A Context-Aware Trust Framework for Resilient Distributed Cooperative Spectrum Sensing in Dynamic Settings



Vosoughi, A, Cavallaro, J and Marshall, A ORCID: 0000-0002-8058-5242
(2017) A Context-Aware Trust Framework for Resilient Distributed Cooperative Spectrum Sensing in Dynamic Settings. IEEE Transactions on Vehicular Technology, 66 (10). pp. 9177-9191.

This is the latest version of this item.

[img] Text
07950988.pdf - Author Accepted Manuscript

Download (1MB)

Abstract

Cognitive radios enable dynamic spectrum access where secondary users (SUs) are allowed to operate on the licensed spectrum bands on an opportunistic noninterference basis. Cooperation among the SUs for spectrum sensing is essential for environments with deep shadows. In this paper, we study the adverse effect of insistent spectrum sensing data falsification (ISSDF) attack on iterative distributed cooperative spectrum sensing. We show that the existing trust management schemes are not adequate in mitigating ISSDF attacks in dynamic settings where the primary user (PU) of the band frequently transitions between active and inactive states. We propose a novel context-aware distributed trust framework for cooperative spectrum sensing in mobile cognitive radio ad hoc networks (CRAHN) that effectively alleviates different types of ISSDF attacks (Always-Yes, Always-No, and fabricating) in dynamic scenarios. In the proposed framework, the SU nodes evaluate the trustworthiness of one another based on the two possible contexts in which they make observations from each other: PU absent context and PU present context. We evaluate the proposed context-aware scheme and compare it against the existing context-oblivious trust schemes using theoretical analysis and extensive simulations of realistic scenarios of mobile CRAHNs operating in TV white space. We show that in the presence of a large set of attackers (as high as 60% of the network), the proposed context-aware trust scheme successfully mitigates the attacks and satisfy the false alarm and missed-detection rates of $10^{-2}$ and lower. Moreover, we show that the proposed scheme is scalable in terms of attack severity, SU network density, and the distance of the SU network to the PU transmitter.

Item Type: Article
Uncontrolled Keywords: sensors, mobile communication, context, vehicle dynamics, peer-to-peer computing, transmitters, mobile computing
Depositing User: Symplectic Admin
Date Deposited: 12 Sep 2017 10:00
Last Modified: 19 Jan 2023 06:54
DOI: 10.1109/TVT.2017.2716361
Related URLs:
URI: https://livrepository.liverpool.ac.uk/id/eprint/3009428

Available Versions of this Item