Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). Over the past couple of years, the research on the Byzantine attack and...
Saved in:
Published in | IEEE Communications surveys and tutorials Vol. 17; no. 3; pp. 1342 - 1363 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
IEEE
01.01.2015
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). Over the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Then, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we analyze the spear-and-shield relation between Byzantine attack and defense from an interactive game-theoretical perspective. Moreover, we highlight the unsolved research challenges and depict the future research directions. |
---|---|
AbstractList | The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). Over the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Then, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we analyze the spear-and-shield relation between Byzantine attack and defense from an interactive game-theoretical perspective. Moreover, we highlight the unsolved research challenges and depict the future research directions. |
Author | Linyuan Zhang Guoru Ding Yulong Zou Jinlong Wang Qihui Wu Zhu Han |
Author_xml | – sequence: 1 surname: Linyuan Zhang fullname: Linyuan Zhang email: zhanglinyuan5@163.com organization: Coll. of Commun. Eng., PLA Univ. of Sci. & Technol., Nanjing, China – sequence: 2 surname: Guoru Ding fullname: Guoru Ding email: dingguoru@gmail.com organization: Coll. of Commun. Eng., PLA Univ. of Sci. & Technol., Nanjing, China – sequence: 3 surname: Qihui Wu fullname: Qihui Wu email: wqhtxdk@aliyun.com organization: Coll. of Commun. Eng., PLA Univ. of Sci. & Technol., Nanjing, China – sequence: 4 surname: Yulong Zou fullname: Yulong Zou email: Yulong.Zou@njupt.edu.cn organization: Sch. of Telecommun. & Inf. Eng., Nanjing Univ. of Posts & Telecommun., Nanjing, China – sequence: 5 surname: Zhu Han fullname: Zhu Han email: zhan2@uh.edu organization: Dept. of Electr. & Comput. Eng., Univ. of Houston, Houston, TX, USA – sequence: 6 surname: Jinlong Wang fullname: Jinlong Wang email: wjl543@sina.com organization: Coll. of Commun. Eng., PLA Univ. of Sci. & Technol., Nanjing, China |
BookMark | eNotzEtOwzAQAFALgURbuABsfIEEe2wnDrs0fKVCJVokdpXTGSNTcFBiisLpWcDq7d6UHcYuEmNnUuRSiuqiWT6s1jkIaXLQAKUyB2wCqlRZqc3LMZsOw5sQGnQlJmw-H39cTCESr1Ny2x13EfkVeYoD8RB5073GkMKe-JPD0PFHSt9dvxsuec1XX_2exhN25N37QKf_ztjzzfW6ucsWy9v7pl5kWwU2ZZoUaY_WVygBNZgWrHa6rQoNAlshJVlZKMIClUFsK-edFegtGGwBQc3Y-d8biGjz2YcP14-bUlhtSq1-AX3gSWY |
