Next Article in Journal
Bayesian Modeling of Travel Times on the Example of Food Delivery: Part 1—Spatial Data Analysis and Processing
Previous Article in Journal
Gas Sensor Physically Unclonable Function-Based Lightweight Bidirectional Authentication Protocol for Gas Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Beta Distribution Function for Cooperative Spectrum Sensing against Byzantine Attack in Cognitive Wireless Sensor Networks

1
School of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China
2
National Mobile Communications Research Laboratory, Southeast University, Nanjing 211189, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(17), 3386; https://doi.org/10.3390/electronics13173386
Submission received: 13 July 2024 / Revised: 9 August 2024 / Accepted: 23 August 2024 / Published: 26 August 2024

Abstract

:
In order to explore more spectrum resources to support sensors and their related applications, cognitive wireless sensor networks (CWSNs) have emerged to identify available channels being underutilized by the primary user (PU). To improve the detection accuracy of the PU signal, cooperative spectrum sensing (CSS) among sensor paradigms is proposed to make a global decision about the PU status for CWSNs. However, CSS is susceptible to Byzantine attacks from malicious sensor nodes due to its open nature, resulting in wastage of spectrum resources or causing harmful interference to PUs. To suppress the negative impact of Byzantine attacks, this paper proposes a beta distribution function (BDF) for CSS among multiple sensors, which includes a sequential process, beta reputation model, and weight evaluation. Based on the sequential probability ratio test (SPRT), we integrate the proposed beta reputation model into SPRT, while improving and reducing the positive and negative impacts of reliable and unreliable sensor nodes on the global decision, respectively. The numerical simulation results demonstrate that, compared to SPRT and weighted sequential probability ratio test (WSPRT), the proposed BDF has outstanding effects in terms of the error probability and average number of samples under various attack ratios and probabilities.

1. Introduction

1.1. Background

The technology related to sensors has gradually become popular and is widely used in fields such as smart homes, fire detection, animal tracking, healthcare monitoring [1], etc. Over the last decades, we have been witnesses to the rapid development of wireless sensor networks, mainly due to their high cost-effectiveness and convenience in comparison with traditional wire-based communication technologies [2]. However, limited spectrum resources are no longer sufficient to meet the widely used and growing demand for sensors and their related applications and services. According to research by the Federal Communications Commission (FCC), the spectrum resources in a network area or system are divided into multiple non-adjacent small blocks (a. k. a. spectrum hole) in both time and space domains (commercial or technical perspective). This fragmentation of spectrum division leads to a decrease in spectrum utilization and affects capacity and performance. However, in order to popularize wireless sensor networks and improve their service quality, cognitive radio (CR) empowerment technology has emerged to support sensors in identifying and utilizing spectrum resources that are not used by the primary user (PU) and allowed them to opportunistically be accessed without causing harmful interference to the PU [3], which is known as cognitive wireless sensor networks (CWSNs) [4].
In a CWSN, cooperative spectrum sensing (CSS) is the most critical technology, which refers to multiple sensors using local sensing technology to detect the signal of the PU, and then submitting the sensing information to the fusion center (FC). The FC makes the final decision on the status of the PU through a specific rule. Therefore, those sensors are allowed to opportunistically access the channel being underutilized by the PU according to the final decision regarding the presence of the phenomenon. However, the cooperative process also provides malicious sensor nodes an opportunity to falsify sense information after completing local sensing and submit it to the FC [5], misleading the FC to make an incorrect global decision and selfishly occupying spectrum resources or causing excessive interference to the PU [6]. This is called a Byzantine attack [7], and there is already a lot of research work in this field.

