Abstract

The centralized cooperative spectrum sensing (CSS) allows unlicensed users to share their local sensing observations with the fusion center (FC) for sensing the licensed user spectrum. Although collaboration leads to better sensing, malicious user (MU) participation in CSS results in performance degradation. The proposed technique is based on Kullback Leibler Divergence (KLD) algorithm for mitigating the MUs attack in CSS. The secondary users (SUs) inform FC about the primary user (PU) spectrum availability by sending received energy statistics. Unlike the previous KLD algorithm where the individual SU sensing information is utilized for measuring the KLD, in this work MUs are identified and separated based on the individual SU decision and the average sensing statistics received from all other users. The proposed KLD assigns lower weights to the sensing information of MUs, while the normal SUs information receives higher weights. The proposed method has been tested in the presence of always yes, always no, opposite, and random opposite MUs. Simulations confirm that the proposed KLD scheme has surpassed the existing soft combination schemes in estimating the PU activity.

1. Introduction

The rapid evolution in wireless communication demands new wireless services in both the used and unused parts of the radio spectrum [1]. The Federal Communications Commission (FCC) exclusively assigns spectrum bands to various services [2, 3]. Cognitive radio (CR) is a smart technique that gains knowledge from the environment and adjusts its parameters accordingly [4]. The incumbent primary users (PUs) are free to transmit any time with no restrictions, while the secondary users (SUs) can get the benefit of the spectrum only when the licensee declares it free [5].

In cognitive radio network (CRN), sensing the incumbent user spectrum is vital. An offensive detection on the PU channel due to false alarm reduces the SUs opportunity to utilize the free spectrum. Similarly, any misdetection in the PU transmission will produce interference in the transmission of legitimate and opportunistic users. In case of the frequent usage of the spectrum by the PUs, the termination probability of SUs is not easy to ensure. The proposed scheme in [6] uses channel reservation to improve the quality of service (QoS) for SUs. To confirm the status of the PU a number of detection schemes, such as energy detector (ED), feature detector (FD), and matched filter detector (MFD), are used in [3, 7]. The use of multiple antennas for spectrum sensing is considered in [8], when noise and signal of the PU are considered as independent complex zero-mean Gaussian random variables. Detection results of the orthogonal frequency division multiplexing (OFDM) signals in the frequency selective fading channels are considered in [9, 10]. Optimal interference subcarriers are obtained based on Genetic Algorithm (GA) to suppress intercarrier interference of the unlicensed user to the licensee [11]. In [12], side-lobes reduction using generalized side-lobe canceller combined with GA and differential evolution is proposed. The GA and interior point method design schemes enhance the performance of hybrid computing technique based on active noise control for random, complex random, and sinusoidal input noise variations in the primary secondary paths [13]. An improved energy detector scheme is suggested in [14] to maximize the throughput of a CRN network with minimum interference to the PUs.

Individual SU faces a number of restrictions to sense the PU spectrum accurately. The sensing performance of a solitary device is degraded due to fading, shadowing, energy constraints, and hidden station dilemmas of the primary signal. It is therefore most probable that a single user might fail to spot detection of the licensee transmitter [5]. The cooperative user devices placed more than a few wavelengths apart experience an independent fading effect. The doubt to efficiently detect the licensed spectrum possession is mitigated by enabling different users to share their local sensing results and make a cooperative decision [1519]. The particle swarm optimization is able to find their foods by sharing their search information in contrast with GA using crossover and kids reproduction [20]. Cooperative spectrum sensing (CSS) using energy harvest-based weighed method in [21] reduces the energy wastage of the SUs with better sensing results. The use of cyclostationary signatures in [22] is used to subdue large number of challenges related to cooperative network in the rising applications of the CR. The proposed method in [23] enhances throughput of the CRN in the presence of mobile SUs to access the PU spectrum. The MUs presence in a CSS environment reduces the effectiveness of the cooperation. Therefore, precise recognition and exclusion of the false sensing information are extremely vital [24]. Significant investigations are carried out to make the collaborative schemes resistant to any MU attack. The aim of any MU in CSS is to provide false sensing data to the FC [25].

The assistance of trusted nodes in a reputation based CSS network is discussed in [26], where Nyman-Pearson and likelihood ratio test is utilized for spectrum sensing improvements. The primary emulation category of MUs discussed in [27] tries to impersonate activities of the legitimate PU transmitter. A robust technique with prime focus on always yes group of MUs is implemented in [28]. An extended sequential cooperative scheme that reduces the number of sensing reports is investigated in [29]. In the soft fusion combination schemes proposed in [3032] sensing energies from different SUs are combined to take accurate decision about the PU spectrum holes. Similarly, in the hard fusion schemes SUs provide a hard binary decision to the FC to predict the licensed user activity in the spectrum [3335]. The optimal quantization scheme in [36, 37] is able to produce improved detection with a control on the probability of false alarm. Bioinspired heuristics based on GA find the design parameters of nonlinear Hammerstein controlled autoregressive systems with distinct values of the noise variance [38]. The study in [3945] focuses on evolutionary computation for optimizing the detection and false alarm probabilities to minimize the sensing error for a particular SU.

In this paper, Kullback Leibler Divergence (KLD) has been employed to protect the CSS against the spectrum falsification attack (SFA) of always no (AN), always yes (AY), random opposite (RO), and the always opposite (AO) categories of MUs by assigning weights to the sensing reports of SUs before global combination at the FC. In our previous study [46], SUs perform their local sensing, report soft energies to the FC, and also store this information in its local database. FC determines the KL divergence score against each user and also acknowledges this same information to the user. A normally declared user tries to send mean of the previous energy reports to the FC based on its current observation. The work in [46, 47] uses the KLD to determine the probability distribution function (PDF) dissimilarity of a particular SU under the presence and absence hypothesis of the licensed user channel. The PDF uses the energy statistics of an individual user under both hypotheses for declaring it normal or malicious. In this work, FC takes sensing data from all SUs and determines KLD score based on the energy statistics of individual user with the average statistics received from all other users. The final decision is made at FC by assigning weights to the local energy information of each individual SU based on the measured KLD score of each SU. Lower weights are assigned to the sensing data of MUs based on the KLD results, while the regular user sensing information receives higher weights. The lower weights keep the FC final decision less prone to the attack of MUs. By following the proposed method, the performance of CSS is kept at its maximum in the presence of MUs without identifying any malicious activity.

The proposed method results are tested in the company of AO, RO, AY, and AN categories of MUs in a cooperative environment. The outcome shows that these MUs in CSS increase the false alarm and misdetection, resulting in an increased interference to the primary transmission and reduced throughput of the network. Simulations confirmed that the proposed one-to-many relation based KLD method leads to more accurate and sophisticated detection than the traditional soft combination schemes in [46, 47].

The rest of the paper is organized as follows: In Section 2, the system model is presented. Section 3 explains the proposed scheme, where proposed method is used to overwhelm the MUs effects in the global decision of the FC. Experimental outcomes are presented in Section 4. Section 5 concludes the paper.

2. System Model

In the CSS as in Figure 1, all SUs report their local sensing information of the PU channel to the FC. The FC collects sensing notifications of all individual SUs and generates a global decision to show the actual status of the PU spectrum.

The spectrum sensing decisions and made by each SU in a particular spectrum are as follows:where is the hypothesis about the availability and is the hypothesis for the occupancy of the PU spectrum by the licensed user. is the received signal by the user at the time slot. is the Additive White Gaussian Noise at the user receiver. is the amplitude of the channel gain and denotes the PU transmit signal.

Accordingly, as a consequence of and hypothesis, the observed signal energy at the receiver can be represented asIn (2), each of the sensing intervals is divided into total number of samples. When the number of samples is considered large enough, the soft energy report of these SUs is similar to that of a Gaussian random variable in the and hypothesis as in [29, 30].Here is the signal-to-noise ratio between the primary transmitter and the user. Moreover, and are the energy distributions means and variances when and hypotheses are true.

The KLD between the two normally distributed functions and is calculated as follows [46]:Similarly, the KLD representation for functions and with the means and variances and is as follows:The MUs in Figure 2 are producing dissimilar energy distribution in the and hypothesis as compared with normal SUs. The KLD score against these MUs is dissimilar to the normal SUs and is easily separable from the normal user category.

The probability distribution functions of the energy statistics reported by the normal SU, AY, AN, AO, and RO users are given in Figure 2. The energy distributions provided by all four categories of MUs are different from the normal user distributions. Therefore, any cooperative user having energy distribution dissimilar to the normal user in Figure 2(a) is treated as malicious one. The AO user distribution in Figure 2(b) always negates the distribution of the normal user. The AY user in Figure 2(c) is producing similar high energy distributions under both hypotheses. Similarly, the AN user with always free state information of the licensee channel has its low energy distributions in Figure 2(d). The RO user behaves as AO with probability P and as a normal user with probability (1-P) in Figure 2(e).

