Skip to main content
The Scientific World Journal logoLink to The Scientific World Journal
. 2014 May 18;2014:752507. doi: 10.1155/2014/752507

Goodness-of-Fit Based Secure Cooperative Spectrum Sensing for Cognitive Radio Network

Hiep Vu-Van 1, Insoo Koo 1,*
PMCID: PMC4052467  PMID: 24959626

Abstract

Cognitive radio (CR) is a promising technology for improving usage of frequency band. Cognitive radio users (CUs) are allowed to use the bands without interference in operation of licensed users. Reliable sensing information about status of licensed band is a prerequirement for CR network. Cooperative spectrum sensing (CSS) is able to offer an improved sensing reliability compared to individual sensing. However, the sensing performance of CSS can be destroyed due to the appearance of some malicious users. In this paper, we propose a goodness-of-fit (GOF) based cooperative spectrum sensing scheme to detect the dissimilarity between sensing information of normal CUs and that of malicious users, and reject their harmful effect to CSS. The empirical CDF will be used in GOF test to determine the measured distance between distributions of observation sample set according to each hypothesis of licensed user signal. Further, the DS theory is used to combine results of multi-GOF tests. The simulation results demonstrate that the proposed scheme can protect the sensing process against the attack from malicious users.

1. Introduction

Nowadays, more bandwidth and higher bit-rates have been required to meet usage demands due to an explosion in wireless communication technology. According to the Federal Communications Commission's spectrum policy task force report [1], the actual utilization of the licensed spectrum varies from 15% to 80%. In some cases, the utilization is only a small percentage of the total capacity. Cognitive radio (CR) technology [2] has been proposed to solve the problem of ineffective utilization of spectrum bands. Both unlicensed and licensed users, termed the cognitive radio user (CU) and primary user (PU), respectively, operate in CR networks. In CR network, CUs are allowed to access the frequency assigned to PU when it is free. But CU must vacate the occupied frequency when the presence of PU is detected. Therefore, reliable detection of the PU's signal is a requirement of CR networks.

In order to ascertain the presence of a PU, CUs can use one of several common detection methods, such as matched filter, feature, and energy detection [2, 3]. Energy detection is the optimal sensing method if the CU has limited information about PU's signal (e.g., only the local noise power is known) [3]. In energy detection, frequency energy in the sensing channel is received in a fixed bandwidth W over an observation time window T to compare with the energy threshold and determine whether or not the channel is utilized. However, the received signal power may fluctuate severely due to multipath fading and shadowing effects. Therefore, it is difficult to obtain reliable detection with only one CU. Better sensing performance can be obtained by allowing some CUs to perform cooperative spectrum sensing [46].

CSS can use some combination methods such as equal gain combination (EGC) and maximum gain combination (MGC) [7] to combine sensing information of all CUs in the network and make a global decision about status of PU signal. Since EGC gives the same weight for all CUs in the network, it is easy to execute but with limited performance. MGC is known as the optimal combination rule. However, it requires information about the SNRs of the sensing channel, which is difficult to obtain in practice. In addition, MGC is sensitive to attack by malicious users who send false sensing data to the fusion center (FC) [8]. The research presented in [8, 9] determined that the presence of a few malicious users can severely reduce the performance of a CSS scheme. Algorithms used to identify the malicious users have been proposed in the studies of [8, 9]. In previous research, a simple technique (i.e., outlier-detection) is used to detect less damage malicious CUs such as always No or always Yes CU. In addition, the technique is unable to protect the CSS in the event of a large number of malicious users in the network.

In this paper, we utilize multi-goodness-of-fit (GOF) tests to design a robust CSS, in which the event detection technique [10, 11] will be used to provide the combination of different evidence of each type of GOF test which are supported by a particular hypothesis of PU signal. The proposed scheme considers two types of GOF tests, Kolmogorov-Smirnov (KS) and Cramer-von Mises (CM) tests. The proposed scheme can distinguish the sensing information of normal CUs and that of malicious users and reject the harmful effect of malicious user to sensing combination process. Three common types of malicious users including always Yes, always No, and opposite are considered in this paper.

2. Background

2.1. Goodness-of-Fit Test

The GOF test summarizes the discrepancy between the observed samples with theoretical distributions or empirical distributions and the reference distribution. For the n independent and identical distributed observation, the sample is first arranged in ascending order such that s 1s 2 ≤ ⋯≤s n. The GOF test is used to determine whether or not the samples set was drawn from the same distribution with a cumulative distribution function (CDF) F 0. The testing hypothesis can be formulated as follows:

F(s)=F0(s):Ho,F(s)F0(s):H1, (1)

where F(s) is the empirical CDF of the sample. It can be calculated as follows:

F(s)=1ni=1nI{sis}, (2)

where I{·} is the indicator of event {·}.

There are many types of GOF tests, for instance, Cramer-von Mises (CM), Kolmogorov-Smirnov (KS), AndersonDarling (AD), and Hosmer-Lemeshow (HL) tests. In this paper, we consider two types of GOF tests, CM and KS tests, which can run well with a low number of samples.

  •  (1)
    Kolmogorov-Smirnov (KS) test: the KS test, which is based on the empirical CDF of the samples set and the reference CDF, can be calculated according to the largest difference of two distributions as follows:
    DKS=sup{|F(si)F0(si)|:i=1,,n}, (3)
  • where sup⁡{·} is supremum function, which indicates the greatest element of the set. If the sample comes from distribution F 0(x), then D KS will converge to 0.

  •  (2)
    Cramer-von Mises (CM) test: CM test is used for judging the goodness-of-fit of the sample set's CDF F(s) and reference distribution's CDF F 0(s). The test statistic is given by
    DCM=n+[F(s)F0(s)]2dF0(s) (4)
  • and can be approximated as
    DCM=112n+i=1n[2i12nF0(si)]2. (5)
  • If this value, D CM, is larger than the threshold, the hypothesis that the sample data come from the reference distribution F 0 can be rejected.

2.2. Combination of Evidence in Dempster-Shafer Theory

Dempster-Shafer (DS) theory was first introduced by Demperster and was later extended by Shafer. This is a potentially valuable tool for the evaluation of risk and reliability in engineering applications when it is not possible to obtain a precise measurement from experiments or when knowledge is obtained from expert elicitation. An important aspect of this theory is the combination of evidence obtained from multiple sources and the modeling of conflict between them.

In DS theory [12], a representation of ignorance is provided by assigning a nonzero mass function to hypothesis m, also called the basic probability assignment (BPA), and is defined for every hypothesis A such that the mass value m(A) belongs to the interval [0,1] and satisfies the following conditions:

m(ϕ)=0,m(A)=1,AΩ, (6)

where Ω is the frame of discernment, which is a fixed set of q mutually exclusive and exhaustive elements.

By assigning a nonzero mass in a compound hypothesis, AB means that there exists the option to not make a decision between A and B but to leave the formulation in the AB class. In DS theory, two functions, belief (Bel) and plausibility (Pls), are defined to characterize the uncertainty and support of certain hypotheses. Bel measures the minimum or necessary support, whereas Pls reflects the maximum or potential support for that hypothesis [13]. These two measures, derived from mass values, are defined as a map from a set of hypotheses to interval [0,1] as follows:

Bel(A)=BAm(B),Pls(A)=AB0m(B). (7)

The sum of mass functions from different information source, m j  (j = 1,2,…M), combined with the DS rule is known as the orthogonal sum, which is commutative and associative. The result is a new mass function, m(A k) = (m 1m 2 ⊕ ⋯m d)(A k), which incorporates the joints information provided by the sources as follows:

m(Ak)=11KA1A2Ad=Ak(1jMmj(Aj)),K=A1A2Ad=ϕ(1jMmj(Aj)), (8)

where K is the measure of conflict between the different sources and is introduced as a normalization factor.

3. The Proposed Secure Cooperative Spectrum Sensing Based on GOF Test

There is a definite difference between the CDF of received signal energy of normal CU and that of the malicious users as shown in Figure 1. The CDF of the received signal energy of normal CU corresponding to the presence of the PU is always “under” that one corresponding to the absence of the PU. On the contrary, the opposite malicious CU has the CDF corresponding to the presence of PU to be “above” the CDF corresponding to the absence of PU. The always Yes and always No malicious CUs have a similar CDF corresponding to presence and absence of PU. Due to the difference between CDF of normal and malicious CUs, we utilize GOF test to detect the appearance of malicious users in the network, so that their harmful effect can be rejected out of CSS process. Multi-GOF tests including KS and CM tests will be applied for adaptive robust CSS. The DS theory will be used to combine results of multi-GOF tests.

