The Scientific World Journal

The Scientific World Journal / 2014 / Article
Special Issue

Recent Advances in Communications and Networking

View this Special Issue

Research Article | Open Access

Volume 2014 |Article ID 752507 |

Hiep Vu-Van, Insoo Koo, "Goodness-of-Fit Based Secure Cooperative Spectrum Sensing for Cognitive Radio Network", The Scientific World Journal, vol. 2014, Article ID 752507, 6 pages, 2014.

Goodness-of-Fit Based Secure Cooperative Spectrum Sensing for Cognitive Radio Network

Academic Editor: Yuxin Mao
Received07 Mar 2014
Accepted25 Apr 2014
Published18 May 2014


Cognitive radio (CR) is a promising technology for improving usage of frequency band. Cognitive radio users (CUs) are allowed to use the bands without interference in operation of licensed users. Reliable sensing information about status of licensed band is a prerequirement for CR network. Cooperative spectrum sensing (CSS) is able to offer an improved sensing reliability compared to individual sensing. However, the sensing performance of CSS can be destroyed due to the appearance of some malicious users. In this paper, we propose a goodness-of-fit (GOF) based cooperative spectrum sensing scheme to detect the dissimilarity between sensing information of normal CUs and that of malicious users, and reject their harmful effect to CSS. The empirical CDF will be used in GOF test to determine the measured distance between distributions of observation sample set according to each hypothesis of licensed user signal. Further, the DS theory is used to combine results of multi-GOF tests. The simulation results demonstrate that the proposed scheme can protect the sensing process against the attack from malicious users.

1. Introduction

Nowadays, more bandwidth and higher bit-rates have been required to meet usage demands due to an explosion in wireless communication technology. According to the Federal Communications Commission’s spectrum policy task force report [1], the actual utilization of the licensed spectrum varies from 15 to 80 . In some cases, the utilization is only a small percentage of the total capacity. Cognitive radio (CR) technology [2] has been proposed to solve the problem of ineffective utilization of spectrum bands. Both unlicensed and licensed users, termed the cognitive radio user (CU) and primary user (PU), respectively, operate in CR networks. In CR network, CUs are allowed to access the frequency assigned to PU when it is free. But CU must vacate the occupied frequency when the presence of PU is detected. Therefore, reliable detection of the PU’s signal is a requirement of CR networks.

In order to ascertain the presence of a PU, CUs can use one of several common detection methods, such as matched filter, feature, and energy detection [2, 3]. Energy detection is the optimal sensing method if the CU has limited information about PU’s signal (e.g., only the local noise power is known) [3]. In energy detection, frequency energy in the sensing channel is received in a fixed bandwidth over an observation time window to compare with the energy threshold and determine whether or not the channel is utilized. However, the received signal power may fluctuate severely due to multipath fading and shadowing effects. Therefore, it is difficult to obtain reliable detection with only one CU. Better sensing performance can be obtained by allowing some CUs to perform cooperative spectrum sensing [46].

CSS can use some combination methods such as equal gain combination (EGC) and maximum gain combination (MGC) [7] to combine sensing information of all CUs in the network and make a global decision about status of PU signal. Since EGC gives the same weight for all CUs in the network, it is easy to execute but with limited performance. MGC is known as the optimal combination rule. However, it requires information about the SNRs of the sensing channel, which is difficult to obtain in practice. In addition, MGC is sensitive to attack by malicious users who send false sensing data to the fusion center (FC) [8]. The research presented in [8, 9] determined that the presence of a few malicious users can severely reduce the performance of a CSS scheme. Algorithms used to identify the malicious users have been proposed in the studies of [8, 9]. In previous research, a simple technique (i.e., outlier-detection) is used to detect less damage malicious CUs such as always No or always Yes CU. In addition, the technique is unable to protect the CSS in the event of a large number of malicious users in the network.

In this paper, we utilize multi-goodness-of-fit (GOF) tests to design a robust CSS, in which the event detection technique [10, 11] will be used to provide the combination of different evidence of each type of GOF test which are supported by a particular hypothesis of PU signal. The proposed scheme considers two types of GOF tests, Kolmogorov-Smirnov (KS) and Cramer-von Mises (CM) tests. The proposed scheme can distinguish the sensing information of normal CUs and that of malicious users and reject the harmful effect of malicious user to sensing combination process. Three common types of malicious users including always Yes, always No, and opposite are considered in this paper.