1.2. Related Works and Motivation

A Byzantine attack in CSS, a.k.a. spectrum sensing data falsification (SSDF) attack, is one of the key adversaries to the success of CR networks. In recent years, research on Byzantine attacks and defense strategies has attracted attention and become a hot topic. In [8], L. Zhang et al. conducted extensive research and in-depth analysis of Byzantine attack and defense for CSS in CR networks. In [9], J. Wu et al. analyzed strategies between Byzantine attack and the FC in CSS for CR networks and further evaluated the safety factor from the Byzantine attacker’s perspective using a trust-value algorithm [10]. In [11], K. Zeng et al. presented a secure CSS scheme based on a reputation accumulation mechanism to mitigate the adverse impact of misbehaved CRs. A secure CSS strategy based on a reputation mechanism for CWSNs is proposed by X. Luo to defend against Byzantine attacks [12]. In [13], R. Chen et al. proposed a weighted sequential probability ratio test (WSPRT) against Byzantine attack to improve the robustness of data fusion, which integrates reputation accumulation of [11] into a sequential probability ratio test (SPRT) and reduces the data collection communication overhead at the FC. However, these studies did not consider the situation of many Byzantine attackers, which would completely make the FC blind, resulting in the failure of these reputation methods based on global decisions. In the presence of massive Byzantine attackers, Z. Sun et al. proposed a scheme in which the reliability value is used for dynamic selection of the sensing strategy between CSS and independent spectrum sensing [14,15]. However, the authors did not mitigate the negative impact of massive Byzantine attackers but instead replaced CSS with independent spectrum sensing. R. Lin et al. made use of blockchain to prevent independent and cooperative Byzantine attacks from malicious vehicle users [16]. It is obvious that this decentralized method to resist Byzantine attacks is inefficient. In [17], Y. Fu et al. proposed a scheme to identify probabilistic Byzantine attackers using consistent properties of each sensing user’s historically reported data. This consistency property method has certain requirements for the scenario of the primary network.
Further, Z. Li et al. studied the sequential binary hypothesis test problem with Byzantine agents in both the FC and fully distributed formulations [18]. In [19], an estimation diffusion least-mean-square-H (H represents the average node degree of all nodes) algorithm was proposed by F. Wan et al. to achieve better sensing performance against Byzantine and manipulation attacks. In [20], C. Quan et al. investigated the negative effect of Byzantine attacks on CSS performance and used an ordered transmission scheme to solve the binary hypothesis test problem. Furthermore, in [21,22], the authors proposed reputation and audit-based clustering with/without auxiliary anchor node algorithms against Byzantine attacks in wireless sensor networks. These Byzantine defense algorithms and strategies exhibit high computational complexity and necessitate the availability of specific prior information (strategy analysis of both the FC and Byzantine agents) or ideal assumptions (auxiliary anchor node); however, their applicability is limited to a certain extent.
In [23], a Dempster–Shafer evidence theory-based CSS for CWSNs was introduced by D. Yao et al. to deal with Byzantine attacks. M. Ridouani et al. proposed an authentication process and shifted spectrum sensing process to enhance the detection performance [24]. Considering an erroneous feedback channel, a single decision reporting algorithm was developed by A. Chouhan et al. to mitigate the effect of a Byzantine attack [25]. Furthermore, the authors proposed a machine learning technique [26] to identify malicious users in a CR network using the principal component analysis algorithm. To resist the dominated cooperative probabilistic Byzantine attack, L. Chen et al. proposed a JS-divergence-based reputation algorithm to identify Byzantine attackers [27]. In [28], A. Parmar et al. used a Gaussian mixture model to formulate an anomaly detection algorithm for detecting Byzantine attacks. Although the above defense algorithms can identify and suppress Byzantine attacks and secure CSS to some extent, they still cannot effectively defend against large-scale attacks (with a high attack ratio) and low-intensity attacks (with a low attack probability) and ensure the performance and efficiency of CSS in CWSNs.
Additionally, machine learning has gradually become one of the most effective methods for solving network security problems in recent years. In [29], one class supporting vector machine (SVM) to obtain a modified SPRT was used by J. Parras and S. Zazo to not only detect a Byzantine attack but potentially any other attack mechanism that does not have a similar spectrum to the expected signal from normal sensors. N. Marchang et al. investigated a series of machine learning techniques for Byzantine identification in [30,31]. Z. Luo et al. proposed an influence-limiting defense against learning evaluation-beating attacks or other similar attacks [32]. Moreover, by providing a maximum margin hyperplane [33], Z. Zhang et al. used SVM to identify Byzantine attackers, where the generated spectrum sensing data features benefit from the PU status during the training process. Though these machine learning algorithms have certain advantages in prior information, performance, and application scenarios, achieving these goals requires massive training sequences and computational costs, which are not suitable for low-energy sensors. In large-scale CWSNs, in particular, lightweight computing and efficiency for CSS are indispensable.

1.3. Our Contributions

In order to guarantee the premise of CWSNs, the CSS process should be carefully taken into consideration in the context of Byzantine attacks. Therefore, a widely applicable Byzantine attack model should be developed first, and considering the robustness of subsequent Byzantine identification and suppression algorithms, the attack probability and attack ratio should not be limited. Also, we considered the sequential binary hypothesis test to improve CSS efficiency and beta distribution function (BDF) to guarantee CSS performance. The contributions of our work can be summarized as:
To characterize Byzantine behavior from malicious sensor nodes in the CSS process, we design a pair of flexible attack parameters, i.e., attack probability and attack ratio, to carry out various attack strategies (i.e., always attack, probabilistic attack) and attack scales (i.e., small/large-scale attack).
Further, we convert the binary hypothesis test problem on the phenomenon of the presence of the PU into the sequential process to realize CSS among multiple sensors. To accurately evaluate the reputation value of each sensor, we formulate a beta reputation model to identify malicious sensor nodes.
Considering the storage capacity of the FC, the positive and negative total evaluation within a window period is designed to quantify reliable and unreliable sensor nodes. Moreover, we exploit tuning parameters that reflect linear and multiplier growth to accurately determine the weight of the likelihood ratio in the sequential process.

1.4. Organization

The rest of this paper is organized as follows. In Section 2, a CWSN and Byzantine attack model are presented. Section 3 formulates BDF for CSS to defend against Byzantine attacks from malicious sensor nodes. The correctness and effectiveness of BDF are verified in Section 4 in terms of the error probability and the average number of samples. Finally, Section 5 concludes this paper.

2. System Model

In this section, we propose a centralized CWSN model in the presence of malicious sensor nodes. On this basis, we further model a CSS paradigm among multiple sensor nodes in which malicious sensor nodes launch Byzantine attacks, including various attack strategies and attack scales.

