDF) attack is one of the most harmful attacks on spectrum sensing performance. In this article,an algorithm based on the evidence theory and fuzzy entropy is proposed to resist SSDF attacks. In this algorithm, secondary users(SUs)obtain the corresponding degree of membership function and basic probability assignment function based on the local energy detection result. The new conflicting coefficient is calculated based on the evidence distance and classical conflicting coefficient, and the conflicting weight of the evidence is obtained.The fuzzy weight is calculated by the fuzzy entropy. The credibility weight is obtained by updating the credibility. On this basis, the probability assignment function of the evidence is corrected, and the final result is obtained by using the fusion formula. Simulation results show that the proposed algorithm has a higher detection probability and lower false alarm probability than other algorithms.It can effectively defend against SSDF attacks and improve the performance of spectrum sensing.
Keywords: cooperative spectrum sensing,evidence theory,fuzzy entropy,spectrum sensing data falsification(SSDF).
With the rapid development of wireless communication technology,the conventional static spectrum management policy cannot satisfy the demand for the wireless spectrum resources[1,2].As the most proposed solution to the spectrum resources problem,cognitive radio(CR)has attracted widespread attention[3].Spectrum sensing enables opportunistic spectrum usage of white spaces under the premise of not causing harmful interference to the primary user(PU)[4,5].
Spectrum sensing is the premise of the successful implementation of CR [6,7]. Among various spectrum sensing techniques,energy detection is widely used due to its low implementation complexity and without any prior knowledge about signal features[8].Due to the influence of multipath fading and shadowing in the wireless channel, it is difficult for single user sensing to ensure the accuracy of spectrum sensing [9–11]. In order to solve this problem,scholars use the cooperative spectrum sensing technology,which enables numerous users to participate in the sensing at the same time and make the final judgment about the primary user information[12–14].Cooperative spectrum sensing is confronted by spectrum sensing data falsification (SSDF) attacks by which malicious users (MUs) intentionally report fake sensing results to mislead decisionmaking[15–17].
In order to resist the SSDF attack,plenty of algorithms based on the Dempster-Shafer (D-S) theory of evidence have been proposed. In [18], a new method based on decision making trial and evaluation laboratory(DEMATEL)is proposed to take the weight of each evidence into consideration.Zhang et al.proposed a spectrum sensing algorithm based on an improved D-S evidence theory in [19],and improved spectrum sensing performance by using improved D-S evidence theory fusion rules.In[20],a cooperative spectrum sensing algorithm based on a weighted D-S evidence theory is used to resist SSDF attacks, in which the weight is a function of the energy and position.Peng et al. proposed a spectrum sensing algorithm based on trust and the D-S evidence theory in [21]. Due to the different environments of the secondary users(SUs), the reliability of the detection results is inconsistent.Evidence theory is introduced to solve the final decision problem of the trust value.Nie et al.proposed a cooperative spectrum sensing algorithm based on dynamic double threshold and the D-S evidence theory in[22]to reduce the network overhead and the computational of the fusion center.In[23],Feng et al.proposed a trust evaluation mechanism based on the D-S evidence theory—HardGuard, which took preprocessing measures to filter false perceptual data before fusion and avoided the influence of MUs.In[24],Men et al.proposed an evaluation method which considers the sensor node reliability and the mutually supportive degree among different sensor nodes.In[25],Yu et al.used the similarity degree to calculate the reliability of evidence to defend against SSDF attacks.
The above several security spectrum sensing schemes based on the evidence theory only consider the difference of the similarity of user’s evidence,and ignore the distance between the data and the degree of determination.To target the aforementioned problems and improve the detection accuracy in the spectrum sensing,this paper proposes an algorithm against SSDF attacks based on the evidence theory and fuzzy entropy.
The rest of this article is organized as follows.Section 2 introduces the system model and the SSDF attack mode.In Section 3, an algorithm against SSDF attack based on the evidence theory and fuzzy entropy is described in detail.Section 4 verifies the performance of the algorithm in different SSDF attack modes. Section 5 depicts the final conclusions.
Due to the shadowing and multipath fading,multiple SUs perform cooperative spectrum sensing in this paper to solve the problem of inaccurate estimation of the spectral holes by a single SU [26,27].Considering a cognitive radio network shown in Fig.1,there is a PU,a fusion center(FC)and several SUs.SUs use energy detection to obtain energy values xEiand make decisions diby being compared with thresholds.Then the users transfer the local decision through the control channel to the FC to make the final decision d through certain fusion criteria.
Fig.1 System model
There are three main types of SSDF attacks in the process of cooperative spectrum sensing[28].