3. The Proposed One-to-Many Relations Based KLD

The proposed work considers total cooperative users larger in number compared with MUs. All the cooperative users inform FC about their local spectrum observations of the primary channel. FC collects and takes its global decision based on the received energy statistics of the reporting users. Before making any global decision, FC assigns weights to the local sensing of SU reports with the proposed KLD method. The resultant weights illustrate reliability of the local spectrum sensing information of the individual cooperating users prior to making any final decision at the FC.

A pseudocode showing the proposed KLD algorithm for the local detection determining KLD score using one-to-many relationship based energy statistics and taking global decision based on the received energy and measured weights is given below:(1)For to limit(2)For to SU(3)Local detection by the user(4)New values of mean and variance based on (5)Average means and variance values while taking out the user energy statistics.(6)One-to-many relationship based KLD(7)Weights for the user in the interval(8)End SUs(9)If (10)Global decision, (11)Else(12)Global decision, (13)End(14)End limit

3.1. Data Collection and Adjustments by the FC

FC receives the individual soft energy information in the interval from all the cooperating SUs aswhere is a row vector containing the soft spectrum sensing data of all users during the interval. The soft energy report has mean and variance under hypothesis and under the hypothesis.

FC further determines new values of the mean and variance for all users in the sensing interval based on the received energy observations in (9) asHere is the new value of the mean for the SU in the sensing interval, which is updated according to the received energy and preselected constants.

Similarly, new variance values are determined and collected based on the received energy asIn the new mean and variance measurements in (11) and (13), the constant and the constant , where the constant is the effective level of the mean and variance by the received energy .

3.2. One-to-Many Relationship Based KLD Measurement

After the collection of mean and variance information on behalf of all users in the sensing intervals, FC measures a difference in the mean and variance of the user energy statistics with all other users. The average mean values are measured on behalf of all SUs based on the new mean values of (10) asThe one-to-many difference results of the mean for all SUs are collected asSimilarly, the average variance values are measured on behalf of all SUs based on the new variance values of (12) as follows:Here is the average mean and is the average variance value of the energy samples provided by all other users while ignoring the mean and variance results of the user. These mean and variance values are obtained by excluding the user. The result in (15) and (17) determines the impact of not including each cooperative user during the average mean and variance observation measurement. As all MUs including AY, AN, AO, and RO have dissimilar results of the mean and variance in comparison with normal SUs, therefore the average results attained against these users are different from the normal SUs in (15) and (17).

The KLD value for the SU is determined between the individual sensing results in (10), (12), and the information provided by all other SU information as in (15) and (17) aswhere denotes the KLD result in the presence and absence hypothesis of the SU in the interval. These KLD scores against each SU sensing are modified asThe result in (19) is normalized for assigning weights to each SU decision asIn (20) the users with abnormal behavior acquire lower weights in comparison with normal users.

Table 1 shows the weight measurement for the normal and malicious users against various signals-to-noise ratios. These weights are obtained for the case when one of the four categories of MUs participates in CSS. In Table 1 as the value of signal-to-noise ratio increases the weight assigned to these MUs decreases while the normal user’s weights increase.

Similarly, Table 2 shows the weights for the case when all four categories of MUs participate in CSS. In Table 2, the weight result assigned to each MU is shown along with the average weights received by all the normal cooperative SUs. In this case, the different weights received by these MUs approach zero with increasing signal-to-noise ratio while the normal SUs weights increase with increasing signal-to-noise ratio.

3.3. Global Decision at FC

On the basis of weighted results measured to guarantee the authenticity of each SU sensing information in (20), the global statement is declared by the FC aswhere is the weight assigned to the user energy in the data fusion at the FC and the threshold value for the detection of the PU. The lesser weight results are charged by the FC against the sensing information of a user with malicious behavior, while the normal user sensing report is assigned with a higher weight value. All MUs including AY, AN, AO, and RO are easily identified by the proposed scheme with their KLD behavior. The normal SUs have a higher KLD result because they have less inconsistency with the average of all other users sensing information. The MUs receive minimum weight because the information provided by MUs deviates more from the average sensing information provided by all other SUs. It is therefore noticeable that these MUs get lower weights as compared with normal SUs.