2.1. CWSN Model

We consider a centralized CWSN consisting of a PU, an FC, and N collaborative sensors, where the proportion of malicious sensor nodes is ρ , as shown in Figure 1. Since our research relies on the FC, it is only applicable to a centralized network and not to distributed networks that do not rely on the FC. In a spectrum sensing frame structure [34], a frame duration includes a sensing slot, a reporting slot, and a data transmission slot, as shown in Figure 2. To opportunistically access the available channel and avoid harmful interference to the normal communication of the PU, all sensors detect the PU’s signal with the help of the local sensing technology at a sensing slot. Then, at the reporting slot, each sensor individually submits its own sensing result to the FC via the error-free common control channel. After receiving the sensing results, the FC needs to make a global decision about the PU’s status using a specific rule. Finally, based on the global decision, the FC broadcasts a message to the sensors, which determines whether sensor nodes are allowed to access the channel. In detail, if the global decision is 1, sensors will be allowed to transmit data at the data transmission slot, otherwise, they will be forbidden from accessing the channel and continue spectrum sensing at the next sensing frame.
There may be various types of PUs and low computational complexities in CWSNs, and energy detection (where the energy value is the mean square of the received signal within a certain sampling time) is often used as a local spectrum sensing technique to detect the PU signal. Then, by comparing the energy value with a pre-set decision threshold, a local binary decision about the presence or absence of the PU can be made. This is the process of local spectrum sensing. A pair of local spectrum sensing performances, including the local false alarm and miss-detection probabilities, are denoted by P f and P m , respectively.

2.2. Byzantine Attack Model

On the basis of the CSS paradigm and its open nature, some malicious nodes may take advantage of this opportunity to launch Byzantine attacks. Specifically, after completing the local sensing, the malicious sensor nodes will falsify their own sensing result and submit it to the FC, aiming to mislead the FC into making an incorrect decision about the PU’s status. To further analyze Byzantine behaviors, the local false alarm and miss-detection probabilities are assumed to be the same for each sensor node. Then, at the k -th sensing, the local sensing result, and the received sensing result are denoted by L i k and R i k , respectively. Byzantine behaviors from the malicious sensor node can be described by an attack probability as
α = P R i k = 1 | L i k = 0 P R i k = 0 | L i k = 1                                            
where α varies from 0 to 1. Such an attack strategy represents the attack probability that the malicious sensor nodes flips the sensing result from 1 to 0 or from 0 to 1. Therefore, the false alarm and miss-detection probabilities at the malicious sensing nodes can be given by
P f a = 1 P f α + P f 1 α = α + P f 2 α P f
P m a = 1 P m α + P m 1 α = α + P m 2 α P m
Specifically, if the attack probability α is set to 1, the malicious sensor node always carries out the attack strategy. In addition to the attack strategy, the proportion of malicious sensor nodes should also be taken into consideration. Many current research works only consider the situation where there are relatively few malicious nodes, because the global decision at the FC cannot be distorted by a small number of malicious sensor nodes, so malicious sensor nodes can be easily identified using global decisions. Once there are a large number of malicious sensor nodes in CWSNs, i.e., ρ > 50 % , traditional algorithms will no longer be effective. Therefore, in order to achieve a more secure CSS algorithm, defense against large-scale attacks should also be indispensable.

3. Beta Distribution Function

In this section, encouraged by SPRT, we adopt SPRT as the fundamental CSS framework to reduce the number of samples required by the FC. On this basis, a beta reputation model is formulated to distinguish malicious sensor nodes and integrated into the sequential CSS process.

3.1. Sequential Process

Based on the received sensing results, the FC adopts a specific fusion rule to mitigate the negative impact of Byzantine attacks on CSS. In addition, considering the number of sensors, the cooperative efficiency should be also taken into consideration to decrease the samples required by the FC, therefore reducing the communication overhead from the sensor node to the FC. To this end, we propose BDF for CSS against Byzantine attacks.
In the beginning, we adopted SPRT as a CSS framework to improve the cooperative efficiency when the FC collects the sensing information from sensor nodes. In detail, SPRT requires the knowledge of a priori probabilities of L i k when the hypotheses H 0 or H 1 of the PU is absent or present, i.e., P r L i k | H 0 and P r L i k | H 1 . Relying on these assumptions, the FC sequentially calculates the likelihood ratio and makes a global decision according to the following decision variable:
S n = i = 1 n P r L i k | H 1 P r L i k | H 0
where n represents the number of sensing results/samples required by the FC at a sensing frame and varies from 1 to N . Further, the global decision will be made according to the following criterion
S n ξ u ,                                                       t h e   F C   a c c e p t s   H 1 S n ξ l ,                                                         t h e   F C   a c c e p t s   H 0 ξ l < S n < ξ u ,   t h e   F C   t a k e s   n e x t   o b s e r v a t i o n                                                              
where ξ u and ξ l are defined as
ξ u = 1 P ¯ f P ¯ m ,
and
ξ l = P ¯ f 1 P ¯ m ,  
P ¯ f and P ¯ m are tolerated false alarm and miss-detection probabilities, respectively. It should be noted that even though it has been shown that the SPRT terminates with probability one, the number of samples n required for terminating the sequential process is determined by P r L i k | H 0 , P r L i k | H 1 , ξ l and ξ u , therefore it is random [35].
Compared to Bayesian detection and Neyman–Pearson, SPRT to a certain extent saves the number of samples required for the FC to efficiently make a global decision without any performance loss. However, similar to Bayesian detection and Neyman–Pearson, it also cannot defend against Byzantine attacks. Therefore, it is necessary to take security and performance into consideration. Motivated by this disadvantage of SPRT, a reputation mechanism is usually integrated into the weighted sequential process, as given in
                      S n = i = 1 n P r L i k | H 1 P r L i k | H 0 w i k = i = 1 n P r L i k = 1 | H 1 P r L i k = 1 | H 0 d i k P r L i k = 0 | H 1 P r L i k = 0 | H 0 1 d i k w i k = i = 1 n 1 P m P f d i k P m 1 P f 1 d i k w i k
To be specific, the reputation of the i -th sensor nodes after the k -th sensing is obtained by following reputation mechanism [6]
T i k = T i k 1 + 1 R i k + g k
Thus, the likelihood ratio weight of the i -th sensor node is designed as [8]
w i k + 1 = 0 ,                                                               T i k g T i k + g max T i k + g ,       T i k > g                                                        
However, when the FC makes a global decision, WSPRT is easily affected by large-scale attacks and cannot accurately output reputation values, leading to the failure of weight. Hence, a reputation mechanism remains a major challenge. To this end, we integrate a beta reputation model into the sequential process in the following subsection.