CitedBy_id | crossref_primary_10_1109_COMST_2024_3361451 crossref_primary_10_3390_s21124060 crossref_primary_10_1109_TCOMM_2018_2799616 crossref_primary_10_1109_ACCESS_2023_3304244 crossref_primary_10_1109_TCCN_2020_3016053 crossref_primary_10_1109_JIOT_2022_3194694 crossref_primary_10_1109_TVT_2017_2693384 crossref_primary_10_1631_FITEE_1800519 crossref_primary_10_1109_COMST_2017_2718618 crossref_primary_10_1371_journal_pone_0199546 crossref_primary_10_1007_s11036_015_0665_5 crossref_primary_10_1109_TSIPN_2017_2697724 crossref_primary_10_1016_j_aeue_2019_03_004 crossref_primary_10_1016_j_jisa_2017_11_010 crossref_primary_10_1109_ACCESS_2019_2921604 crossref_primary_10_4218_etrij_2018_0360 crossref_primary_10_1109_MCOM_2018_1700743 crossref_primary_10_1016_j_eng_2021_04_019 crossref_primary_10_1109_ACCESS_2018_2842245 crossref_primary_10_1109_JSEN_2024_3519176 crossref_primary_10_1007_s11276_020_02398_w crossref_primary_10_1109_TMC_2018_2869390 crossref_primary_10_1109_JSYST_2019_2927686 crossref_primary_10_1109_ACCESS_2016_2593952 crossref_primary_10_1109_COMST_2018_2794358 crossref_primary_10_1016_j_aeue_2018_10_027 crossref_primary_10_1109_TSP_2017_2759082 crossref_primary_10_1016_j_phycom_2023_102112 crossref_primary_10_1109_MCOM_2017_1600682CM crossref_primary_10_1007_s11235_022_00896_0 crossref_primary_10_1007_s00542_018_3744_2 crossref_primary_10_1109_JSEN_2024_3445584 crossref_primary_10_1007_s40998_018_0133_x crossref_primary_10_1109_COMST_2017_2677082 crossref_primary_10_1109_COMST_2017_2661861 crossref_primary_10_1049_iet_com_2019_0696 crossref_primary_10_1016_j_comcom_2019_06_007 crossref_primary_10_1109_COMST_2017_2751058 crossref_primary_10_1109_TVT_2018_2889338 crossref_primary_10_1109_JIOT_2019_2895136 crossref_primary_10_1109_TVT_2018_2889336 crossref_primary_10_1109_TWC_2017_2725836 crossref_primary_10_1109_ACCESS_2018_2876223 crossref_primary_10_1109_ACCESS_2024_3370911 crossref_primary_10_1109_TSIPN_2018_2806842 crossref_primary_10_1109_TVT_2017_2722409 crossref_primary_10_1007_s11276_021_02640_z crossref_primary_10_1155_2018_6319378 crossref_primary_10_1109_OJCOMS_2022_3146364 crossref_primary_10_1109_TCOMM_2015_2483497 crossref_primary_10_1016_j_aeue_2018_07_029 crossref_primary_10_1109_ACCESS_2021_3058628 crossref_primary_10_1109_LCOMM_2020_2990869 crossref_primary_10_3390_electronics10141687 crossref_primary_10_1109_TIFS_2017_2774770 crossref_primary_10_1109_LCOMM_2015_2464214 crossref_primary_10_1007_s11277_020_07077_9 crossref_primary_10_3390_electronics9061038 crossref_primary_10_1109_JSEN_2016_2583060 crossref_primary_10_1016_j_future_2020_12_003 crossref_primary_10_1016_j_jnca_2019_06_005 crossref_primary_10_3390_sym8120147 crossref_primary_10_1049_el_2019_2302 crossref_primary_10_1109_ACCESS_2018_2850879 crossref_primary_10_1109_JSYST_2019_2952395 crossref_primary_10_1002_dac_4261 crossref_primary_10_1109_TCYB_2016_2538293 crossref_primary_10_1109_TSIPN_2022_3141215 crossref_primary_10_1016_j_hcc_2024_100220 crossref_primary_10_1109_JIOT_2024_3470009 crossref_primary_10_1109_TCCN_2018_2845382 crossref_primary_10_1002_dac_3512 crossref_primary_10_1016_j_comnet_2022_109206 crossref_primary_10_1007_s40747_024_01664_0 crossref_primary_10_1109_LSENS_2023_3342021 crossref_primary_10_3390_electronics11203372 crossref_primary_10_1016_j_dsp_2017_12_003 crossref_primary_10_1109_TR_2020_3002105 