Figure 1.

Figure 1

The CDF of received signal energy at CU under absence and presence hypothesis of PU signal for (a) normal CU, (b) opposite malicious CU, (c) always Yes malicious CU, and (d) always No malicious CU.

In this paper, we consider a CR network including N CUs who cooperate to sense the signal from a PU. There are p < N malicious CUs appearing in the network which can be classified as three common types: always Yes, always No, and opposite malicious CUs. All CUs use energy detectors to perform spectrum sensing and send their sensing data to the FC through a control channel. Based on the sensing data obtained from the CUs, the FC makes a global decision concerning the presence or absence of the PU signal by using the proposed data fusion scheme. The proposed scheme has 3 steps as follows.

Step 1 —

All CUs perform spectrum sensing by using energy detection method to determine received signal energy E j = {e 1,j, e 2,j,…, e M,j}, where M is the number of sensing samples that the jth CU takes in the sensing interval.

Step 2 —

At the FC, GOF test statistics of each CU will be computed according to hypothesis of the PU as given in (11). After that, BPA and final BPA for current sensing data will be estimated based on the “reputation level” of each CU, which is updated from previous sensing interval. Based on final BPA, a global decision rule will be proposed to make global decision about status of PU signal.

Step 3 —

Update “reputation level” of each CU according to the global decision.

The detailed description of each step will be given in the following subsections.

3.1. Energy Detection

At the sensing interval for the jth CU, the local spectrum sensing is to decide between the two following hypotheses:

H0:sj(k)=nj(k),H1:sj(k)=hjp(k)+nj(k), (9)

where H 0 and H 1 correspond to the hypothesis of the absence and presence of the PU signal, respectively, h j denotes the amplitude gain of the channel, s(k) is the signal transmitted from the PU, n j(k) is the additive white Gaussian noise, and k is index of sensing sample at each sensing interval.

A received signal energy of a sensing sample, e k,j, is given as

ek,j={|nj(k)|2,H0|hjs(k)+nj(k)|2,H1. (10)

3.2. BPA Estimation

The GOF test statistics of the current sensing data e k,j  (k = 1,…, M) of the jth CU will be calculated according to each hypothesis of PU signal based on (3) and (5) as follows, respectively:

Dh,jKS=sup{|F(ek,j)Fh(ek,j)|:k=1,2,,M},Dh,jCM=112M+i=1M[2i12MFh(ek,j)]2, (11)

where h = {0,1} is index of hypothesis H h of PU signal, e k,j is the received signal energy of kth sensing sample of the jth CU, F(·) and F h(·) are empirical CDF of observed sensing sample and CDF of H h hypothesis of PU, and M is the number of samples for each sensing interval.

It is noteworthy that normal CU and malicious CU have different characteristics of D 1,j t and D 0,j t as shown in Table 1, where t indexes types of GOF tests: KS and CM.

Table 1.

Reputation ranges according to each type of CUs.

Status of PU Normal CU Al wa ys  Yes CU Al wa ys  No CU Op po si te CU
H 1 D 0,j tD 1,j t D 0,j tD 1,j t D 0,j tD 1,j t D 0,j tD 1,j t
D 1,j t ≈ 0 D 1,j t ≈ 0 D 0,j t ≈ 0 D 0,j t ≈ 0
r 0,j t(i) ≫ 0 r 0,j t(i) ≫ 0 r 0,j t(i) ≪ 0 r 0,j t(i) ≪ 0

H 0 D 0,j tD 1,j t D 0,j tD 1,j t D 0,j tD 1,j t D 0,j tD 1,j t
D 0,j t ≈ 0 D 1,j t ≈ 0 D 0,j t ≈ 0 D 1,j t ≈ 0
r 1,j t(i) ≫ 0 r 1,j t(i) ≪ 0 r 1,j t(i) ≫ 0 r 1,j t(i) ≪ 0