3.2. Beta Reputation Model

Following the above purpose, we consider that during the local sensing, the sensing results can be categorized into two possibilities, following a binomial distribution. The beta distribution is suitable for describing the probability distribution characteristics of binomial events. Hence, we can establish a reputation model to allocate member reputation values. This approach helps mitigate reputation fluctuations caused by factors such as noise uncertainty, multipath fading, or shadowing, thereby safeguarding the normal senor nodes from excessive defensive actions by the FC.
Let x represent the actual local sensing result transmitted by sensors and y represent the local sensing result after being falsified by malicious sensors. Use r to denote the number of occurrences of event x and s to represent the number of occurrences of event y . By setting β 0 = r + 1   and β 1 = s + 1 , the probability density function can be derived by [7]
f p | β 0 , β 1 = Γ β 0 + β 1 Γ β 0 Γ β 1 p β 0 1 1 p β 1 1
where Γ · is a Gamma function, p represents the probability of sensing behaviors and 0 p 1 . β 0 > 0 , β 1 > 0 . The expectation of event x is
E B e t a β 0 , β 1 = β 0 β 0 + β 1  
Then, the reputation value of the i -th sensor node is evaluated using the beta function, i.e.,
T i = B e t a r i + 1 , s i + 1 = r i + 1 r i + s i + 2

3.3. Weight Evaluation

To effectively combat Byzantine attacks, the FC employs a beta reputation system to allocate reputation values to sensor nodes based on historical sensing behavior. This approach establishes a dynamic reputation evaluation for CSS by means of a data delivery mechanism. It is known that a fixed frame duration consists of a sensing slot, a reporting slot, and a data transmission slot in a periodic spectrum sensing frame. After the reporting slot, the FC makes a global decision about the PU status according to (2), such as, when the global decision is 1, all sensors are forbidden from accessing the channel and while the global decision is 0, all sensors are allowed to access the channel. Nevertheless, due to the negative impact of a Byzantine attack, the global decision may be unreliable. Hence, we have the following considerations: (a) if global decision 1 is incorrect, then the original channel must be idle, and malicious sensor nodes selfishly occupy the channel by tampering with the sensing results, (b) if global decision 0 is incorrect, then the original channel must be busy, and malicious sensor nodes must have interfered with the PU by tampering with the sensing results.
This data delivery mechanism can be used by the FC to determine the reliability of the global decision in the current frame and to measure the local sensing results without being affected by the Byzantine attack. We label it as G k and use it as a standard to measure the reliability of local sensing results. By comparing the local sensing results with G k , the result deviation at the k -th sensing can be given by
D i k = L i k G k 2 N
Then, the average value of the sensing result deviation is
D i ¯ k = 1 N i = 1 N D i k  
Further, let e i k represent the positive and negative evaluations of the sensing results obtained by the i -th sensor. D i ¯ k D i k indicates that the local sensing results of the i -th sensor at the k -th sensing are reliable, and a positive evaluation e i k = 1 is assigned to the i -th sensor. Conversely, if the local sensing result is deemed unreliable, it is assigned a negative evaluation e i k = 0 .
Considering the storage capacity of the FC, we assume that the historical evaluation values of the sensor is L , which means the FC retains the evaluation values derived from L instances of sensing results. Thus, the positive total evaluation p i k and negative total evaluation n i k of the i -th sensor at the k -th sensing are computed as
p i k = j = 1 L e i k w i k L n ,                       i f   k < L j = k L + 1 L e i k w i k L n ,             o t h e r w i s e  
and
n i k = j = 1 L ( 1 e i k ) w i k L n ,                     i f   k < L j = k L + 1 L ( 1 e i k ) w i k L n ,           o t h e r w i s e      
respectively.
The total evaluation is then incorporated into the beta reputation system. Specifically, for the i -th sensor during the k -th sensing, the accumulated evaluation values are considered. The reputation parameters r i k and s i k are expressed as
r i k = p i k + ϕ r  
s i k = n i k ϕ s
where ϕ r and ϕ s represent tuning parameters that reflect linear and multiplier growth of different types of sensing results, respectively.
Finally, the reputation value/weight of the i -th sensor after the k -th sensing can be expressed as
T i k + 1 = w i k + 1 = p i k + ϕ r + 1 p i k + n i k ϕ s + ϕ r + 2
In addition, the higher the reputation value of the sensor, the higher the sensing result will be prioritized in the likelihood ratio at the next sensing, thereby further improving the efficiency of collaboration. The whole process of BDF is illustrated in Figure 3.