crossref_primary_10_1109_ACCESS_2021_3131339 crossref_primary_10_1109_LCOMM_2018_2806479 crossref_primary_10_1109_TCOMM_2022_3141777 crossref_primary_10_1109_OJCOMS_2020_3009241 crossref_primary_10_1109_TII_2017_2754579 crossref_primary_10_1109_ACCESS_2018_2866485 crossref_primary_10_3390_fi12040063 crossref_primary_10_26782_jmcms_2020_08_00033 crossref_primary_10_1109_TSIPN_2017_2682799 crossref_primary_10_1109_TCSS_2022_3204361 crossref_primary_10_1016_j_jnca_2016_07_008 crossref_primary_10_1186_s13638_018_1269_0 crossref_primary_10_1016_j_phycom_2020_101001 crossref_primary_10_1109_COMST_2022_3159185 crossref_primary_10_1007_s11276_018_1664_9 crossref_primary_10_1007_s13369_024_09617_y crossref_primary_10_1109_ACCESS_2018_2885732 crossref_primary_10_1109_TCCN_2023_3342409 crossref_primary_10_1109_COMST_2016_2553178 crossref_primary_10_1016_j_oceaneng_2021_109794 crossref_primary_10_1109_TSIPN_2017_2723723 crossref_primary_10_1002_dac_4289 crossref_primary_10_3390_s18020404 crossref_primary_10_1016_j_pmcj_2016_12_010 crossref_primary_10_1109_COMST_2017_2725960 crossref_primary_10_1109_ACCESS_2024_3351278 crossref_primary_10_1016_j_sigpro_2017_01_033 crossref_primary_10_1016_j_aeue_2019_05_027 crossref_primary_10_1109_ACCESS_2017_2756992 crossref_primary_10_3390_s18020473 crossref_primary_10_1016_j_pmcj_2021_101461 crossref_primary_10_1109_TMC_2019_2897099 crossref_primary_10_1109_MPOT_2017_2751656 crossref_primary_10_14778_3407790_3407847 crossref_primary_10_1016_j_phycom_2022_101891 crossref_primary_10_1109_TIFS_2020_2972129 crossref_primary_10_1109_TCSS_2023_3263241 crossref_primary_10_1016_j_isatra_2021_01_036 crossref_primary_10_1109_ACCESS_2024_3468473 crossref_primary_10_1109_TMC_2021_3081715 crossref_primary_10_1109_TSIPN_2021_3067305 crossref_primary_10_1007_s00034_018_0774_z crossref_primary_10_3390_app11167228 crossref_primary_10_1002_spy2_415 crossref_primary_10_1109_TAC_2019_2957338 crossref_primary_10_3390_electronics10111346 crossref_primary_10_3390_jsan6040029 crossref_primary_10_1016_j_icte_2019_04_003 crossref_primary_10_1016_j_adhoc_2017_11_003 crossref_primary_10_1109_LWC_2020_2972272 crossref_primary_10_2478_quageo_2021_0002 crossref_primary_10_1109_COMST_2018_2863030 crossref_primary_10_1109_JPROC_2018_2828858 crossref_primary_10_1109_TMC_2020_3030061 crossref_primary_10_1109_JIOT_2021_3064583 crossref_primary_10_3390_electronics13173386 crossref_primary_10_1016_j_eswa_2019_01_023 |
ContentType | Journal Article |
DBID | 97E RIA RIE |
DOI | 10.1109/COMST.2015.2422735 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Statistics |
EISSN | 2373-745X |
EndPage | 1363 |
ExternalDocumentID | 7084574 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of US grantid: CCF-1456921; CMMI-1434789; CNS-1443917; ECCS-1405121 – fundername: National Natural Science Foundation of China grantid: 61172062; 61301160; 61428101 funderid: 10.13039/501100001809 |
GroupedDBID | 0R~ 29I 2WC 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 EBS EJD HZ~ IES IFIPE IFJZH IPLJI JAVBF LAI O9- OCL P2P RIA RIE RNS |
ID | FETCH-LOGICAL-c328t-4e3e4fd8f9d12d425b284a4b96420db011e8163ed6d35ddb9afa80df825db2d23 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:45:45 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Byzantine defense Cognitive radio networks data falsification Byzantine attack cooperative spectrum sensing |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c328t-4e3e4fd8f9d12d425b284a4b96420db011e8163ed6d35ddb9afa80df825db2d23 |
PageCount | 22 |
ParticipantIDs | ieee_primary_7084574 |
PublicationCentury | 2000 |
PublicationDate | 2015-01-01 |
PublicationDateYYYYMMDD | 2015-01-01 |
PublicationDate_xml | – month: 01 year: 2015 text: 2015-01-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | IEEE Communications surveys and tutorials |
PublicationTitleAbbrev | COMST |
PublicationYear | 2015 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0042490 |
Score | 2.541772 |
Snippet | The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1342 |
SubjectTerms | Byzantine attack Byzantine defense Cascading style sheets Cognitive radio networks cooperative spectrum sensing data falsification Security Sensors Sociology Statistics Testing Tutorials |
Title | Byzantine Attack and Defense in Cognitive Radio Networks: A Survey |
URI | https://ieeexplore.ieee.org/document/7084574 |
Volume | 17 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Na8JAEF3Ukz30Q1v6zR56bGLcfG16U1uRghaqgjfZzcyCCLHYWNBf30liSlt66C3kkmWH3ffe5M0MY3ciJJxDt225wsSWp4LA0iYGC2JHCxWKwOgs3zEcBYOp9zzzZxV2_1ULg4i5-Qzt7DH_lw-reJOlylqhIz0_9KqsSsKtqNUqb12PZIRTFsU4Uav3MhxPMueWbxMIEUb7P8an5OjRP2LD8ruFaWRpb1Jtx7tfLRn_u7BjdrinkbxTxP2EVTBpsINvzQUbrJ7xyKINc5N1u9udyoZCIO-kqYqXXCXAH9GQikW-SHivtBHxVwWLFR8V9vD3B97h4836A7enbNp_mvQG1n58ghW7QqYWhQA9A9JE0BZAZ1MTFClPRyQ5HNB0sFESG0MIwPUBdKSMkg4Y0oygBQj3jNWSVYLnjBMpUL6kuwACYlwqjNDzjZSu9mUYizZesGa2KfO3okPGfL8fl3-_vmL1LDBFIuOa1dL1Bm8I2lN9m8f0Ez9AozM |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLZ4HIADb8SbHDjS0aVNm3LbBmjANiQYErcpqR1pmtSh0SHBr8ddNwSIA7col0S24s92PtsApzJmnKOg6gXSpV5oosizLkUPU99KE8vI2SLf0e5Ezafw9lk9z8HZVy0MEU3IZ1QplpO_fBym4yJVdh77OlRxOA-LjPuqWlZrzexuyIGEPyuL8ZPzxn37sVtwt1SFYYhRWv0YoDLBj-s1aM9OLmkjg8o4t5X041dTxv9ebR1Wp46kqJWa34A5yjZh5Vt7wU1YLjzJshHzFtTr7x-mGAtBopbnJh0Ik6G4JMdxLIl-JhozIpF4MNgfik5JEH-9EDXxOB690fs2PF1fdRtNbzpAwUsDqXOPlUChQ-0SrErk12kZjExoEw46fLT8tEmzP0YYYaAQbWKc0T46jhrRSpTBDixkw4x2QbBbYJRma4ARy97ECYXKaR1YpeNUVmkPtgqh9F7KHhm9qTz2_94-gaVmt93qtW46dwewXCipTGscwkI-GtMRA31ujyf6_QT1_qZ8 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Byzantine+Attack+and+Defense+in+Cognitive+Radio+Networks%3A+A+Survey&rft.jtitle=IEEE+Communications+surveys+and+tutorials&rft.au=Linyuan+Zhang&rft.au=Guoru+Ding&rft.au=Qihui+Wu&rft.au=Yulong+Zou&rft.date=2015-01-01&rft.pub=IEEE&rft.eissn=2373-745X&rft.volume=17&rft.issue=3&rft.spage=1342&rft.epage=1363&rft_id=info:doi/10.1109%2FCOMST.2015.2422735&rft.externalDocID=7084574 |