2. Background

2.1. Goodness-of-Fit Test

The GOF test summarizes the discrepancy between the observed samples with theoretical distributions or empirical distributions and the reference distribution. For the independent and identical distributed observation, the sample is first arranged in ascending order such that . The GOF test is used to determine whether or not the samples set was drawn from the same distribution with a cumulative distribution function (CDF) . The testing hypothesis can be formulated as follows: where is the empirical CDF of the sample. It can be calculated as follows: where is the indicator of event .

There are many types of GOF tests, for instance, Cramer-von Mises (CM), Kolmogorov-Smirnov (KS), AndersonDarling (AD), and Hosmer-Lemeshow (HL) tests. In this paper, we consider two types of GOF tests, and tests, which can run well with a low number of samples. (1)Kolmogorov-Smirnov (KS) test: the KS test, which is based on the empirical CDF of the samples set and the reference CDF, can be calculated according to the largest difference of two distributions as follows: where is supremum function, which indicates the greatest element of the set. If the sample comes from distribution , then will converge to . (2)Cramer-von Mises (CM) test: CM test is used for judging the goodness-of-fit of the sample set’s CDF and reference distribution’s CDF . The test statistic is given by and can be approximated as If this value, , is larger than the threshold, the hypothesis that the sample data come from the reference distribution can be rejected.

2.2. Combination of Evidence in Dempster-Shafer Theory

Dempster-Shafer (DS) theory was first introduced by Demperster and was later extended by Shafer. This is a potentially valuable tool for the evaluation of risk and reliability in engineering applications when it is not possible to obtain a precise measurement from experiments or when knowledge is obtained from expert elicitation. An important aspect of this theory is the combination of evidence obtained from multiple sources and the modeling of conflict between them.

In DS theory [12], a representation of ignorance is provided by assigning a nonzero mass function to hypothesis , also called the basic probability assignment (BPA), and is defined for every hypothesis such that the mass value belongs to the interval and satisfies the following conditions: where is the frame of discernment, which is a fixed set of mutually exclusive and exhaustive elements.

By assigning a nonzero mass in a compound hypothesis, means that there exists the option to not make a decision between and but to leave the formulation in the class. In DS theory, two functions, belief ( ) and plausibility ( ), are defined to characterize the uncertainty and support of certain hypotheses. measures the minimum or necessary support, whereas reflects the maximum or potential support for that hypothesis [13]. These two measures, derived from mass values, are defined as a map from a set of hypotheses to interval as follows:

The sum of mass functions from different information source, , combined with the DS rule is known as the orthogonal sum, which is commutative and associative. The result is a new mass function, , which incorporates the joints information provided by the sources as follows: where is the measure of conflict between the different sources and is introduced as a normalization factor.

3. The Proposed Secure Cooperative Spectrum Sensing Based on GOF Test

There is a definite difference between the CDF of received signal energy of normal CU and that of the malicious users as shown in Figure 1. The CDF of the received signal energy of normal CU corresponding to the presence of the PU is always “under” that one corresponding to the absence of the PU. On the contrary, the opposite malicious CU has the CDF corresponding to the presence of PU to be “above” the CDF corresponding to the absence of PU. The always Yes and always No malicious CUs have a similar CDF corresponding to presence and absence of PU. Due to the difference between CDF of normal and malicious CUs, we utilize GOF test to detect the appearance of malicious users in the network, so that their harmful effect can be rejected out of CSS process. Multi-GOF tests including and tests will be applied for adaptive robust CSS. The DS theory will be used to combine results of multi-GOF tests.

In this paper, we consider a CR network including CUs who cooperate to sense the signal from a PU. There are malicious CUs appearing in the network which can be classified as three common types: always Yes, always No, and opposite malicious CUs. All CUs use energy detectors to perform spectrum sensing and send their sensing data to the FC through a control channel. Based on the sensing data obtained from the CUs, the FC makes a global decision concerning the presence or absence of the PU signal by using the proposed data fusion scheme. The proposed scheme has steps as follows.

Step 1. All CUs perform spectrum sensing by using energy detection method to determine received signal energy , where is the number of sensing samples that the th CU takes in the sensing interval.

Step 2. At the FC, GOF test statistics of each CU will be computed according to hypothesis of the PU as given in (11). After that, BPA and final BPA for current sensing data will be estimated based on the “reputation level” of each CU, which is updated from previous sensing interval. Based on final BPA, a global decision rule will be proposed to make global decision about status of PU signal.

Step 3. Update “reputation level” of each CU according to the global decision.

The detailed description of each step will be given in the following subsections.

3.1. Energy Detection

At the sensing interval for the th CU, the local spectrum sensing is to decide between the two following hypotheses: where and correspond to the hypothesis of the absence and presence of the PU signal, respectively, denotes the amplitude gain of the channel, is the signal transmitted from the PU, is the additive white Gaussian noise, and is index of sensing sample at each sensing interval.

A received signal energy of a sensing sample, , is given as

3.2. BPA Estimation

The GOF test statistics of the current sensing data of the CU will be calculated according to each hypothesis of PU signal based on (3) and (5) as follows, respectively: where is index of hypothesis of PU signal, is the received signal energy of th sensing sample of the th CU, and are empirical CDF of observed sensing sample and CDF of hypothesis of PU, and is the number of samples for each sensing interval.

It is noteworthy that normal CU and malicious CU have different characteristics of and as shown in Table 1, where indexes types of GOF tests: KS and CM.

Status of PUNormal CU CU CU CU

Based on the values of and , we will estimate BPA of current sensing data of each CU and their “reputation level” for robust CSS as follows: where is “reputation level” of the th CU according to hypothesis , and it can be determined based on history observation of the th CU as follows: where is the index of current sensing interval and and are updated from the previous sensing interval according to global decision:

By using and , types of CUs will be easily distinguished. The normal CU has positive value of both and that will be increased after updating step. of always Yes and of always No malicious CUs are almost negative and tend to decrease after updating step. On the other hand, both values of opposite CU are negative and have a tendency to decrease. We define “malicious threshold” as to reject the attack of malicious CR in CSS, so that the CU, which has either or , will be determined as malicious CU. The sensing data of malicious CUs will not be considered to make global decision by giving them and .

The BPA of all CUs will be combined with their reputation levels as where and are set of normal CUs and number of members of the set, respectively.

Because the error in estimating and ,   can be bigger than , we need to normalize those values as

3.3. DS Theory Combination

The DS theory will be used to combine the BPA of both GOF tests according to each hypothesis as follows:

Finally, the global decision will be made as follows: where is the threshold for global decision.

According to the global decision, or will be updated for the next sensing interval as follows, respectively.(i)If the global decision is , we update by using (14).(ii)Otherwise, we update by using (15).

4. Simulation Results

In this section, simulation results of the proposed scheme and other soft combination schemes such as maximum gain combination (MGC) and equal gain combination (EGC) are provided. The network is considered in which CUs exist and some of them can be malicious CUs.

In order to verify the reliability of the proposed combination scheme, we perform a simulation without considering malicious CU. The sensing results in Figure 2 show that the proposed scheme can obtain better sensing performance in comparison with EGC scheme and obtain a similar sensing performance to that of the MGC scheme when no malicious CU is considered.

The robustness of the proposed scheme will be investigated in the network with the appearance of always No, always Yes, and opposite malicious CUs in the network. Figures 3 and 4 show performance of the proposed scheme when CUs are always No or always Yes malicious CUs among CUs in the network. The results show that the proposed scheme with all CUs can achieve much better sensing performance than that one of the MGC and EGC schemes. This means that, by applying GOF test to CSS, the proposed scheme can detect the presence of those types of malicious CUs and reject their harmful effects to sensing process.

Opposite malicious CU causes the most damage to sensing performance. However, the proposed scheme is expected to protect CSS against this type of malicious CU. Figure 5 shows the sensing performance of the network when CUs are opposite malicious among CUs. MGC and EGC with all CUs provide very low performance due to the attack of opposite malicious CU. However, the proposed scheme can defend their attacks and achieve high sensing performance.