4. Simulation Results

In this section, simulation results are presented to demonstrate the effectiveness of the proposed BDF by comparing it with SPRT and WSPRT in terms of the error probability Q e and the average number of samples N a v e . In a sensing observation period (2000 sensing frames), the attack probability α varies from 0 to 1 at an interval of 0.02, and the attack probability ρ = 0.1 ,   0.2 ,   0 , 3 and ρ = 0.7 ,   0.8 ,   0 , 9 are presented to characterize the small/large-scale attack, respectively. The values for other simulation parameters are set as follows: The number of sensors N participating in CSS is 100. Regardless of whether the sensor nodes are malicious or normal, their local detection probability P d and local false alarm probability P f are both 0.7 and 0.3, respectively, assuming that the probability P H 0 of the PU’s status H 0 is 0.1 and the probability P H 1 of the PU’s status H 1 is 0.9. In addition, in the sequential process, the tolerated miss-detection probability P ¯ m and the tolerated false alarm probability P ¯ f are set to 10−3 and 10−4, respectively. The reputation threshold g of WSPRT is 5.

4.1. Always Attack

The always attack is a common attack strategy that is often considered in many Byzantine identification and suppression algorithms. Therefore, we consider the error probability and the average number of samples in the context of this attack strategy. The attack ratio ρ varies from 0 to 0.8 at an interval of 0.02.
As illustrated in Figure 4, when those malicious sensor nodes launch always attack, the error probability of SPRT starts to shake when the attack probability is 0.3 and increases to 1 when the attack probability exceeds 0.5. At the same time, the error probability of WSPRT performs very well before the attack ratio reaches 0.5, but once ρ exceeds 0.5, it also shakes up to 1 and remains stable. In contrast, the proposed BDF consistently maintained very accurate PU detection. The above results strongly confirm that both SPRT and WSPRT are negatively affected by the blind problem to varying degrees.
Following the error probability in the context of always attack, the average number of samples is presented in Figure 5. It can be seen from Figure 5 that when the attack probability is low, because of the sequential idea, all three fusion rules only require a small number of samples to accurately detect the PU. However, as the attack probability increases, the FC of SPRT and WSPRT begins to require more samples to make a global decision (although the global decision is not accurate at this time), and the required number of samples increases first and then decreases (constantly shaking during the process) because of the randomness of the sequential process (samples may come from malicious or normal sensor nodes) and the unreliability of global decision. Finally, since the FC is distorted, the performance is significantly degraded and the number of samples does not need to be greater. In contrast, the BDF sample size remains unchanged at around 5.
Although always attack is a common attack strategy and many algorithms have paid attention to it, they only consider situations with lower attack ratios, so always attack is also easy to identify and suppress. Here, we not only consider always attack but also various attack ratios. However, from the above simulation results, our proposed BDF exhibits excellent performance in both the error probability and sample size during the sequential process due to considering the data delivery mechanism and adapting the corresponding weight evaluation.

4.2. The Error Probability

In order to get an insight into a small/large attack’s influence on the error probability, we compare the error probabilities of SPRT, WSPRT, and BDF under various attack probabilities in the context of a small/large attack.

4.2.1. Small-Scale Attack

As shown in Figure 6, regardless of the attack probability adopted by malicious sensor nodes, SPRT, WSPRT, and BDF in the context of small-scale attacks can basically achieve 100% detection accuracy for the PU signal because even SPRT has a certain level of Byzantine fault tolerance. From this, it can be seen that under a small-scale attack, even always attack cannot make the FC blind (the Byzantine attack makes the global decision of the FC not more accurate than random guesses). It should be noted that since SPRT does not have any defense capabilities to resist Byzantine attacks, once the attack ratio increases, i.e., when ρ = 0.2 ,   0 , 3 , the error probability also increases, to some extent.

4.2.2. Large-Scale Attack

Different from small-scale attacks, the negative impact of large-scale attacks on the error probabilities of SPRT, WSPRT, and BDF is more significant. As illustrated in Figure 7, the error probabilities of SPRT, WSPRT, and BDF remain zero when the attack probability is less than 0.2. However, as the attack probability increases, the three methods exhibit different variations of the error probability. In detail, the error probability of SPRT fluctuates upwards; the larger the attack ratio, the higher the error probability, until it stabilizes. WSPRT suppresses the Byzantine attack to a certain extent through the weight of likelihood ratio based on SPRT, presenting the following differences: (1) the performance of WSPRT deteriorates slower than that of SPRT under the same attack strategy before the FC is blind; (2) once the FC is blind, the error probability jitter of WSPRT is more severe than that of SPRT; (3) the attack probability further increases and the error probability of WSPRT is also higher than that of SPRT. This is because the ratio and probability of attack gradually increase, making the global decision of the FC unreliable. WSPRT relies on the global decision to measure the reliability of the local sensing result and design weight, resulting in unstable performance once the global decision is incorrect, and, coupled with the random calculation of likelihood ratio, ultimately worse performance (normal sensor nodes are considered malicious, and vice versa).
In contrast to SPRT and WSPRT, BDF shows significant performance at ρ = 0.7 ,   0 , 8 , indicating that the beta reputation model can accurately identify malicious sensor nodes; that is to say, the reputation value is accurately evaluated and not affected by the accuracy of the global decision. Based on this, the positive and negative total weight evaluation accurately amplifies and reduces the positive and negative impacts on the global decision-making of the FC, respectively. Further, when ρ = 0.9 , the error probability of BDF increases (first increases and then decreases), which also indicates that always attack is relatively easy to overcome; however, overall, its error probability is still not higher than 0.12.

4.3. The Average Number of Samples

The cooperative performance of SPRT, WSPRT, and BDF is presented by means of the error probability in the context of small/large-scale attacks. The next thing that should be considered is to evaluate the cooperative efficiency using the average number of samples.

4.3.1. Small-Scale Attack

The average numbers of samples for SPRT, WSPRT, and BDF in the context of small-scale attacks are simulated in Figure 8. In the case of ρ = 0.1 ,   0.2 ,   0 , 3 , no matter what attack probability the malicious sensor node adopts, it cannot make the FC blind. However, due to the malicious sensor node tampering with the sensing result, the sequential SPRT and WSPRT processes randomly calculate the likelihood ratio, so the required number of samples is also random and less likely to make the decision variable Λ n satisfy the upper and lower threshold conditions. Moreover, as the attack probability increases, the fluctuation of the average sample size also increases.
Unlike SPRT and WSPRT, the number of samples required for BDF never exceeds 5.5. On the one hand, BDF accurately identifies malicious sensor nodes through a data delivery mechanism, and on the other hand, the beta reputation model enables the FC to rely on normal sensor nodes to the greatest extent possible while suppressing malicious sensor nodes. In addition, BDF can prioritize the sensing results of sensors with high credibility, enabling the FC to make global decisions quickly and accurately.

4.3.2. Large-Scale Attack

The sample size under a large-scale attack appears to be more regular, as at a certain attack probability, the Byzantine attack may make the FC blind, as shown in Figure 9. Firstly, the sample sizes of the three methods increase and then decrease with the increase in attack probability, except WSPRT has the largest amplitude. Undoubtedly, the increase in attack probability may make the global decision less reliable, but the weight of WSPRT makes the global decision more unreliable and random. In order to ensure that the decision variable meets the upper and lower thresholds in the sequential process, the FC has to require more samples. Once the FC is blind, it indicates that the global decision is completely unreliable, and the FC only needs a small number of samples to make an incorrect global decision.
The above analysis and discussion of BDF are conducted in a serial case. If there are fewer sensors in parallel, the difference between serial and parallel efficiencies is not significant. However, when there are more sensors, serial efficiency is better, reducing the computational load of the FC as well as unnecessary overhead communication between sensors and the FC. In addition, if considered properly, there is still room to improve the efficiency of serial BDF. For example, the PU’s status can be characterized based on the local decision changes in the front and rear sensors rather than the local decision itself; that is, the front and rear differences can be used to further improve efficiency.

5. Conclusions and Future Work

In this paper, we investigated Byzantine attacks on CSS in CWSNs. To mitigate the negative impact of Byzantine attacks on CSS, we propose BDF, which includes a sequential process, beta reputation model, and weight evaluation. In BDF, we are motivated by SPRT to integrate the beta reputation function into a weight-for-weight sequential process and sequentially calculate the likelihood ratio in a descending reputation order. Finally, in contrast to SPRT and WSPRT, a series of numerical simulation results demonstrate the correctness and effectiveness of the proposed BDF regarding the error probability and the average number of samples under small/large-scale attacks and attack probabilities.
There are many interesting questions that remain to be explored in the future, such as a Byzantine attack strategy based on soft combining. Additionally, the sequential idea may be further extended to machine learning methods to ensure the accuracy, security, and efficiency of CSS.

Author Contributions

Conceptualization, J.W.; methodology, J.W.; software, J.W.; validation, J.W.; formal analysis, J.W.; investigation, J.W.; resources, J.W.; data curation, J.W.; writing—original draft preparation, J.W.; writing—review and editing, J.W. and R.Z.; visualization, J.W.; supervision, J.W.; project administration, J.W. and T.L.; funding acquisition, J.W. and T.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China under Grant Nos. 62201186 and 62301200, and Zhejiang Provincial Natural Science Foundation of China under Grant No. LQ22F010004.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Kenyeres, M.; Kenyeres, J. Distributed Mechanism for Detecting Average Consensus with Maximum-Degree Weights in Bipartite Regular Graphs. Mathematics 2021, 9, 3020. [Google Scholar] [CrossRef]
  2. Jabeen, T.; Jabeen, I.; Ashraf, H.; Ullah, A.; Jhanjhi, N.Z.; Ghoniem, R.M.; Ray, S.K. Smart Wireless Sensor Technology for Healthcare Monitoring System Using Cognitive Radio Networks. Sensors 2023, 23, 6104. [Google Scholar] [CrossRef] [PubMed]
  3. Yu, H.; Zikria, Y.B. Cognitive Radio Networks for Internet of Things and Wireless Sensor Networks. Sensors 2020, 20, 5288. [Google Scholar] [CrossRef] [PubMed]
  4. Vijay, G.; Bdira, E.B.A.; Ibnkahla, M. Cognition in wireless sensor networks: A perspective. IEEE Sens. J. 2011, 11, 582–592. [Google Scholar] [CrossRef]
  5. Araujo, A.; Blesa, J.; Romero, E.; Villanueva, D. Security in cognitive wireless sensor networks. Challenges and open problems. EURASIP J. Wirel. Commun. Netw. 2012, 2012, 48. [Google Scholar] [CrossRef]
  6. Gan, J.; Wu, J.; Zhang, J.; Chen, Z.; Chen, Z. Throughput and interference for cooperative spectrum sensing: A malicious perspective. KSII Trans. Internet Inf. Syst. 2021, 15, 4224–4243. [Google Scholar]
  7. Liu, M.; Xu, D.; Huo, Z.M.; Sun, Z.X. Research on spectrum sensing data falsification attack detection algorithm in cognitive Internet of Things. Telecommun. Syst. 2022, 80, 227–338. [Google Scholar]
  8. Zhang, L.; Ding, G.; Wu, Q.; Zou, Y.; Han, Z.; Wang, J. Byzantine attack and defense in cognitive radio networks: A survey. IEEE Commun. Surv. Tutor. 2015, 17, 1342–1363. [Google Scholar] [CrossRef]
  9. Wu, J.; Song, T.; Yu, Y.; Wang, C.; Hu, J. Generalized Byzantine attack and defense in cooperative spectrum sensing for cognitive radio networks. IEEE Access 2018, 6, 53272–53286. [Google Scholar] [CrossRef]
  10. Wu, J.; Li, P.; Chen, Y.; Tang, J.; Wei, C.; Xia, L.; Song, T. Analysis of Byzantine attack strategy for cooperative spectrum sensing. IEEE Commun. Lett. 2020, 24, 1631–1635. [Google Scholar] [CrossRef]
  11. Zeng, K.; Pawelczak, P.; Cabric, D. Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Commun. Lett. 2010, 14, 226–228. [Google Scholar] [CrossRef]
  12. Luo, X. Secure Cooperative Spectrum Sensing Strategy Based on Reputation Mechanism for Cognitive Wireless Sensor Networks. IEEE Access 2020, 8, 131361–131369. [Google Scholar] [CrossRef]
  13. Chen, R.; Park, J.M.J.; Bian, K. Robustness against Byzantine failures in distributed spectrum sensing. Comput. Commun. 2012, 35, 2115–2124. [Google Scholar] [CrossRef]
  14. Sun, Z.; Xu, Z.; Hammad, M.Z.; Ning, X.; Wang, Q.; Guo, L. Defending against massive SSDF attacks from a novel perspective of honest secondary users. IEEE Commun. Lett. 2019, 23, 1696–1699. [Google Scholar] [CrossRef]
  15. Xu, Z.; Sun, Z.; Guo, L.; Muhammad, Z.H.; Chintha, T. Joint spectrum sensing and spectrum access for defending massive SSDF attacks: A novel defense framework. Chin. J. Electron. 2022, 31, 240–254. [Google Scholar] [CrossRef]
  16. Lin, R.; Li, F.; Wang, J.; Hu, J.; Zhang, Z.; Wu, L. A blockchain-based method to defend against massive SSDF attacks in cognitive internet of vehicles. IEEE Trans. Veh. Technol. 2024, 73, 6954–6967. [Google Scholar] [CrossRef]
  17. Fu, Y.; He, Z. Massive SSDF attackers identification in cognitive radio networks by using consistent property. IEEE Trans. Veh. Technol. 2023, 72, 11058–11062. [Google Scholar] [CrossRef]
  18. Li, Z.; Mo, Y.; Hao, F. Distributed sequential hypothesis testing with Byzantine sensors. IEEE Trans. Signal Process. 2021, 69, 3044–3058. [Google Scholar] [CrossRef]
  19. Wan, F.; Ma, T.; Hua, Y.; Liao, B.; Qing, X. Secure distributed estimation under Byzantine attack and manipulation attack. Eng. Appl. Artif. Intell. 2022, 116, 105384. [Google Scholar] [CrossRef]
  20. Chen, Q.; Bulusu, S.; Geng, B.; Varshney, P.K. Ordered transmission-based detection in distributed networks in the presence of Byzantines. arXiv 2022, arXiv:2201.08737. [Google Scholar]
  21. Chen, Q.; Geng, B.; Han, Y.S.; Varshney, P.K. Enhanced audit bit based distributed Bayesian detection in the presence of strategic attacks. IEEE Trans. Signal Inf. Process. Over Netw. 2022, 8, 49–62. [Google Scholar]
  22. Chen, Q.; Han, Y.S.; Geng, B.; Varshney, P.K. Reputation and audit bit based distributed detection in the presence of Byzantines. In Proceedings of the 2022 56th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 31 October–2 November 2022; pp. 548–552. [Google Scholar]
