Deakin University
Browse

File(s) under permanent embargo

Pattern based anomalous user detection in cognitive radio networks

conference contribution
posted on 2015-01-01, 00:00 authored by Sutharshan RajasegararSutharshan Rajasegarar, C Leckie, M Palaniswami
Cognitive radio (CR) provides the ability to sense the range of frequencies (spectrum) that are not utilized by the incumbent user (primary user) and to opportunistically use the unoccupied spectrum in a heterogeneous environment. This can use a collaborative spectrum sensing approach to detect the spectrum holes. However, this nature of the collaborative mechanism is vulnerable to security attacks and faulty observations communicated by the opportunistic users (secondary users). Detecting such malicious users in CR networks is challenging as the pattern of malicious behavior is unknown apriori. In this paper we present an unsupervised approach to detect those malicious users, utilizing the pattern of their historic behavior. Our evaluation reveals that the proposed scheme effectively detects the malicious data in the system and provides a robust framework for CR to operate in this environment.

History

Event

IEEE Signal Processing Society. Conference (40th : 2015 : Brisbane, Queensland)

Series

IEEE Signal Processing Society Conference

Pagination

5605 - 5609

Publisher

Institute of Electrical and Electronics Engineers

Location

Brisbane, Qld.

Place of publication

Piscataway, N.J.

Start date

2015-04-19

End date

2015-04-24

ISSN

1520-6149

ISBN-13

9781467369978

Language

eng

Publication classification

E1.1 Full written paper - refereed; E Conference publication

Copyright notice

2015, IEEE

Editor/Contributor(s)

[Unknown]

Title of proceedings

ICASSP 2015 : Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing