Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3589883.3589924acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmltConference Proceedingsconference-collections
research-article

Support Vector Machine Process Against Probabilistic Byzantine Attack for Cooperative Spectrum Sensing in CRNs

Published: 27 June 2023 Publication History

Abstract

In view of the spectrum shortage problem of wireless devices and applications, cognitive radio (CR) allows secondary users (SUs) with a signal detection function to opportunistically access spectrum resources being authorized to primary users (PUs) by means of cooperative spectrum sensing (CSS). However, the inherent openness of CR technology provides an opportunity for malicious SUs (MSUs) to launch Byzantine attack, therefore undermining the premise of CR. For this reason, motivated by advantages of machine learning, we make use of support vector machine (SVM) to identify MSUs by providing a maximum margin hyperplane in this paper, in which the generated spectrum sensing data features benefit from the PU status in the training process. This paper makes an in-depth analysis on the SUs’ sensing results in the presence of a large-scale probabilistic Byzantine attack by the SVM process and provides a method linking with a reputation structure to identify those potential MSUs and mitigate the negative impact of Byzantine attack on CSS. Finally, a series of numerical simulation result shows that the security of the CSS process can be guaranteed by selecting those reliable sensing results identified by means of SVM, especially in a large-scale attack.

References

[1]
K K Singh, P Yadav, A Singh, G Dhiman, K Cengiz. “Cooperative spectrum sensing optimization for cognitive radio in 6G networks”. Computers and Electrical Engineering, vol. 95, pp. 107378, 2021.
[2]
Z Song, Y Song, R Tafazolli. “A survey on spectrum sensing and learning technologies for 6G”. IEICE Transactions on Communications, vol. E104-B, no. 10, pp. 1207-1216, 2020.
[3]
R Wan, L Ding, N Xiong, N Xiong, W Shu, L Yang. “Dynamic dual threshold cooperative spectrum sensing for cognitive radio under noise power uncertainty”. Human-centric Computing and Information Sciences, vol. 9, no. 1, pp. 1-21, 2019.
[4]
Md. A Hossain, N I. Sarkar. “Spectrum handoff management in cognitive radio networks: Solutions, modeling, and future research” Cognitive Radio Technology Applications for Wireless and Mobile, IGI Global, 2013, chapter 6, pp. 103-123.
[5]
M A Hossain, R Md Noor, K L A Yau, S R Azzuhri, M R Z'aba, I Ahmedy “Machine learning-based cooperative spectrum sensing in dynamic segmentation enabled cognitive radio vehicular network”. Energies, vol. 14, no. 4, pp. en14041169, 2021.
[6]
K Cichoń, A Kliks, H Bogucka. “Energy-efficient cooperative spectrum sensing: A survey”. IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 1861-1886, 2016.
[7]
W Wang, L Chen, K G Shin, Lingjie Duan. “Secure cooperative spectrum sensing and access against intelligent malicious behaviors”. IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 1267-1275, Toronto, ON, Canada, 27 April 2014 - 02 May 2014.
[8]
G Nie, G Ding, L Zhang, Q Wu. “Byzantine defense in collaborative spectrum sensing via Bayesian learning”. IEEE Access, vol. 5, pp. 20089-20098, 2017.
[9]
Z Shi, W Gao, S Zhang, J Liu, N Kato. “Machine learning-enabled cooperative spectrum sensing for non-orthogonal multiple access”. IEEE Transactions on Wireless Communications, vol. 19, no. 9, pp. 5692-5702, 2020.
[10]
K M Thilina, K W Choi, N Saquib, E Hossain. “Machine learning techniques for cooperative spectrum sensing in cognitive radio networks”. IEEE Journal on selected areas in communications, vol.31, no. 11, pp. 2209-2221, 2013.
[11]
N Gul, S M Kim, S Ahmed, M S Khan, J Kim. “Differential evolution based machine learning scheme for secure cooperative spectrum sensing system”. Electronics, vol. 10, no. 14, pp. 1687, 2021.
[12]
A M Mikaeil, B Guo, Z Wang, “Machine learning to data fusion approach for cooperative spectrum sensing”. 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 429-434, Shanghai, China, 13-15 October 2014.
[13]
H Zhu, T Song, J Wu, X Li, J Hu. “Cooperative spectrum sensing algorithm based on support vector machine against SSDF attack”. 2018 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1-6, Kansas City, MO, USA, 20-24 May 2018.
[14]
J Parras, S Zazo. “Using one class SVM to counter intelligent attacks against an SPRT defense mechanism”. Ad Hoc Networks, vol. 94, pp. 101946, 2019.
[15]
O P Awe, S Lambotharan. “Cooperative spectrum sensing in cognitive radio networks using multi-class support vector machine algorithms”. 2015 9th international conference on signal processing and communication systems (ICSPCS), pp. 1-7, Cairns, QLD, Australia, 14-16 December 2015.
[16]
E Ghazizadeh, D Abbasi‐moghadam, H Nezamabadi‐pour. “An enhanced two‐phase SVM algorithm for cooperative spectrum sensing in cognitive radio networks”. International Journal of Communication Systems, vol. 32, no. 2, 2019, pp. e3856.
[17]
K Zeng, P Pawelczak and D Cabric. “Reputation-based cooperative spectrum sensing with trusted nodes assistance”. IEEE communications letters, vol. 14, no.3, pp. 226-228, 2010.
[18]
V Mthulisi, N Issah, M S Semaka. “Spectrum sensing data falsification attack reputation and Q-out-of-M rule security scheme”. Proceedings of Sixth International Congress on Information and Communication Technology, Lecture Notes in Networks and Systems, vol. 236, pp. 11-25, 2022.
[19]
J Bennaceur, H Idoudi, L A Saidane, “Hierarchical game-based secure data collection with trust and reputation management in the cognitive radio network”. Computers & Electrical Engineering, 2021, vol. 96, part A, pp. 107463, 2021.
[20]
Z Chen, J Wu, J Bao, “Semi-supervised learning-enabled two-stage framework for cooperative spectrum sensing against SSDF attack”. 2022 IEEE Wireless Communications and Networking Conference (WCNC). pp. 554-559, Austin, TX, USA, 10-13 April 2022.
[21]
K M Thilina, K W Choi, N Saquib, E Hossain. “Machine learning techniques for cooperative spectrum sensing in cognitive radio networks”. IEEE Journal on selected areas in communications, vol. 31, no. 11, pp. 2209-2221, November 2013.
[22]
Y C Liang, Y Zeng, E C Y Peh, A T Hoang. “Sensing-throughput tradeoff for cognitive radio networks”. IEEE transactions on Wireless Communications, vol. 7, no. 4, pp. 1326-1337, April 2008.

Cited By

View all
  • (2024)Machine Learning Applications in Optical Fiber Sensing: A Research AgendaSensors10.3390/s2407220024:7(2200)Online publication date: 29-Mar-2024
  • (2024)Enhanced Support Vector Machine for Cooperative Spectrum Sensing Against Byzantine Attack in Cognitive Wireless Sensor NetworksIEEE Sensors Journal10.1109/JSEN.2024.347616324:23(39835-39844)Online publication date: 1-Dec-2024
  • (2024)A cooperative spectrum sensing method based on semi-supervised clustering with variational mode decomposition and information geometryPhysical Communication10.1016/j.phycom.2023.10227363:COnline publication date: 25-Jun-2024
  • Show More Cited By

Index Terms

  1. Support Vector Machine Process Against Probabilistic Byzantine Attack for Cooperative Spectrum Sensing in CRNs
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICMLT '23: Proceedings of the 2023 8th International Conference on Machine Learning Technologies
    March 2023
    293 pages
    ISBN:9781450398329
    DOI:10.1145/3589883
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 June 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Byzantine attack
    2. Cognitive radio
    3. Cooperative spectrum sensing
    4. Support vector machine

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICMLT 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 25 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Machine Learning Applications in Optical Fiber Sensing: A Research AgendaSensors10.3390/s2407220024:7(2200)Online publication date: 29-Mar-2024
    • (2024)Enhanced Support Vector Machine for Cooperative Spectrum Sensing Against Byzantine Attack in Cognitive Wireless Sensor NetworksIEEE Sensors Journal10.1109/JSEN.2024.347616324:23(39835-39844)Online publication date: 1-Dec-2024
    • (2024)A cooperative spectrum sensing method based on semi-supervised clustering with variational mode decomposition and information geometryPhysical Communication10.1016/j.phycom.2023.10227363:COnline publication date: 25-Jun-2024
    • (2024)A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G/6G/beyond)High-Confidence Computing10.1016/j.hcc.2024.1002204:2(100220)Online publication date: Jun-2024
    • (2024)Less sample‐cooperative spectrum sensing against large‐scale Byzantine attack in cognitive wireless sensor networksTransactions on Emerging Telecommunications Technologies10.1002/ett.501535:7Online publication date: 24-Jun-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media