  23. Yao, D.; Yuan, S.; Lv, Z.; Wan, D.; Mao, W. An enhanced cooperative Spectrum sensing scheme against SSDF attack based on Dempster-Shafer evidence theory for cognitive wireless sensor networks. IEEE Access 2020, 8, 175881–175890. [Google Scholar] [CrossRef]
  24. Ridouani, M.; Benazzouza, S.; Salahdine, F.; Hayar, A. A novel secure cooperative cognitive radio network based on Chebyshev map. Digit. Signal Process. 2022, 126, 103482. [Google Scholar] [CrossRef]
  25. Chouhan, A.; Captain, K.; Parmar, A.; Kumar, R. Single decision reporting for cooperative spectrum sensing under erroneous feedback channels with Byzantine attack. Phys. Commun. 2022, 55, 101891. [Google Scholar] [CrossRef]
  26. Chouhan, A.; Parmar, A.; Captain, K.; López-Benítez, M. Defending against Byzantine attacks in CRNs: PCA-based malicious user detection and weighted cooperative spectrum sensing. IEEE Wirel. Commun. Lett. 2024, 13, 1488–1492. [Google Scholar] [CrossRef]
  27. Chen, L.; Shen, X.; Zhao, X.; Wang, Z.; He, W.; Xu, G.; Chen, Y. Defending dominant cooperative probabilistic attack in CRNs by JS-divergence-based improved reputation algorithm. Pervasive Mob. Comput. 2024, 101, 101921. [Google Scholar] [CrossRef]
  28. Parmar, A.; Shah, K.; Captain, K.M.; López-Benítez, M.; Patel, J.R. Gaussian mixture model-based anomaly detection for defense against Byzantine attack in cooperative spectrum sensing. IEEE Trans. Cogn. Commun. Netw. 2024, 10, 499–509. [Google Scholar] [CrossRef]
  29. Parras, J.; Zazo, S. Using one class SVM to counter intelligent attacks against an SPRT defense mechanism. Ad Hoc Netw. 2019, 94, 694–706. [Google Scholar] [CrossRef]
  30. Sarmah, R.; Taggu, A.; Marchang, N. Detecting Byzantine attack in cognitive radio networks using machine learning. Wirel. Netw. 2020, 26, 5939–5950. [Google Scholar] [CrossRef]
  31. Taggu, A.; Marchang, N. Detecting Byzantine attacks in cognitive radio networks: A two-layered approach using Hidden Markov model and machine learning. Pervasive Mob. Comput. 2021, 77, 101461. [Google Scholar] [CrossRef]
  32. Luo, Z.; Zhao, S.; Lu, Z.; Xu, J.; Sagduyu, Y.E. When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing. IEEE Trans. Mob. Comput. 2022, 21, 1892–1908. [Google Scholar] [CrossRef]
  33. Zhang, Z.; Wu, J.; Gan, J.; Chen, Z.; Shen, J. Support vector Machine process against probabilistic Byzantine attack for cooperative spectrum sensing in CRNs. In Proceedings of the 2023 8th International Conference on Machine Learning Technologies, Stockholm, Sweden, 10–12 March 2023; pp. 269–276. [Google Scholar]
  34. Liang, Y.; Zeng, Y.; Peh, E.C.Y.; Hoang, A.T. Sensing-throughput tradeoff for cognitive radio networks. IEEE Trans. Wirel. Commun. 2008, 7, 1326–1337. [Google Scholar] [CrossRef]
  35. Varshney, P.K. Distributed Detection and Data Fusion; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
Figure 1. CSS in the presence of a Byzantine attack.
Figure 1. CSS in the presence of a Byzantine attack.
Electronics 13 03386 g001
Figure 2. The spectrum sensing frame structure.
Figure 2. The spectrum sensing frame structure.
Electronics 13 03386 g002
Figure 3. The flowchart of BDF.
Figure 3. The flowchart of BDF.
Electronics 13 03386 g003
Figure 4. The error probability in the context of always attack.
Figure 4. The error probability in the context of always attack.
Electronics 13 03386 g004
Figure 5. The average number of samples in the context of always attack.
Figure 5. The average number of samples in the context of always attack.
Electronics 13 03386 g005
Figure 6. The error probability vs. the attack probability in the context of a small-scale attack.
Figure 6. The error probability vs. the attack probability in the context of a small-scale attack.
Electronics 13 03386 g006
Figure 7. The error probability vs. the attack probability in the context of a large-scale attack.
Figure 7. The error probability vs. the attack probability in the context of a large-scale attack.
Electronics 13 03386 g007
Figure 8. The average number of samples vs. the attack probability in the context of a small-scale attack.
Figure 8. The average number of samples vs. the attack probability in the context of a small-scale attack.
Electronics 13 03386 g008
Figure 9. The average number of samples vs. the attack probability in the context of a large-scale attack.
Figure 9. The average number of samples vs. the attack probability in the context of a large-scale attack.
Electronics 13 03386 g009
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, J.; Liu, T.; Zhao, R. Beta Distribution Function for Cooperative Spectrum Sensing against Byzantine Attack in Cognitive Wireless Sensor Networks. Electronics 2024, 13, 3386. https://doi.org/10.3390/electronics13173386

AMA Style

Wu J, Liu T, Zhao R. Beta Distribution Function for Cooperative Spectrum Sensing against Byzantine Attack in Cognitive Wireless Sensor Networks. Electronics. 2024; 13(17):3386. https://doi.org/10.3390/electronics13173386

Chicago/Turabian Style

Wu, Jun, Tianle Liu, and Rui Zhao. 2024. "Beta Distribution Function for Cooperative Spectrum Sensing against Byzantine Attack in Cognitive Wireless Sensor Networks" Electronics 13, no. 17: 3386. https://doi.org/10.3390/electronics13173386

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop