Countering Byzantine attacks in cognitive radio networks

Ankit Singh Rawat, Priyank Anand, Hao Chen, Pramod K. Varshney

Research output: Chapter in Book/Entry/PoemConference contribution

63 Scopus citations

Abstract

Collaborative (or distributed) spectrum sensing has been shown to have various advantages in terms of spectrum utilization and robustness in cognitive radio networks (CRNs). The data fusion scheme is a key component of collaborative spectrum sensing. We have recently analyzed the problem of Byzantine attacks in CRNs, where malicious users send false sensing data to the fusion center (FC) leading to an increased probability of spectrum sensing error. In this paper, we propose a novel and easy to implement technique to counter Byzantine attacks in CRNs. In this approach, the FC identifies the attackers and removes them from the data fusion process. Our analysis indicates that the proposed scheme is robust against Byzantine attacks and can successfully remove the Byzantines in a short time span.

Original languageEnglish (US)
Title of host publication2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages3098-3101
Number of pages4
ISBN (Print)9781424442966
DOIs
StatePublished - 2010
Event2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Dallas, TX, United States
Duration: Mar 14 2010Mar 19 2010

Publication series

NameICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
ISSN (Print)1520-6149

Other

Other2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010
Country/TerritoryUnited States
CityDallas, TX
Period3/14/103/19/10

Keywords

  • Byzantine attacks
  • Cognitive radio networks
  • Network security
  • Spectrum sensing

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Countering Byzantine attacks in cognitive radio networks'. Together they form a unique fingerprint.

Cite this