Adaptive Trust Threshold Model Based on Reinforcement Learning in Cooperative Spectrum Sensing
Abstract
:1. Introduction
- We consider the presence of both ordinary SSDF attacks and more complex intelligent SSDF attacks since IMUs have different attack thresholds and more diverse attack strategies when conducting intelligent SSDF attacks.
- We analyze and summarize the sensing results uploaded by all the secondary users participating in the collaboration and use the trust values established by the beta distribution for each SU to analyze their honesty attributes. We compare the attack intensity of MUs at different periods.
- We introduce reinforcement learning to establish an adaptive trust threshold defense algorithm (ATTR). By analyzing the sensing results of different SUs, we set corresponding trust thresholds for each participating SU to detect malicious users, filter out a set of trusted SUs, and thereby improve the detection probability of the system.
2. Preliminaries
2.1. System Model
- In the “OR” rule, the main idea is that once an SU determines that the channel is occupied, the FC assumes that the PU is using the authorized channel for communication and does not engage in spectrum access. This can protect the normal communication of the PU but reduce the chance of discovering an idle spectrum.
- In the “AND” rule, the FC only considers the PU to be communicating when all the SUs determine that the channel is occupied. This can increase the probability of discovering spectrum voids, but once judged incorrectly it can easily cause interference for the PU.
- In the “Majority” rule, when K () or more of the N SUs participating in the collaboration determine that the channel is occupied, the FC will determine that the PU is communicating.
2.2. SSDF Attack Model
- “Always yes” attack: regardless of whether the PU exists or not, the MU always uploads to determine the existence of the PU.
- “Always no” attack: regardless of whether the PU exists or not, the MU always uploads and determines that the PU does not exist.
- “Always false” attack: the MU always uploads information that is different from the real sensing result.
- “Fixed probability” attack: the MU uploads false error-sensing information with a fixed probability.
- “Incubation period”: At this time, the trust value of the meets . During this period, the will upload correct sensing results and masquerade as an HSU, thus improving its own trust value so as to hide in the network. The trust value shows an upward trend.
- “Attack period”: At this time, the trust value of the meets . During this period, the will launch attacks and upload the wrong sensing results. Because the trust value of the is high at this time, the traditional trust mechanism will consider it an HSU, which affects the detection performance of the system. Due to its upload error-sensing results, its trust value will show a downward trend, and when , it will enter the “incubation period” again.
2.3. Reinforcement Learning in CRN
3. Adaptive Trust Threshold Algorithm Based on Reinforcement Learning
3.1. Trust Value Establishment
3.2. Adaptive Trust Threshold Calculation
Algorithm 1: ATTR Algorithm |
Initialization parameters: Sensing times: K; Iteration times of Q-learning: T; Learning rate:; Discount rate:. Input: Total SUs: N. Output: The trust threshold of the : ; The global detection probability of the algorithm: ; The trusted SUs set: . 1: for k = 1 to K do 2: for i = 1 to N do 3: perform local spectrum sensing and report the result to the FC, MUs upload according to their own attack strategy; 4: FC calculates the trust value of the ,; 5: Initialize Q-learning table entry: ; 6: for t = 1 to T do 7: Choose action using a policy derived from ; (e.g., ε-greedy rules) 8: Update , ; 9: Use the trust threshold at this time to obtain reward ; 10: Update ; 11: end for 12: Obtain the trust threshold ; 13: if do 14: ; 15: end if 16: end for 17: Calculate the new global result via K-out-of-N principle using ; 18: end for 19: Calculate the global detection probability . |
4. Simulation Result
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Marcus, M.; Burtle, J.; Franca, B.; Lahjouji, A.; McNeil, N. FCC Spectrum Policy Task Force, Report of the Spectrum Efficiency Working Group; Technical Report; Federal Communications Commission: Washington, DC, USA, 2002. [Google Scholar]
- Mitola, J.I. Cognitive Radio an Integrated Agent Architecture for Software Defined Radio. Ph.D. Thesis, Royal Institute of Technology (KTH), Kista, Sweden, 2000. [Google Scholar]
- Zheng, K.; Jia, X.; Chi, K.; Liu, X. DDPG-based joint time and energy management in ambient backscatter-assisted hybrid underlay CRNs. IEEE Trans. Commun. 2022, 71, 441–456. [Google Scholar] [CrossRef]
- Aref, M.A.; Jayaweera, S.K. Spectrum-agile cognitive radios using multi-task transfer deep reinforcement learning. IEEE Trans. Wireless Commun. 2021, 20, 6729–6742. [Google Scholar] [CrossRef]
- Liu, X.; Xu, B.; Wang, X.; Zheng, K.; Chi, K.; Tian, X. Impacts of sensing energy and data availability on throughput of energy harvesting cognitive radio networks. IEEE Trans. Veh. Technol. 2023, 72, 747–759. [Google Scholar] [CrossRef]
- Fragkiadakis, A.G.; Tragos, E.Z.; Askoxylakis, I.G. A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun. Surv. Tutor. 2012, 15, 428–445. [Google Scholar] [CrossRef]
- Attar, A.; Tang, H.; Vasilakos, A.V.; Yu, F.R.; Leung, V.C. A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proc. IEEE 2012, 100, 3172–3186. [Google Scholar] [CrossRef]
- Rawat, A.S.; Anand, P.; Chen, H.; Varshney, P.K. Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Trans. Signal Process. 2010, 59, 774–786. [Google Scholar] [CrossRef]
- Qin, T.; Yu, H.; Leung, C.; Miao, C. Towards a trust aware cognitive radio architecture. SIGMOBILE Mob. Comput. Commun. Rev. 2009, 13, 86–95. [Google Scholar] [CrossRef]
- Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.P.; Al-Dhahir, N. Secrecy-energy efficient hybrid beamforming for satellite-terrestrial integrated networks. IEEE Trans. Commun. 2021, 69, 6345–6360. [Google Scholar] [CrossRef]
- An, K.; Liang, T.; Zheng, G.; Yan, X.; Li, Y.; Chatzinotas, S. Performance limits of cognitive-uplink FSS and terrestrial FS for Ka-band. IEEE Trans. Aerosp. Electron. Syst. 2018, 55, 2604–2611. [Google Scholar] [CrossRef]
- Zhou, M.; Shen, J.; Chen, H.; Xie, L. A cooperative spectrum sensing scheme based on the Bayesian reputation model in cognitive radio networks. In Proceedings of the 2013 IEEE wireless communications and networking conference (WCNC 2013), Shanghai, China, 7–10 April 2013; pp. 614–619. [Google Scholar]
- Lu, J.; Wei, P.; Chen, Z. A scheme to counter SSDF attacks based on hard decision in cognitive radio networks. Ratio (SNR) 2014, 2, 2. [Google Scholar]
- Hyder, C.S.; Grebur, B.; Xiao, L. ARC: Adaptive reputation based clustering against spectrum sensing data falsification attacks. IEEE Trans. Mob. Comput. 2014, 13, 1707–1719. [Google Scholar] [CrossRef]
- Ma, L.; Xiang, Y.; Pei, Q.; Xiang, Y.; Zhu, H. Robust reputation-based cooperative spectrum sensing via imperfect common control channel. IEEE Trans. Veh. Technol. 2017, 67, 3950–3963. [Google Scholar] [CrossRef]
- Xu, Z.; Sun, Z.; Guo, L. Throughput Maximization of Collaborative Spectrum Sensing Under SSDF Attacks. IEEE Trans. Vehr. Technol. 2021, 70, 8378–8383. [Google Scholar] [CrossRef]
- Yucek, T.; Arslan, H. A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surv. Tutor. 2009, 11, 116–130. [Google Scholar] [CrossRef]
