An Eclat algorithm based energy detection for cognitive radio networks

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Abstract

Cognitive radio (CR) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. The sensing reports from all the CR nodes are sent to a Fusion Centre (FC) which aggregates these reports and takes decision about the presence of the PU, based on some decision rules. Such a collaborative sensing mechanism forms the foundation of any centralised CRN. However, this collaborative sensing mechanism provides more opportunities for malicious users (MUs) hiding in the legal users to launch spectrum sensing data falsification (SSDF) attacks. In an SSDF attack, some malicious users intentionally report incorrect local sensing results to the FC and disrupt the global decision-making process. To mitigate SSDF attacks, an Eclat algorithm based detection strategy is proposed in this paper for finding out the colluding malicious nodes. Simulation results show that the sensing performance of the scheme is better than the traditional majority based voting decision in the presence of SSDF attacks.

LanguageEnglish
Title of host publicationProceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems
Subtitle of host publicationTrustcom/BigDataSE/ICESS 2017
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages1096-1102
Number of pages7
ISBN (Electronic)9781509049059
DOIs
Publication statusPublished - 7 Sep 2017
Event16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017 - Sydney, Australia
Duration: 1 Aug 20174 Aug 2017

Conference

Conference16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017
CountryAustralia
CitySydney
Period1/08/174/08/17

Fingerprint

Cognitive radio
Fusion reactions
Decision making
Energy
Attack
Falsification

Cite this

Jin, F., Varadharajan, V., & Tupakula, U. (2017). An Eclat algorithm based energy detection for cognitive radio networks. In Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems: Trustcom/BigDataSE/ICESS 2017 (pp. 1096-1102). [8029561] Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.358
Jin, Fan ; Varadharajan, Vijay ; Tupakula, Udaya. / An Eclat algorithm based energy detection for cognitive radio networks. Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems: Trustcom/BigDataSE/ICESS 2017. Piscataway, NJ : Institute of Electrical and Electronics Engineers (IEEE), 2017. pp. 1096-1102
@inproceedings{3e73c172d242408ba8a39174f2e297bd,
title = "An Eclat algorithm based energy detection for cognitive radio networks",
abstract = "Cognitive radio (CR) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. The sensing reports from all the CR nodes are sent to a Fusion Centre (FC) which aggregates these reports and takes decision about the presence of the PU, based on some decision rules. Such a collaborative sensing mechanism forms the foundation of any centralised CRN. However, this collaborative sensing mechanism provides more opportunities for malicious users (MUs) hiding in the legal users to launch spectrum sensing data falsification (SSDF) attacks. In an SSDF attack, some malicious users intentionally report incorrect local sensing results to the FC and disrupt the global decision-making process. To mitigate SSDF attacks, an Eclat algorithm based detection strategy is proposed in this paper for finding out the colluding malicious nodes. Simulation results show that the sensing performance of the scheme is better than the traditional majority based voting decision in the presence of SSDF attacks.",
author = "Fan Jin and Vijay Varadharajan and Udaya Tupakula",
year = "2017",
month = "9",
day = "7",
doi = "10.1109/Trustcom/BigDataSE/ICESS.2017.358",
language = "English",
pages = "1096--1102",
booktitle = "Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems",
publisher = "Institute of Electrical and Electronics Engineers (IEEE)",
address = "United States",

}

Jin, F, Varadharajan, V & Tupakula, U 2017, An Eclat algorithm based energy detection for cognitive radio networks. in Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems: Trustcom/BigDataSE/ICESS 2017., 8029561, Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1096-1102, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, Sydney, Australia, 1/08/17. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.358

An Eclat algorithm based energy detection for cognitive radio networks. / Jin, Fan; Varadharajan, Vijay; Tupakula, Udaya.

Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems: Trustcom/BigDataSE/ICESS 2017. Piscataway, NJ : Institute of Electrical and Electronics Engineers (IEEE), 2017. p. 1096-1102 8029561.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

TY - GEN

T1 - An Eclat algorithm based energy detection for cognitive radio networks

AU - Jin, Fan

AU - Varadharajan, Vijay

AU - Tupakula, Udaya

PY - 2017/9/7

Y1 - 2017/9/7

N2 - Cognitive radio (CR) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. The sensing reports from all the CR nodes are sent to a Fusion Centre (FC) which aggregates these reports and takes decision about the presence of the PU, based on some decision rules. Such a collaborative sensing mechanism forms the foundation of any centralised CRN. However, this collaborative sensing mechanism provides more opportunities for malicious users (MUs) hiding in the legal users to launch spectrum sensing data falsification (SSDF) attacks. In an SSDF attack, some malicious users intentionally report incorrect local sensing results to the FC and disrupt the global decision-making process. To mitigate SSDF attacks, an Eclat algorithm based detection strategy is proposed in this paper for finding out the colluding malicious nodes. Simulation results show that the sensing performance of the scheme is better than the traditional majority based voting decision in the presence of SSDF attacks.

AB - Cognitive radio (CR) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. The sensing reports from all the CR nodes are sent to a Fusion Centre (FC) which aggregates these reports and takes decision about the presence of the PU, based on some decision rules. Such a collaborative sensing mechanism forms the foundation of any centralised CRN. However, this collaborative sensing mechanism provides more opportunities for malicious users (MUs) hiding in the legal users to launch spectrum sensing data falsification (SSDF) attacks. In an SSDF attack, some malicious users intentionally report incorrect local sensing results to the FC and disrupt the global decision-making process. To mitigate SSDF attacks, an Eclat algorithm based detection strategy is proposed in this paper for finding out the colluding malicious nodes. Simulation results show that the sensing performance of the scheme is better than the traditional majority based voting decision in the presence of SSDF attacks.

UR - http://www.scopus.com/inward/record.url?scp=85032364821&partnerID=8YFLogxK

U2 - 10.1109/Trustcom/BigDataSE/ICESS.2017.358

DO - 10.1109/Trustcom/BigDataSE/ICESS.2017.358

M3 - Conference proceeding contribution

SP - 1096

EP - 1102

BT - Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems

PB - Institute of Electrical and Electronics Engineers (IEEE)

CY - Piscataway, NJ

ER -

Jin F, Varadharajan V, Tupakula U. An Eclat algorithm based energy detection for cognitive radio networks. In Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems: Trustcom/BigDataSE/ICESS 2017. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE). 2017. p. 1096-1102. 8029561 https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.358