Always busy (AB) attack: regardless of the result of the judgment, the MUs determine the result as 1 so as to achieve the purpose of monopolizing the specific frequency band.
Always free(AF)attack: regardless of the result of the judgment,the MUs will set the judgment as 0 so as to cause more interference to the PU.
Always opposite(AO) attack: the MUs tamper the decision result 0 to 1, and tamper the result 1 to 0.The first two attacks can be seen as a special form of AO attack.
From the perspective of cognition, the greater the uncertainty of the evidence is, the worse the credibility is, and the worse the decision would be, vice versa. Aiming at the uncertainties of perceptual results,the fuzzy entropy is used to represent the uncertainties,which improves the reliability of the results.The D-S evidence theory is a mathematical theory which can deal with uncertain information effectively. In this paper, it is used as a fusion algorithm for cooperative spectrum sensing.This paper combines the fuzzy entropy and evidence distance to express the uncertainty of the evidence and define the weights of the evidence.
Assuming that s(t)denotes the signal transmitted by a PU,ni(t)denotes the additive white Gaussian noise on the authorized frequency band, h(t) is the channel gain on the authorized band,xi(t)represents the received signal at the ith SU (i = 1,2,...,N), where N is the number of SUs participating in cooperative spectrum sensing.
In this paper, the local spectrum sensing is realized by the energy detection method.The detection statistics of the energy detection is as follows:
where k denotes the kth sampling point and N = 2T W,T and W are the product of the signal duration and signal bandwidth.According to the central limit theorem,xEiis approximately subject to the Gaussian distribution when N is large enough.
Consider a subset A on the domain X, and for any x be-longing to X, we specify a number μA(x) ∈ [0,1]to denote the degree of x belonging to A,it can be expressed as A={(x,μA(x)|x ∈ X}.μA(x)is called the membership function(generalized characteristic function)of A. Membership functions can be approximated by some common functions which are in accordance with the essential characteristics of fuzzy variables.
There are two possible outcomes of the spectrum sensing: H1and H0. Θ indicates that the result might be H1or H0. For a subset H0of the decision result domain of spectrum sensing, a numberis assigned to any detection statisticto denote the degree ofbelonging to H0.is called the membership function of H0.When the number of sampling points is large enough,the membership function is Gauss-type becauseobeys the Gaussian distribution in the two cases of H1and H0.
The degree of xEibelonging to Θ can be expressed as
As the values of the adjustment factor increase, the downward trend of the membership function curve in (3)becomes slower and the opening range becomes larger.The probability that the random variable xEifalls outside(μ ? 3σ,μ +3σ)is less than three-thousandths,which is the“3σ”principle of the normal distribution.Consider that the majority of xEican be assigned a reasonable degree of membership,the adjustment factor a is set to 9.
Assuming that there is a decision problem, we can recognize that the set of all possible outcomes is denoted by Ω which is called the recognition framework.The function is called BPA when the following conditions are satisfied:
For any A belonging to Ω, m(A) is called the BPA of proposition A.
In spectrum sensing, the recognition framework Ω is composed of H1,H0and Θ. The sum of the BPSs under the same recognition frame Ω is 1[29].The BPA functions of H1,H0and Θ are shown as follows.
When an MU launches an AO, AF or AB attack, there is a difference between the data reported to the FC and the data reported by the honest user. The classical conflict coefficient is usually used to describe the degree of non-inclusion of the focal elements, but when the data are completely in conflict,the correct result cannot be obtained.Later,the distance function was proposed to solve the above problems. The distance and the conflict in the representation of evidence are complementary.In order to better describe the conflicts of different user data,this paper combines the two and defines a new conflict coefficient to accurately identify MUs.
For the decision results H1and H0of spectrum sensing,the BPAs arerespectively. The distance between the propositions H1and H0can be expressed as
where D is a positive definite matrix,and the elements in the matrix satisfyand ∪ represent intersection and union,respectively.
The distance between focal elements mH1and mH0is a function of D.|Ai∩Aj|denotes the similarity between Aiand Aj. If |Ai∩Aj| = 0, it shows that there is no common element between Aiand Aj, and the similarity is 0.Thus,we can use the distance of evidence to express the degree of difference between evidence.The greater the distance is, the greater the difference between them will be,and vice versa.
In addition, the expression of the classical conflicting coefficient for the two basic probability functions is
where i = 1,2,...,n (or j = 1,2,...,n) represents the ith(or jth)evidence.
We define the new conflicting cfijbetween users i and j as follows,and cfij∈[0,1].