3.4. Updating Statistics Based on the Global Decision

Due to the nonavailability of the exact information about the PU, optimal values of the means and variances for measuring KLD are not possible. It is therefore good to consider the global decision results as an estimate of the primary signal, in order to calculate and update these values. The updated mean and variance will be used by the FC in the KLD calculation in the next sensing interval.After the establishment of universal decision at the FC, resultant decision will update mean and variance values under the hypothesis as follows: Similarly, the decision will update mean and variance under the hypothesis for all cooperative users asIn (25) and , where indicate the window size of the sensing history for the estimated mean and variance.

The proposed scheme flowchart diagram in Figure 3 illustrates the stepwise procedure of the local detection, KL divergence measurement based on the weight assignments at the FC, and global decision establishment by the FC.

4. Numerical Results and Discussion

In order to get simulation results for the CRN, parameters settings are made with 10, 16, 20, and 30 total cooperative users. Out of the total cooperative SUs, four users are intentionally selected as AY, AO, RO, and AO nature of MUs. The average signal-to-noise ratios for the simulation are selected as -20 dB to -5 dB for all SUs. The sensing time for each SU is selected as 1 ms containing 270 samples in each sensing interval. Total sensing intervals for the cooperative users are selected as 200. The RO users perform malicious acts probabilistically in the intervals 1 to N. The window size (z) for updating mean and variance is selected as 270. In the study, all 4 categories of MUs, i.e., AY, AN, AO, and RO, are spread evenly.

The proposed KLD performance is compared with traditional KL and equal gain combination (EGC) schemes in 6 different cases as follows.

Case 1. In this case ROC results are drawn between the proposed method and traditional KL and EGC scheme under various signal-to-noise ratio values of -20 dB to -5 dB as displayed in Figure 4. MUs are selected as AY only in the first part of the comparison in Figure 4. Results are obtained for all combinations by taking the total AY users number as 1, 2, 3, and 4 subsequently. The results show that the proposed KLD scheme is more secure against the increasing number of AY users 1 to 4 and has better detection probability results in comparison with all other schemes. In Figure 4 when there is only 1 AY user active in CSS the ROC results of all fusion schemes are less affected, but when the total number of AY users is increased to 3 and 4 the proposed KL results dominate the traditional KL and EGC schemes by producing a high detection with fewer false alarms. The EGC scheme is more affected by the increasing number of AY users because EGC is giving equal weight to the detection performance of normal and AY users. The proposed KL is able to assign less weight to the AY users in comparison with normal SUs as it is clear from the average weight value measured against each AY users in Table 1. The less weight assigned to the AY users reduces the false data effect of the AY users participation in CSS. The harmful effect of the AY users contribution in CSS is further reduced with increasing average SNR by lowering the weight assignment to them in the global decision.

Case 2. In this part of the simulation, all parameters are kept similar to Case 1 with changing only the nature of MUs from AY to AN user. Comparison is made between proposed KL, traditional KL, and EGC scheme by testing the system against increasing AY users number from 1 to 4 as in Figure 5.
Since the proposed KL is treating AY and AN users similarly in determining the KLD, therefore using proposed KLD the weight that AN user receives is almost equal to the AY user weights in Case 1. The ROC performance of the proposed and all other schemes against the AN scenario is very similar to Case 1, due to the similar behavior of the AN user to that of the AY user. As in Case 1, when the numbers of AN users are increased from 1 to 4, the proposed KL is less affected by this increment in Figure 5. All AN users receive lower weight due to their KLD score results while the normal SUs receive higher weights in comparison with AN users which results in better performance of the proposed KL scheme. The traditional KL and EGC schemes performance in detecting the licensed PU channel reduces more quickly in comparison with the proposed KL method as the total AY increases from 1 to 4. The gap in the ROC curves of the traditional fusion schemes becomes wider for a total of 4 AN users from the one when only 1 AN user takes part as shown in Figure 5.

Case 3. In the third scenario detection and false alarm results are obtained for the increasing number of AO users from 1 to 4 in Figure 6 with the same parameters in Cases 1 and 2. Since the AO users have their mean and variance results opposite to the average mean and variance values provided by all other users, therefore, the proposed KL method is able to generate lower reliability report in terms of weight for the AO user in comparison with normal cooperative users. The results show that as the number of AO users increases to 4 few drops are observed in the ROC curve of the proposed scheme as compared with the traditional KL and EGC scheme. In comparison with Cases 1 and 2, the traditional soft combination schemes like KL and EGC performance degrade even more. The existence of AO users results in less correct detection and high false alarm rate of the PU spectrum for the EGC and KL scheme. Proposed method results in Figure 6 are followed by the KL while EGC has shown its worst performance among all fusions.