Based on the values of D 1,j t and D 0,j t, we will estimate BPA of current sensing data of each CU and their “reputation level” for robust CSS as follows:

Δ1,jt=D0,jtD1,jt+D0,jtR0,jt,Δ0,jt=D1,jtD1,jt+D0,jtR1,jt, (12)

where R h,j t is “reputation level” of the jth CU according to hypothesis h, and it can be determined based on history observation of the jth CU as follows:

Rh,jt(i)=rh,jt(i1)jrh,jt(i1), (13)

where i is the index of current sensing interval and r 1,j t(i − 1) and r 0,j t(i − 1) are updated from the previous sensing interval according to global decision:

r1,jt(i1)=r1,jt(i2)+(D1,jt(i1)D0,jt(i1)), (14)
r0,jt(i1)=r0,jt(i2)+(D0,jt(i1)D1,jt(i1)). (15)

By using r 1,j t and r 0,j t, types of CUs will be easily distinguished. The normal CU has positive value of both r 1,j t and r 0,j t that will be increased after updating step. r 1,j t of always Yes and r 0,j t of always No malicious CUs are almost negative and tend to decrease after updating step. On the other hand, both values of opposite CU are negative and have a tendency to decrease. We define “malicious threshold” as ρ to reject the attack of malicious CR in CSS, so that the CU, which has either r 1,j t < 0 or r 0,j t < 0, will be determined as malicious CU. The sensing data of malicious CUs will not be considered to make global decision by giving them r 1,j t = 0 and r 0,j t = 0.

The BPA of all CUs will be combined with their reputation levels as

Δ1t=1nΩjΩD0,jtD1,jt+D0,jtR0,jt,Δ0t=1nΩjΩD1,jtD1,jt+D0,jtR1,jt, (16)

where Ω and n Ω are set of normal CUs and number of members of the set, respectively.

Because the error in estimating Δ0 t and Δ1 t,  Δ0 t + Δ1 t can be bigger than 1, we need to normalize those values as

Δ0t=Δ0tΔ0t+Δ1t,Δ1t=Δ1tΔ0t+Δ1t. (17)

3.3. DS Theory Combination

The DS theory will be used to combine the BPA of both GOF tests according to each hypothesis as follows:

Δ1=Δ1KSΔ1CM=Δ1KSΔ1CM1(Δ1KSΔ0CM+Δ0KSΔ1CM),Δ0=Δ0KSΔ0CM=Δ0KSΔ0CM1(Δ1KSΔ0CM+Δ0KSΔ1CM). (18)

Finally, the global decision will be made as follows:

G=H1,ifΔ1Δ0η,G=H0,otherwise, (19)

where η is the threshold for global decision.

According to the global decision, r 1,j t or r 0,j t will be updated for the next sensing interval as follows, respectively.

  1. If the global decision is G(i) = 0, we update r 1,j t(i) by using (14).

  2. Otherwise, we update r 0,j t(i) by using (15).

4. Simulation Results

In this section, simulation results of the proposed scheme and other soft combination schemes such as maximum gain combination (MGC) and equal gain combination (EGC) are provided. The network is considered in which 5 CUs exist and some of them can be malicious CUs.

In order to verify the reliability of the proposed combination scheme, we perform a simulation without considering malicious CU. The sensing results in Figure 2 show that the proposed scheme can obtain better sensing performance in comparison with EGC scheme and obtain a similar sensing performance to that of the MGC scheme when no malicious CU is considered.

Figure 2.

Figure 2

ROC of the proposed scheme and reference schemes when no malicious CU is considered.

The robustness of the proposed scheme will be investigated in the network with the appearance of always No, always Yes, and opposite malicious CUs in the network. Figures 3 and 4 show performance of the proposed scheme when 4 CUs are always No or always Yes malicious CUs among 5 CUs in the network. The results show that the proposed scheme with all CUs can achieve much better sensing performance than that one of the MGC and EGC schemes. This means that, by applying GOF test to CSS, the proposed scheme can detect the presence of those types of malicious CUs and reject their harmful effects to sensing process.

Figure 3.

Figure 3

ROC of the proposed scheme and reference schemes when 4 always No malicious CUs are considered.

Figure 4.