5. Conclusion

In this paper, multi-GOF tests are proposed to measure the difference between sensing data of normal CU and that of malicious CU. Further, the DS theory is used to combine results of multi-GOF tests. The proposed scheme considers the appearance of the most common types of malicious CU: always Yes, always No, and opposite types. The simulation results prove that the proposed scheme can reject almost harmful effect from those malicious CUs to protect CSS.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.


This work was supported by the KRF funded by the MEST (NRF-2012R1A1A2038831).


  1. Federal Communications Commission, “Spectrum policy task force,” Tech. Rep. 02-135, ET Docket, 2002. View at: Google Scholar
  2. Y. Hur, J. Park, W. Woo et al., “A wideband analog Multi-Resolution Spectrum Sensing (MRSS) technique for cognitive radio (CR) systems,” in Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS '06), pp. 4090–4093, Island of Kos, Greece, May 2006. View at: Google Scholar
  3. A. Sahai, N. Hoven, and R. Tandra, “Some fundamental limits on cognitive radio,” in Proceedings of the Allerton Conference on Communications, Control, and Computing, Monticello, Va, USA, 2004. View at: Google Scholar
  4. G. Ganesan and Y. Li, “Cooperative spectrum sensing in cognitive radio networks,” in Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN '05), pp. 137–143, Baltimore, Md, USA, November 2005. View at: Publisher Site | Google Scholar
  5. S. M. Mishra, A. Sahai, and R. W. Brodersen, “Cooperative sensing among cognitive radios,” in Proceedings of the IEEE International Conference on Communications (ICC '06), vol. 5, pp. 1658–1663, July 2006. View at: Publisher Site | Google Scholar
  6. R. Deng, J. Chen, C. Yuen, P. Cheng, and Y. Sun, “Energy-efficient cooperative spectrum sensing by optimal scheduling in sensor-aided cognitive radio networks,” IEEE Transactions on Vehicular Technology, vol. 61, no. 2, pp. 716–725, 2012. View at: Publisher Site | Google Scholar
  7. J. Ma and Y. Li, “Soft combination and detection for cooperative spectrum sensing in cognitive radio networks,” in Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07), pp. 3139–3143, November 2007. View at: Publisher Site | Google Scholar
  8. P. Kaligineedi, M. Khabbazian, and V. K. Bhargava, “Secure cooperative sensing techniques for cognitive radio systems,” in Proceedings of the IEEE International Conference on Communications (ICC '08), pp. 3406–3410, May 2008. View at: Publisher Site | Google Scholar
  9. P. Kaligineedi, M. Khabbazian, and V. K. Bhargava, “Malicious user detection in a cognitive radio cooperative sensing system,” IEEE Transactions on Wireless Communications, vol. 9, no. 8, pp. 2488–2497, 2010. View at: Publisher Site | Google Scholar
  10. J. Li, J. Liu, and K. Long, “Reliable cooperative spectrum sensing algorithm based on Dempster-Shafer theory,” in Proceedings of the 53rd IEEE Global Communications Conference (GLOBECOM '10), pp. 1–5, December 2010. View at: Publisher Site | Google Scholar
  11. X. Zheng, J. Wang, Q. Wu, and J. Chen, “Cooperative spectrum sensing algorithm based on Dempster-Shafer theory,” in Proceedings of the 11th IEEE Singapore International Conference on Communication Systems (ICCS '08), pp. 218–221, November 2008. View at: Publisher Site | Google Scholar
  12. N. Nguyen-Thanh and I. Koo, “Empirical distribution-based event detection in wireless sensor networks: an approach based on evidence theory,” IEEE Sensors Journal, vol. 12, no. 6, pp. 2222–2228, 2012. View at: Publisher Site | Google Scholar
  13. K. Sentz and S. Ferson, “Combination of evidence in Dempster-Shafer theory,” Sandia Report SAND2002-0835, Sandia National Laboratories, Albuquerque, NM, USA, 2002. View at: Google Scholar

Copyright © 2014 Hiep Vu-Van and Insoo Koo. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.