After obtaining the degree of conflicting between SUs,a matrix of the degree of conflicting can be constructed:
The similarity can be calculated according to the new conflicting coefficient between the uers:
The similarity matrix S of the evidence can be obtained:
Calculate the degree of the ith user presented by other users:
Normalize the support degree of the user to obtain the conflicting weight:
In the energy detection algorithm, the selection of the threshold value is very important,and it will have a great influence on the final sensing performance.When the detection value is near the threshold value,there is some uncertainty in the spectrum sensing results. The fuzzy entropy is a measure of fuzziness proposed by Bandemer.It can be represented by the fuzzy entropy in view of the uncertainty of sensing results. Let A be a fuzzy set, then its fuzzy entropy can be expressed as
where yiis the element of the fuzzy set A,and μA(yi)indicates the degree of yibelonging to the set A.
For the three decision results H1,H0and Θ, the fuzzy entropy of the evidence in the spectrum sensing system can be expressed as
The larger the fuzzy entropy of the evidence is, the greater the uncertainty of the evidence is, the more intractable decision-making could be [30]. When the fuzzy entropy is large,it is given a small weight,which reduces its impact on the final result [31]. Therefore, the fuzzy weight of the user is defined as a negative exponential form of the constant,i.e.,
The evidence weights based on users’data are obtained by combining the conflicting weight based on the new conflicting coefficient with the fuzzy weight based on the fuzzy entropy.The calculation method is as follows:
In cooperative spectrum sensing,the global decision result obtained by the FC is taken as a reference to judge whether the SU’s local decision is correct or not, and the credibility of the user is updated.The calculation method of credibility is defined as follows:
where didenotes the local sensing results of SUi, and d0represents the global decision result of the FC.If diis consistent with d0, the credibility of SUiis increased by 1;otherwise,the credibility of SUiis subtracted by τ.τ is a constant greater than 1,which is used to increase the credibility slowly but decreases rapidly.The calculation of θ is as follows:
The comprehensive weight ωiof SUiis obtained by combining the evidence weightwith the weight of credibility
The honest users and MUs are distinguished according to their credibility weights.MUs are not allowed to participate in subsequent evidence fusion when they launch AO,AF or AB attack.For the honest users,the BPA function is modified by using the above comprehensive weight,that is
Finally, two or more BPA functions are orthogonal and calculated by using the D-S fusion formula to get the total BPA function which is used to be compared with the thresholdλto get the final decision resultd0.
whereBandCcan beH1,H0or Θ.
Given the above discussion,the procedures of the algorithm based on the evidence theory and fuzzy entropy to resist SSDF attacks is given in the following.
(i)Each user obtains the local sensing result through energy detection.
(ii)The degree of membership function and BPA function are assigned to SUs according to the sensing result.
(iii)The new conflicting coefficient and the conflicting weight are obtained according to the evidence distance and classical conflicting coefficient.
(iv) The fuzzy weight of evidence is obtained by the fuzzy entropy.
(v) The credibility is updated to obtain the credibility weight.
(vi)The BPA of the evidence is corrected based on the above weight.
(vii)The final result is obtained by using the fusion formula.
The simulation experiments are provided to evaluate the performance of the algorithm based on the evidence theory and fuzzy entropy.The algorithm is compared with the following methods, the single-user detection method(denoted as SIN in the figures), a method for evaluating the reliability of sensor nodes and the degree of mutual support between different sensor nodes proposed by Men et al. [24]. Yu et al. used the similarity of the evidence to calculate the reliability of users [25]. The simulation parameters are set as follows: there is a PU and an FC in the system,the number of SUs participating in cooperative spectrum sensing is 6,and the time bandwidth productuis 10.The probability that the PU exists is 0.5,so is the absence.τ’s value is 2.The intensity of AF attack is 0.5,and the strength of AB attack is 2. The credibility threshold is 0.7, and the number of simulations is 10 000. Assuming that the transmission channel is not affected by shadow fading,the channel gain is a constant.
Figs. 2–4 show the receiver operating characteristic(ROC)curve of two MUs who launch the same attack type.Fig.2 shows that there are two AO attack users in the system, and the proportion of MUs is 33%. It can be seen that the performance of the proposed algorithm is obviously better than that of the other two algorithms. When two users simultaneously launch AO attacks,the data similarity is small,and the method based on user similarity and mutual support cannot be accurately sensed,so the performance is not good.
Fig.2 ROC of two users launching AO attack
Fig.3 ROC of two users launching AB attack
Fig. 3 shows that there are two AB attack users in the system.It can be seen that the performance of the proposed algorithm is the best. Because the other two algorithms have a worse ability to distinguish honest users from MUs when the number of MUs increases, and MUs constantly report the results of the existence of the main user signal,resulting in a small difference in the detection statistics of the users. Therefore, the performance of the algorithms proposed in [25] and [24] are similar, but they are better than the single-user detection algorithm.