Figure 4

ROC of the proposed scheme and reference schemes when 4 always Yes malicious CUs are considered.

Opposite malicious CU causes the most damage to sensing performance. However, the proposed scheme is expected to protect CSS against this type of malicious CU. Figure 5 shows the sensing performance of the network when 4 CUs are opposite malicious among 5 CUs. MGC and EGC with all CUs provide very low performance due to the attack of opposite malicious CU. However, the proposed scheme can defend their attacks and achieve high sensing performance.

Figure 5.

Figure 5

ROC of the proposed scheme and reference schemes when 4 opposite malicious CUs are considered.

5. Conclusion

In this paper, multi-GOF tests are proposed to measure the difference between sensing data of normal CU and that of malicious CU. Further, the DS theory is used to combine results of multi-GOF tests. The proposed scheme considers the appearance of the most common types of malicious CU: always Yes, always No, and opposite types. The simulation results prove that the proposed scheme can reject almost harmful effect from those malicious CUs to protect CSS.

Acknowledgment

This work was supported by the KRF funded by the MEST (NRF-2012R1A1A2038831).

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

References

  • 1.Federal Communications Commission. 02-135. ET Docket; 2002. Spectrum policy task force. [Google Scholar]
  • 2.Hur Y, Park J, Woo W, et al. A wideband analog Multi-Resolution Spectrum Sensing (MRSS) technique for cognitive radio (CR) systems. Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS '06); May 2006; Island of Kos, Greece. pp. 4090–4093. [Google Scholar]
  • 3.Sahai A, Hoven N, Tandra R. Some fundamental limits on cognitive radio. Proceedings of the Allerton Conference on Communications, Control, and Computing; 2004; Monticello, Va, USA. [Google Scholar]
  • 4.Ganesan G, Li Y. Cooperative spectrum sensing in cognitive radio networks. Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN '05); November 2005; Baltimore, Md, USA. pp. 137–143. [Google Scholar]
  • 5.Mishra SM, Sahai A, Brodersen RW. Cooperative sensing among cognitive radios. Proceedings of the IEEE International Conference on Communications (ICC '06); July 2006; pp. 1658–1663. [Google Scholar]
  • 6.Deng R, Chen J, Yuen C, Cheng P, Sun Y. Energy-efficient cooperative spectrum sensing by optimal scheduling in sensor-aided cognitive radio networks. IEEE Transactions on Vehicular Technology. 2012;61(2):716–725. [Google Scholar]
  • 7.Ma J, Li Y. Soft combination and detection for cooperative spectrum sensing in cognitive radio networks. Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07); November 2007; pp. 3139–3143. [Google Scholar]
  • 8.Kaligineedi P, Khabbazian M, Bhargava VK. Secure cooperative sensing techniques for cognitive radio systems. Proceedings of the IEEE International Conference on Communications (ICC '08); May 2008; pp. 3406–3410. [Google Scholar]
  • 9.Kaligineedi P, Khabbazian M, Bhargava VK. Malicious user detection in a cognitive radio cooperative sensing system. IEEE Transactions on Wireless Communications. 2010;9(8):2488–2497. [Google Scholar]
  • 10.Li J, Liu J, Long K. Reliable cooperative spectrum sensing algorithm based on Dempster-Shafer theory. Proceedings of the 53rd IEEE Global Communications Conference (GLOBECOM '10); December 2010; pp. 1–5. [Google Scholar]
  • 11.Zheng X, Wang J, Wu Q, Chen J. Cooperative spectrum sensing algorithm based on Dempster-Shafer theory. Proceedings of the 11th IEEE Singapore International Conference on Communication Systems (ICCS '08); November 2008; pp. 218–221. [Google Scholar]
  • 12.Nguyen-Thanh N, Koo I. Empirical distribution-based event detection in wireless sensor networks: an approach based on evidence theory. IEEE Sensors Journal. 2012;12(6):2222–2228. [Google Scholar]
  • 13.Sentz K, Ferson S. Sandia Report. SAND2002-0835. Albuquerque, NM, USA: Sandia National Laboratories; 2002. Combination of evidence in Dempster-Shafer theory. [Google Scholar]

Articles from The Scientific World Journal are provided here courtesy of Wiley

RESOURCES