IDEAS home Printed from https://ideas.repec.org/a/spr/telsys/v81y2022i1d10.1007_s11235-022-00935-w.html
   My bibliography  Save this article

Recognition and elimination of SSDF attackers in cognitive radio networks

Author

Listed:
  • Fatemeh Zardosht

    (Shiraz University)

  • Mostafa Derakhtian

    (Shiraz University)

  • Ali Jamshidi

    (Shiraz University)

  • Hossein Eshaghi

    (Yazd University)

Abstract

The nature of cognitive radio (CR) technology creates a lot of opportunities for attackers. When an attack occurs, the function of the primary network is affected and thus the overall system performance will be reduced. In the present paper, we introduce and simulate a novel method for identifying spectral sensing data falsification (SSDF) attack and recognizing the malicious users (MU), which we refer to as “Recognition and Elimination of SSDF Attackers”. Our proposed scheme uses the generalized likelihood ratio test (GLRT) approach for solving the MUs detection problem. In this method, we do not need previous information about the network and number of the MUs and secondary users (SUs). In addition to detecting the occurrence of an attack, our method can recognize attackers. By recognizing the MUs, their negative effect will be eliminated and the cognitive radio network (CRN) performance will return to normal condition. Consequently, our scheme can save resources by identifying the strategy of the known attackers. Simulation results reveal that our detection and recognition scheme is better than some of methods available.

Suggested Citation

  • Fatemeh Zardosht & Mostafa Derakhtian & Ali Jamshidi & Hossein Eshaghi, 2022. "Recognition and elimination of SSDF attackers in cognitive radio networks," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 81(1), pages 53-66, September.
  • Handle: RePEc:spr:telsys:v:81:y:2022:i:1:d:10.1007_s11235-022-00935-w
    DOI: 10.1007/s11235-022-00935-w
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s11235-022-00935-w
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s11235-022-00935-w?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Runze Wan & Lixin Ding & Naixue Xiong & Xing Zhou, 2019. "Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks," International Journal of Distributed Sensor Networks, , vol. 15(9), pages 15501477198, September.
    2. Chu Ji & Qi Zhu, 2021. "Smart contract-based secure cooperative spectrum sensing algorithm," International Journal of Distributed Sensor Networks, , vol. 17(12), pages 15501477211, December.
    3. Jun Wu & Tiecheng Song & Yue Yu & Cong Wang & Jing Hu, 2018. "Sequential cooperative spectrum sensing in the presence of dynamic Byzantine attack for mobile networks," PLOS ONE, Public Library of Science, vol. 13(7), pages 1-32, July.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.

      Corrections

      All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:telsys:v:81:y:2022:i:1:d:10.1007_s11235-022-00935-w. See general information about how to correct material in RePEc.

      If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

      If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

      If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

      For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

      Please note that corrections may take a couple of weeks to filter through the various RePEc services.

      IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.