- Althunibat, S.; Denise, B.J.; Granelli, F. Identification and punishment policies for spectrum sensing data falsification attackers using delivery-based assessment. IEEE Trans. Veh. Technol. 2015, 65, 7308–7321. [Google Scholar] [CrossRef]
- Zhao, H.; Zhang, W.; Wu, X.; Li, H.; He, L. Outlier Detection and Trust based Distributed Cooperative Spectrum Sensing in Internet of Vehicles. In Proceedings of the 2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT 2022), Xiamen, China, 5–7 August 2022; pp. 117–122. [Google Scholar]
- Ling, M.H.; Yau, K.L.A. Reinforcement learning-based trust and reputation model for cluster head selection in cognitive radio networks. In Proceedings of the 9th International Conference for Internet Technology and Secured Transactions (ICITST 2014), London, UK, 8–10 December 2014; pp. 256–261. [Google Scholar]
- Ling, M.H.; Yau, K.L.A.; Qadir, J.; Poh, G.S.; Ni, Q. Application of reinforcement learning for security enhancement in cognitive radio networks. Appl. Soft Comput. 2015, 37, 809–829. [Google Scholar] [CrossRef]
- Feng, J.; Lu, G.; Zhang, Y.; Wang, H. Avoiding monopolization: Mutual-aid collusive attack detection in cooperative spectrum sensing. Sci. China Inf. Sci. 2017, 60, 1–3. [Google Scholar] [CrossRef]
- Zhao, F.; Li, S.; Feng, J. Securing cooperative spectrum sensing against DC-SSDF attack using trust fluctuation clustering analysis in cognitive radio networks. Wirel. Commun. Mob. Comput. 2019, 2019, 11. [Google Scholar] [CrossRef]
- Fu, Y.; He, Z. Bayesian-inference-based sliding window trust model against probabilistic SSDF attack in cognitive radio networks. IEEE Syst. J. 2019, 14, 1764–1775. [Google Scholar] [CrossRef]
- Wang, J.; Chen, R.; Tsai, J.J.; Wang, D.C. Trust-based cooperative spectrum sensing against SSDF attacks in distributed cognitive radio networks. In Proceedings of the 2016 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR 2016), Stevenson, WA, USA, 10–12 May 2016; pp. 1–6. [Google Scholar]
- Feng, J.; Zhang, Y.; Lu, G.; Zheng, W. Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks. Secur. Comm Netw. 2015, 8, 3157–3166. [Google Scholar] [CrossRef]
- Zhu, J.; Song, Y.; Jiang, D.; Song, H. A new deep-Q-learning-based transmission scheduling mechanism for the cognitive Internet of Things. IEEE Internet Things J. 2017, 5, 2375–2385. [Google Scholar] [CrossRef]
- Li, B.; Yang, P.; Wang, J.; Wu, Q.; Tang, S.; Li, X.Y.; Liu, Y. Almost optimal dynamically-ordered channel sensing and accessing for cognitive networks. IEEE Trans. Mob. Comput. 2013, 13, 2215–2228. [Google Scholar] [CrossRef]
Parameter | Description | Value |
---|---|---|
K | Sensing time | 1000 |
T | Iteration time of Q-learning | 100 |
Learning rate | 0.8 | |
Discount rate | 0.8 | |
Fixed trust threshold | 0.5 |
Attack Type | TFCA | SWTM | Proposed ATTR |
---|---|---|---|
Ordinary SSDF | Medium | High | High |
Intelligent SSDF (with same threshold) | High | Medium | High |
Intelligent SSDF (with different threshold) | Low | Medium | High |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Xie, G.; Zhou, X.; Gao, J. Adaptive Trust Threshold Model Based on Reinforcement Learning in Cooperative Spectrum Sensing. Sensors 2023, 23, 4751. https://doi.org/10.3390/s23104751
Xie G, Zhou X, Gao J. Adaptive Trust Threshold Model Based on Reinforcement Learning in Cooperative Spectrum Sensing. Sensors. 2023; 23(10):4751. https://doi.org/10.3390/s23104751
Chicago/Turabian StyleXie, Gang, Xincheng Zhou, and Jinchun Gao. 2023. "Adaptive Trust Threshold Model Based on Reinforcement Learning in Cooperative Spectrum Sensing" Sensors 23, no. 10: 4751. https://doi.org/10.3390/s23104751
APA StyleXie, G., Zhou, X., & Gao, J. (2023). Adaptive Trust Threshold Model Based on Reinforcement Learning in Cooperative Spectrum Sensing. Sensors, 23(10), 4751. https://doi.org/10.3390/s23104751