Fig.4 ROC of two users launching AF attack
Fig. 4 shows that there are two AF attack users in the system.It can be seen that the performance of the proposed algorithm is the best. The performance of the algorithm proposed by Yu et al.is slightly worse.Then it is the algorithm based on the degree of mutual support of users proposed by Men et al.The worst performance is the method of single-user detection.
Figs. 5–7 show that there are two MUs, but the two users adopt different types of attacks, the proportion of MUs is 33%.Fig.5 shows that there is an AB attack user and an AF attack user in the system.It can be seen that the proposed algorithm is superior to the other two algorithms.
Fig.5 ROC of a user launching AF attack and a user launching AB attack
Fig.6 ROC of a user launching AO attack and a user launching AB attack
Fig.7 ROC of a user launching AF attack and a user launching AO attack
Because of the large gap between the AB attack and the AF attack data, the user data is recognized.The similarity between the two is low,and the algorithm proposed by Yu et al.can play a better role,and the performance is the second.Since the data reported to the FC is quite different,honest users cannot judge whether the results are correct,so the performance of Men’s algorithm based on user mutual support is affected,which is slightly lower than that of other algorithms.
Fig.6 shows the ROC curves for an AO attack user and Fig. 7 shows an AB attack user, an AO attack user and an AF attack user. Because the new conflict coefficient is quoted and the influence of evidence distance on data similarity is considered,the detection accuracy of the proposed algorithm is higher, while the other two algorithms cannot identify MU data accurately,so the performance of the proposed algorithm is obviously better than that of other algorithms.
Figs. 8–10 show the ROC curve of the system under AF,AO and AB attacks,where there are four MUs in cognitive wireless networks, and the proportion of MUs is 66%.
Fig.8 ROC of four users launching AF attack
Fig.9 ROC of four users launching AO attack
Fig.10 ROC of four users launching AB attack
As can be seen from Fig.8,for the case of four AF attacks,the proposed algorithm performs the best,the algorithm proposed by Yu et al.the second,and the algorithm proposed by Men et al. the third, and the worst performance comes from the single-user detection method.Since the conflict coefficient is redefined in this paper and is used as a part of the weight coefficient,the conflict between data is described more accurately,so the optimal detection performance is obtained.
As can be seen from Fig. 9, when there are four AO attack users in the system, the detection performance decreases due to the high proportion of malicious data. Because the Jousselme distance of evidence is introduced to distinguishing the data better, the performance of this algorithm is better than that of other algorithms.
As can be seen from Fig.10,when there are four AB attack users in the system,the detection probability is higher because the users keep reporting the results of the presence of the PU signal.The performances in [25]and[24]are close. The algorithm introduces the fuzzy weight of evidence and provides an approximate result when the FC cannot completely determine the sensory data, which improves the detection performance.
Figs. 11–13 show that four MUs launch different attacks, and the proportion of MUs is 66%. It can be seen from Fig.11 that the proposed algorithm performs the best when there are two AF attack users and two AO attack users, followed by the algorithm proposed by Men et al.,then the algorithm proposed by Yu et al., and finally the single-user sensing algorithm.
Fig.11 ROC of two user launching AF attack and two user launching AO attack
Fig.12 ROC of two user launching AB attack and two user launching AO attack
Fig.13 ROC of two user launching AB attack and two user launching AF attack
Compared with the result in Fig.12,it can be seen that the algorithm proposed in[25]is more suitable for AB attack, and the algorithm proposed in [24] is more suitable for AF attack.
When there are two AB attack users and two AF attack users,the data reported by the users are quite different,and the detection performance of the three algorithms is similar. However, the algorithm in this paper considers both data similarity and uncertainty,so it has the best detection effect.
In order to solve the problem of SSDF attacks by MUs,an algorithm based on the evidence theory and fuzzy entropy is proposed in this paper. The SUs obtain the degree of membership function and BPA function according to the local result by energy detection. The new conflicting coefficient is calculated based on the evidence distance and classical conflicting coefficient,and the conflicting weight of the evidence is obtained. The fuzzy entropy is used to obtain the fuzzy weight.The credibility weight is obtained by updating the credibility. The BPA function of the evidence is corrected based on the above weight. The final result is obtained by using the fusion formula. Simulation results show that the proposed algorithm can maintain a good performance under different attack modes of the MUs. Compared with other algorithms, the proposed algorithm has a good robustness and can effectively resist SSDF attacks.
Journal of Systems Engineering and Electronics2020年2期