Abstract
To detect the primary user’s activity accurately in cognitive radio sensor networks, cooperative spectrum sensing is recommended to improve the sensing performance and the reliability of spectrum-sensing process. However, spectrum-sensing data falsification attack being launched by malicious users may lead to fatal mistake of global decision about spectrum availability at the fusion center. It is a tough task to mitigate the negative effect of spectrum-sensing data falsification attack and even eliminate these attackers from the network. In this article, we first discuss the randomly false attack model and analyze the effects of two classes of attacks, individual and collaborative, on the global sensing performance at the fusion center. Afterwards, a linear weighted combination scheme is designed to eliminate the effects of the attacks on the final sensing decision. By evaluating the received sensing result, each user can be assigned a weight related to impact factors, which includes result consistency degree and data deviation degree. Furthermore, an adaptive reputation evaluation mechanism is introduced to discriminate malicious and honest sensor node. The evaluation is conducted through simulations, and the results reveal the benefits of the proposed in aspect of mitigation of spectrum-sensing data falsification attack.
Introduction
In cognitive radio sensor networks (CRSN), the sensors with cognitive radio devices can employ dynamic spectrum access technology to use licensed spectrum bands on an opportunistic manner. By allowing secondary users (SUs) to share licensed spectrum bands, the problem of radio frequency spectrum shortage will be alleviated effectively. Certainly, unlicensed users should ensure to avoid causing harmful interference to the licensed users (primary users (PUs)). 1 Although the SUs need to monitor periodically to identify the PU’s presence, dynamic use of spectrum facilitates CRSN more flexibility to support many emerging applications. 2 It can not only alleviate the congestion of Industrial Scientific Medical (ISM) band and improve the spectrum utilization but also effectively avoid data collision and high network throughput. 3 Compared with traditional wireless sensor networks (WSNs), owing to spectrum sensing and decision-making, the problem of spectrum resource scarcity and inefficient spectrum utilization can be effectively alleviated. Spectrum sensing is an essential prerequisite for cognitive radio (CR) system to detect the activity of PU, which should sense the spectrum for available opportunities and avoid any collision and minimize harmful interference to licensed users. The detection accuracy of spectrum sensing determines the performance of the whole CR system to a great extent. 4
Due to shadowing, multipath fading, and time-varying characteristics of wireless channel, erroneous sensing decisions can occur frequently and result in inefficient utilization of the spectrum opportunities or interference at the licensed user. Cooperative spectrum sensing (CSS) can improve the reliability of spectrum sensing effectively. By combining all results from cooperative sensing nodes, they can cooperate with each other to decide on the presence or absence of the PU collectively. It overcomes the unreliability of individual SU or the influence of multipath fading, shadow effect, and noise uncertainty that may occur in the wireless environment. Therefore, CSS has been suggested as one of the solutions to exploit the diversity of multi-users and make more accurate decision. However, CSS is vulnerable to suffer from various kinds of security threats. 5 Among them, spectrum-sensing data falsification (SSDF) attack can severely impair cooperative sensing performance, in which local false observations sent by malicious users (MUs) during the process of cooperative sensing. 6 Even small number of MUs behaving maliciously, such as broadcasting falsified information or not following proper collaboration mechanism, it will result in serious damage on the reliability of CSS. 7 As a result, it is necessary to design a secure and effective cooperative spectrum-sensing mechanism to resist SSDF attacks. To this end, this article presents the main contributions as follows:
The randomly false attack model is introduced, and the analysis of the effects about two classes of attacks, individual and collaborative, on the global sensing performance is conducted.
Based on the analysis of node’s result consistency degree and data deviation degree, a linear weighted combination scheme is designed to eliminate the effects of SSDF attacks on the final sensing decision.
An adaptive reputation evaluation mechanism is presented to discriminate malicious SU and honest SU.
We compare and analyze traditional techniques under SSDF attack. Simulation results show that the proposed scheme can not only weaken the harmful influence caused by attackers but also give good performance in terms of detection rate and false detection rate.
The rest of this article is structured as follows: section “Related work” provides a survey of existing SSDF counter mechanisms; section “System model” defines the randomly false attack model and analyzes the impacts of two types of attacks theoretically; section “Attack-aware linear weighted combination scheme” introduces a linear weighted combination scheme to address the problem of SSDF attacks; section “Simulation results and discussions” shows simulation results from the point of view of attacker’s identification and detection performance. Finally, section “Conclusion” concludes this article.