Case 4. The ROC results for the scenario in which only RO user participates in CSS are depicted in Figure 7. The RO user hides its malicious identity by acting probabilistically as AO at randomly selected sensing intervals in the N total intervals and is difficult to catch with the provided statistics.
The traditional KL and EGC schemes are not able to handle the RO user information intelligently and their ROC results degrade severely with the increased number of RO participations in Figure 7.
The proposed KL scheme is able to identify the RO users when they perform malicious acts probabilistically and generate better detection and false alarm results in Figure 7 compared with the traditional KL and EGC schemes. Results show that the proposed KLD is less affected by the increasing number of RO users, unlike the traditional EGC and KLD schemes. All the RO nature users in the proposed CSS receive lesser weights in comparison with weights obtained by the normal SUs because their malicious behavior is easily caught by the proposed KL scheme.

Case 5. In this part of the simulation as in Figure 8 MUs are equally selected in numbers as AY, AN, AO, and RO categories. The simulation is performed against an average signal-to-noise ratio of -12.5 dB.
The detection and false alarm probability results are obtained for the proposed, traditional KL, and EGC schemes for a total of 10, 20, and 30 cooperative SUs in Figure 8 under average signal-to-noise ratio of -12.5 dB and total 4 MUs. Figure 8 shows that the one-to-many relation based KLD scheme has better ROC performance than all other schemes with different levels of the cooperative users. It is noticeable that the detection performance is enhanced for all combination schemes with the increasing number of total cooperative and fixed MUs. The proposed method ROC results are more precise and superior to the traditional schemes, i.e., KLD and EGC schemes, at all levels of the total sensing users.

Case 6. In this case, the AY, AO, AN, and RO users number is kept the same. The total number of participating SUs in CSS is kept fixed as 16 and different ROC results are plotted for the one-to-many relations based KLD and other soft combination schemes at different levels of the averages signal-to-noise ratios.
The simulation results in Figure 9 show that under fixed malicious and total cooperative users the ROC performance rises with increasing signal-to-noise ratio values for all combination schemes. Similarly, in Figure 9 as the signal-to-noise ratio value increases from -15.5 dB to -9.5 dB, all schemes are able to generate a high detection rate with minimum false alarm. The proposed scheme ROC results are more accurate and precise than the traditional combination schemes at both SNR levels. The proposed method ROC improvement with increasing signal-to-noise ratio is due to more clear distinction in the energy distribution of the absence and presence hypothesis information provided by the normal and MUs. As the SNR increases in Figure 9, the proposed method detection results rise more quickly against other methods. These results also show that the CSS performance improves more with the increasing signal-to-noise ratio information in Case 6 as compared with the increasing total number of users in Case 5.

All the above experimental results clarify the fact that by following the proposed one-to-many relations based KLD method an improvement is obvious in the sensing performance at the FC. This improvement in performance is achieved by raising the detection probability and lowering the false alarm results leading to a reduction in the error probability of the system. The proposed fusion combination scheme shows optimum and accurate results in the presence of MUs. The use of the proposed method for calculating weights following soft combination scheme makes the proposed CSS results more valid in the presence of malicious user. The simulation results show that the risk of AY, AN, RO, and AO users with CSS significantly reduces by adopting the proposed scheme. It is clear from the graphical result that the process of cooperation turns out to be more precise by using the suggested methodology. The one-to-many relation based KLD is able to generate better sensing results, by assigning lower weights to the MUs information, and is able to eliminate the effect of MUs in the resultant CSS.

5. Conclusion

In this paper, the efficiency degradation due to the presence of abnormal users in CSS is minimized using one-to-many relationship based KLD method for the PU detection. Functionality of the proposed scheme is verified in the presence of AY, AN, AO, and RO type MUs. FC first receives the individual sensing information of all SUs and then applies the proposed method for measuring weights against each SU. MUs with abnormal behavior as compared with normal SUs are given lower weights by the proposed scheme, while the normal SUs receive higher weights. FC further employs these weights in combining the sensing information of all SUs in predicting a global decision. The results show that the user with abnormal behavior has less impact on the global decision as compared to a normal SU decision. Simulation result reflects the superiority and authenticity of the proposed scheme in producing more precise and reliable decisions as compared with EGC and traditional KL fusion schemes.

Data Availability

The data used to support the findings of this study are included within the article.

Disclosure

The authors received no specific funding for this work.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.