Related work
CSS is a well-known approach to identify potential spectrum holes applied in centralized and decentralized network, but it is easy to incur various kinds of attacks such as primary user emulation attack (PUEA), SSDF, and eavesdropping attack. 8 Among them, SSDF is the most well-known security threat in CRSN. The motivation of SSDF attackers is to waste the access opportunities of other SUs or to disturb PU’s normal operation by decreasing the global detection probability. By sending false spectrum-sensing reports, MUs can cause a wrong global decision about spectrum availability at the fusion center (FC). 9 Especially, some honest SUs may be regarded as attackers owing to their bad sensing performance caused by either shadowing and fading or malfunctioning sensor. 10 Nevertheless, either MUs or those unintentional attackers degrade the detection accuracy of the system, which depends on the joint distribution of attackers and honest users’ detection probability.
From the attacker’s point of view, SSDF attack strategies can be divided into Always-Yes attack, Always-No attack, Always-False attack, Hit-and-Run attack, probability attack, and so on. 11 To deal with the serious damage on the reliability of CSS through data falsification injection, several works have been investigated to defense against SSDF attacks. The statistical features of node’s sensing results can be employed to identify MUs. Zhang et al. 12 analyzed a generalized probabilistic soft SSDF attack model and deduced a closed-form expressions of global sensing performance at the FC. In the study by Singh et al., 13 a distance-based outlier detection approach is proposed to isolate the malicious nodes from the decision process. In the study by Ahmadfard et al., 14 a flexible structure is introduced to deal with the uncertain attacking parameters settings by attackers, and a soft-decision-based defense strategy is employed at FC to detect the attackers. Based on statistic characteristics of sensing information, Ahmed et al. 15 proposed a Bayesian nonparametric clustering approach to estimate the PU’s channel behavior and identify MUs’ collaborative spectrum sensing. Li and Chigan 16 presented a fuzzy c-means clustering–based secure fusion strategy to deal with the dynamic flip rates of MUs. By setting some evaluation frames and assigning specific weights to different sensing nodes, Althunibat et al. 17 presented a novel robust algorithm against SSDF attack to improve the resulting effects on CSS. Also, the proposed algorithm is capable to convert attackers to honest nodes, which in turn improves network energy efficiency and the detection accuracy. Ghaznavi et al. 18 propose a fast searching algorithm to detect the trusted sensors, which can be grouped into reliable clustering structure according to the sensing history.
In the context of SSDF attacks, reputation-/trust-based approaches have been widely studied and applied into CRSNs. According to the local and global decision results, Zeng and Faweczak 19 presented a mechanism for updating the trust values of sensing node. Furthermore, SUs will be designated into three states: trusted state, discarded state, and waiting state according to the trust value, and only SUs with trusted state can be allowed to participate in cooperative sensing. Althunibat et al. 20 developed identification and punishment policies for SSDF attackers, which aim to detect attackers and ignore their reported sensing results and redistribute the transmission opportunities among SUs based on their local performance. Han et al. 21 used Jousselme distance to measure the credibility of CR users’ sensing results, filtered out the reliable sensing results with high credibility, and combined them with appropriate weight value. By exchanging the sensing results with the neighbors, Feng et al. 22 presented a distributed trust evaluation scheme to counter SSDF attack in non-centralized networks, which includes a trust evaluation phase to manage CSS. Based on mechanism design theory, Wang et al. 23 motivated users to report authentic sensing data and decouple erroneous sensing reports. However, the arbitrarily discarding the sensing report of suspicious SU may lead to require more decision samples to support the global decision. Despite of their effectiveness in resisting SSDF attacks, most of existing works do not consider SSDF attack model based on soft fusion. Compared to hard combination, soft SSDF attack will be more intangible due to relatively larger range of the observed energy, which can cause as aggressively as possible to the FC’s performance.
Motivated by the observations above, in this article, we start with an objective to develop a more general soft SSDF attack model. And then, we propose an adaptive reputation-based mechanism, which does not require prior information about the number of attackers or attacking strategies, to defend against both independent and collaborative attacks based on soft SSDF.
System model
Network model
Consider that a CRSN with N cognitive sensor nodes (SNs) periodically transmit the sensed data to the central coordinator (a sink node or access point), which acts as the FC to regulate the medium access of all SNs attached to it. After the sensing nodes perform local spectrum sensing simultaneously, the observations will be sent to the FC through the common control channel to make the final decision. Each SN is independent, and the energy detection method is exploited. The PU detection problem for a given received signal
where
By accumulating m samples of the energy observation in ith node, the test statistic can be given as
25
If m is sufficiently large, the probability distribution function (PDF) of
where the noise and the signal are assumed to be i.i.d Gaussian random processes with zero mean and variance
Then, the probability of false alarm and detection of ith node can be given as
where
Suppose that all SNs send the local test statistic to FC through error-free public control channels, the reported result received by FC can be expressed as
where
Accordingly, the global probability of false alarm
Given the target global probability of false alarm
Besides, the corresponding global probability of detection can be given as
Attack model
Without dealing with more sophisticated malicious behaviors, Always-Yes, Always-No, and Always-False attacks are usually easy to be detected by FC. Thus, to avoid detection or identification, smarter MUs usually launch random strategy or report the falsified observations intermittently to sneak into reliable SUs.
28
Under such attacks, the MUs can independently or collaboratively send false sensing information without any local processing to mislead the global decision of CSS. In soft combination, the MUs will invert its sensing reports and falsify the test statistics following the distribution with hypothesis

Randomly false attack model under soft combination: (a) independent attack and (b) collaborative attack.
Independent attack
Under independent attack, the malicious SNs perform attack independently and each attacker will change its sensing report with probability
PU is absent. When the local decision is
PU is present. Under hypothesis
Collaborative attack
In collaborative attack mode, malicious SNs will send false sensing results collaboratively. Specifically, they can exchange the estimation of the state of PU and then make consistent decisions. According to the majority voting rule,
29
the consistent decision of malicious SNs can be obtained and all of the malicious nodes will generate and send the report opposite to the consistent decision to FC. In such case, it means that there are at least
where
Analysis
In this subsection, we present the analysis of the impact of aggressive behavior on global decision. Replace attack probability
The FC receives the reporting information of all sense nodes and makes a global decision. Assuming that the fusion coefficient assigned to normal SN is
When m is large,
The FC compares the combination result with the threshold and obtains the global decision. Given the global target false alarm probability, when exist K malicious SNs, the detection probability of the system can be estimated as
From the above analysis, we can observe that the detection performance of cooperative spectrum-sensing system is determined by the weight of SNs in collaborative and independent attack.
Attack-aware linear weighted combination scheme
In order to improve the sensing performance and reduce the impact of MUs on CSS, a reputation evaluation model is introduced to differentiate between normal and malicious SUs based on their observations. According to the reputation, the weight of node’s sensing results in CSS can be dynamically adjusted. Besides, malicious nodes or honest nodes with poor sensing performance will acquire low reputation, thus improving the detection accuracy of the system. After receiving the reporting results from SN, FC will conduct a linear weighted combination scheme with impact factors, which includes result consistency degree and data deviation degree.
Result consistency degree
At the level of result consistency degree, FC can compare the nodes’ sensing reports with the final decision result to decide the agreement about the evaluated SN. The result consistency degree can be defined as the ratio of normal spectrum sensing, which depends on the statistics of historical behavior of the observed node. If
To deduce the estimation of the unknown probability, the consistency degree of the observed node’s reports is a random variable, which can be denoted as X and
where x represents the count of sensing reports consistent with the final decision and y represents the count of sensing reports inconsistent with the final decision.
We assume that the prior distribution
Since
The probability expectation of Beta distribution is
By choosing
The result consistency degree is based on the expected value of the beta distribution, and long-term and short-term experiences may lead to the same level. However, it is expected that more historical observations would ensure more accurate evaluation. Thus, the level of confidence can be introduced to represent the global measurement. Hence, the result consistency degree of ith SN at round t can be estimated via the variance of the beta distribution
Data deviation degree
In this article, we assume that the monitoring area is small and the wireless channel statistics is approximately similar for different SNs. The SN whose report is near to the reference will be regarded as honest, otherwise, it is considered malicious. By examining the sensing reports of the SNs, the observations deviate significantly from others will be of large possibilities to be generated by misbehaving nodes. Then, data deviation degree can be used to metric the deviation of the report for outlier detection, especially for SSDF attack model based on soft combination rule. The reference reports are crucial, and the reporting results of the observed node during the sampling periods should be analytically compared with those of the trusted nodes set in turn.
However, traditional methods are sensitive to data falsification, and the estimates of mean and variance are probable to be distorted by false data injection. In this subsection, Orthogonalized Gnanadesikan–Kettenring (OGK) estimation will be introduced, which employ weighted method to effectively eliminate the influence of outliers. 31
For ith node,
where
and
Hence, the deviation coefficient of
By taking into account the historical behaviors of each node over a period of time, the greater the deviation of
Then, the data deviation degree can be estimated as
Based on the result consistency degree and data deviation degree, the weight assignment during the linear weighted combination scheme can be conducted. According to the history of reports of all SNs, FC can make use of above strategy to identify attacks and lower the allocated weight to the attackers. Thus, the weight assigned to ith node by the FC is given by
It is worth noting that the weight value can indicate the suspicious level of an SU and determine how much the local observations of the nodes contribute to the final decision. Consequently, the weighted combination over the local test statistic can reduce the malicious effect on CSS. Therefore, it can mitigate the influence of the falsified local test statistics from malicious nodes.
Reputation adjustment
Initially, all SNs are treated as reliable ones with a reputation value of
where
Particularly, the higher the reputation value, the more trusted the SN will be. Any SN whose reputation value goes below a certain threshold will be identified as malicious node and will be excluded by the FC from the trusted node list. Let
As the reputation value decreases quickly as the attacking time elapses, the evaluation mechanism can not only keep the reputation value of honest node stable but also reduce the reputation of malicious SN efficiently. In addition, to impact the decision accuracy of CSS, malicious SNs should have a larger sensing error probability than honest nodes. Consequently, the malicious SNs can be easily excluded from the trusted node list if their expected reputation value falls below a certain threshold.
Simulation results and discussions
In this section, we validate our theoretical analysis and evaluate the performance of our proposed method called attack-aware linear weighted combination scheme (ALWCS) by MATLAB. We setup a CRSN with 40 SNs and an FC. The network process is divided into a sequence of time periods. At the beginning of each time period, the FC randomly chooses a number of trusted nodes to sense a licensed channel. The idle and busy probabilities of the licensed channel are
First, the global error probability under different attacks is analyzed. Figure 2 shows the global error probability at the FC under independent and collaborative attack model in terms of different attacking probability, respectively. It can be seen from Figure 2 that the error probability will be increased with the attacking probability. This indicates that malicious nodes generate test statistic that is contrary to the detection result, which cause a certain impact on the global detection performance. The collaborative spectrum sensing under collaborative attacks has a higher error probability than that under independent attacks. When the attack probability exceeds 0.4, the overall upward trend of error probability converges. When the attack probability is low, MUs behave as normal nodes most of the time, and thus, along with the normal nodes they influence the FC to arrive at a correct decision. By contrast, when the attacking probability reaches a certain level, the performance of the proposed CSS scheme degrades as the attacking probability increases. As a result, malicious nodes can be detected by combination process, and the malicious nodes with high attacking probability can be identified owing to more frequent attacks.

Global error probability under different attacks.
Also, we show through simulation results that the proposed approach can be applied on streaming data. The performance metrics considered here are true positive rate (TPR) and false positive rate (FPR) of PU signal. Among them, TPR is defined as the ratio of the total number of slots when the FC senses that PU signal is present when it is actually present to the number of slots when the PU signal is present. FPR is defined as the ratio of the total number of slots when the FC senses that PU signal is present when it is actually absent to the number of slots when it is absent. In those scenarios, the attacking probability of malicious SUs is 40%. The number of slots is 1000. We introduce attacks at slot number 400 and remove them at slot number 800. The TPR and FPR under different attacks are illustrated in Figures 3 and 4, respectively. It is seen that our scheme can detect and isolate the attackers in both classes of attacks. Especially for independent attack, the drop in TPR is low when attackers are introduced at round 400. As for collaborative attacks, with our proposed approach, they can be detected and isolated at round 700. Moreover, the results of FPR show the same characteristics. Thus, from the experiment results, it can be concluded that our proposed scheme can detect attacks successfully as well as isolate the attackers dynamically.

True positive rate under different attacks.

False positive rate under different attacks.
Furthermore, we evaluate the impacts of independent and collaborative attacks on the detection rate and false detection rate. The detection rate is defined as the ratio of detected malicious nodes to the total number of malicious SNs. In addition, false detection rate is defined as the ratio of legitimate nodes detected as malicious to the total number of legitimate nodes. The malicious SNs are selected at random, and the results shown are averaged over 20 iterations. Figure 5 shows the detection rate versus percentage of malicious SUs under independent attack. It can be observed that both ALWCS and ACSS 32 obtain better performance than WSPRT. 33 When the percentage of malicious SNs arrives 35%, the detection rate of WSPRT has been lower than 50%, which fails to detect the attackers. However, WSPRT shows better false detection rate for varying percentage of malicious presence as compared to ACSS in Figure 6. The reason is that WSPRT employs the dynamic threshold to identify the malicious node. With the increase in the number of malicious SNs, the mechanism tends to be strict. For ALWCS and ACSS, based on the analysis of history behavior, the reputation update mechanism can choose honest nodes as a baseline so as to identify malicious nodes efficiently. By comparison, ALWCS employs the local sensing reports generated as streams of data to conduct global and individual measurement. As can be seen from the experimental results, it demonstrates good performance to isolate the detected attackers from participating in the sensing decision.

Detection rate versus percentage of malicious SNs under independent attack.

False detection rate versus percentage of malicious SNs under independent attack.
The detection rate against varying percentage of malicious nodes under collaborative attacks is illustrated in Figure 7. We observe that WSPRT keeps perfect detection rate only up to 20% of malicious presence, while ALWCS and ACSS maintain till 30% and 25% presence of malicious nodes, respectively. Figure 8 shows the false detection rate with different percentage of malicious SNs. From the result, the CSS under collaborative attacks has a lower detection rate and higher false detection rate than that under independent attacks. Moreover, when the percentage of malicious nodes exceeds 35%–40%, the performance under different attacks degrades more significantly. It can be seen that with the increasing probability of malicious SNs, the large amount of falsified data received by FC will have a negative impact on the estimation during the process of node’s behavior identification and subsequent data combination. Generally speaking, ALWCS and ACSS demonstrate more stability in the aspect of above metrics than WSPRT. In WSPRT, once the trust value of an SU is below the threshold, the node will be identified as malicious. Intuitively, with higher threshold setting, the malicious nodes can be identified quickly but also result in promoting the probability of detecting an honest node as malicious one.

Detection rate versus percentage of malicious SNs under collaborative attack.

False detection rate versus percentage of malicious SNs under collaborative attack.
Conclusion
In CRSN, spectrum utilization and network performance will be disrupted seriously by malicious nodes, which may launch SSDF attacks independently or collaboratively to mislead the channel availability decision. In this article, we first discuss the randomly false attack model and analyze the effects of two classes of attacks, individual and collaborative, on the global sensing performance at the FC. Afterwards, a linear weighted combination scheme is designed to eliminate the effects of SSDF attacks on the final sensing decision. To estimate the result consistency degree, Beta probability model is used to evaluate the consistency between local test statistics and global resolution. Moreover, OGK estimators are employed to measure the data deviation degree. Furthermore, an adaptive reputation evaluation mechanism is introduced to discriminate malicious SU and honest SU. The results reveal the benefits of the proposed scheme in the aspect of significantly reduced error rate in decision-making, efficient identification of attacking nodes and greater minimization of the false detection rate of honest nodes.
Footnotes
Acknowledgements
The authors would like to thank anonymous reviewers.
Handling Editor: Vishal Sharma
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: The work described in this article was supported by Key Laboratory R&D Project of Guangdong Province (Grant No. 2016B090918097), Special Project on the Integration of Industry, Education and Research of Zhuhai (Grant No. 2012D0501990016), Industry-University-Research Collaboration Program of Zhuhai (Grant No. 2012D0501990026), and Natural Science Foundation of Hubei province, China (Grant No. 2019CF).
