Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). Over the past couple of years, the research on the Byzantine attack and...

Full description

Saved in:
Bibliographic Details
Published inIEEE Communications surveys and tutorials Vol. 17; no. 3; pp. 1342 - 1363
Main Authors Linyuan Zhang, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, Jinlong Wang
Format Journal Article
LanguageEnglish
Published IEEE 01.01.2015
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). Over the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Then, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we analyze the spear-and-shield relation between Byzantine attack and defense from an interactive game-theoretical perspective. Moreover, we highlight the unsolved research challenges and depict the future research directions.
AbstractList The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). Over the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Then, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we analyze the spear-and-shield relation between Byzantine attack and defense from an interactive game-theoretical perspective. Moreover, we highlight the unsolved research challenges and depict the future research directions.
Author Linyuan Zhang
Guoru Ding
Yulong Zou
Jinlong Wang
Qihui Wu
Zhu Han
Author_xml – sequence: 1
  surname: Linyuan Zhang
  fullname: Linyuan Zhang
  email: zhanglinyuan5@163.com
  organization: Coll. of Commun. Eng., PLA Univ. of Sci. & Technol., Nanjing, China
– sequence: 2
  surname: Guoru Ding
  fullname: Guoru Ding
  email: dingguoru@gmail.com
  organization: Coll. of Commun. Eng., PLA Univ. of Sci. & Technol., Nanjing, China
– sequence: 3
  surname: Qihui Wu
  fullname: Qihui Wu
  email: wqhtxdk@aliyun.com
  organization: Coll. of Commun. Eng., PLA Univ. of Sci. & Technol., Nanjing, China
– sequence: 4
  surname: Yulong Zou
  fullname: Yulong Zou
  email: Yulong.Zou@njupt.edu.cn
  organization: Sch. of Telecommun. & Inf. Eng., Nanjing Univ. of Posts & Telecommun., Nanjing, China
– sequence: 5
  surname: Zhu Han
  fullname: Zhu Han
  email: zhan2@uh.edu
  organization: Dept. of Electr. & Comput. Eng., Univ. of Houston, Houston, TX, USA
– sequence: 6
  surname: Jinlong Wang
  fullname: Jinlong Wang
  email: wjl543@sina.com
  organization: Coll. of Commun. Eng., PLA Univ. of Sci. & Technol., Nanjing, China
BookMark eNotzEtOwzAQAFALgURbuABsfIEEe2wnDrs0fKVCJVokdpXTGSNTcFBiisLpWcDq7d6UHcYuEmNnUuRSiuqiWT6s1jkIaXLQAKUyB2wCqlRZqc3LMZsOw5sQGnQlJmw-H39cTCESr1Ny2x13EfkVeYoD8RB5073GkMKe-JPD0PFHSt9dvxsuec1XX_2exhN25N37QKf_ztjzzfW6ucsWy9v7pl5kWwU2ZZoUaY_WVygBNZgWrHa6rQoNAlshJVlZKMIClUFsK-edFegtGGwBQc3Y-d8biGjz2YcP14-bUlhtSq1-AX3gSWY
CitedBy_id crossref_primary_10_1109_COMST_2024_3361451
crossref_primary_10_3390_s21124060
crossref_primary_10_1109_TCOMM_2018_2799616
crossref_primary_10_1109_ACCESS_2023_3304244
crossref_primary_10_1109_TCCN_2020_3016053
crossref_primary_10_1109_JIOT_2022_3194694
crossref_primary_10_1109_TVT_2017_2693384
crossref_primary_10_1631_FITEE_1800519
crossref_primary_10_1109_COMST_2017_2718618
crossref_primary_10_1371_journal_pone_0199546
crossref_primary_10_1007_s11036_015_0665_5
crossref_primary_10_1109_TSIPN_2017_2697724
crossref_primary_10_1016_j_aeue_2019_03_004
crossref_primary_10_1016_j_jisa_2017_11_010
crossref_primary_10_1109_ACCESS_2019_2921604
crossref_primary_10_4218_etrij_2018_0360
crossref_primary_10_1109_MCOM_2018_1700743
crossref_primary_10_1016_j_eng_2021_04_019
crossref_primary_10_1109_ACCESS_2018_2842245
crossref_primary_10_1109_JSEN_2024_3519176
crossref_primary_10_1007_s11276_020_02398_w
crossref_primary_10_1109_TMC_2018_2869390
crossref_primary_10_1109_JSYST_2019_2927686
crossref_primary_10_1109_ACCESS_2016_2593952
crossref_primary_10_1109_COMST_2018_2794358
crossref_primary_10_1016_j_aeue_2018_10_027
crossref_primary_10_1109_TSP_2017_2759082
crossref_primary_10_1016_j_phycom_2023_102112
crossref_primary_10_1109_MCOM_2017_1600682CM
crossref_primary_10_1007_s11235_022_00896_0
crossref_primary_10_1007_s00542_018_3744_2
crossref_primary_10_1109_JSEN_2024_3445584
crossref_primary_10_1007_s40998_018_0133_x
crossref_primary_10_1109_COMST_2017_2677082
crossref_primary_10_1109_COMST_2017_2661861
crossref_primary_10_1049_iet_com_2019_0696
crossref_primary_10_1016_j_comcom_2019_06_007
crossref_primary_10_1109_COMST_2017_2751058
crossref_primary_10_1109_TVT_2018_2889338
crossref_primary_10_1109_JIOT_2019_2895136
crossref_primary_10_1109_TVT_2018_2889336
crossref_primary_10_1109_TWC_2017_2725836
crossref_primary_10_1109_ACCESS_2018_2876223
crossref_primary_10_1109_ACCESS_2024_3370911
crossref_primary_10_1109_TSIPN_2018_2806842
crossref_primary_10_1109_TVT_2017_2722409
crossref_primary_10_1007_s11276_021_02640_z
crossref_primary_10_1155_2018_6319378
crossref_primary_10_1109_OJCOMS_2022_3146364
crossref_primary_10_1109_TCOMM_2015_2483497
crossref_primary_10_1016_j_aeue_2018_07_029
crossref_primary_10_1109_ACCESS_2021_3058628
crossref_primary_10_1109_LCOMM_2020_2990869
crossref_primary_10_3390_electronics10141687
crossref_primary_10_1109_TIFS_2017_2774770
crossref_primary_10_1109_LCOMM_2015_2464214
crossref_primary_10_1007_s11277_020_07077_9
crossref_primary_10_3390_electronics9061038
crossref_primary_10_1109_JSEN_2016_2583060
crossref_primary_10_1016_j_future_2020_12_003
crossref_primary_10_1016_j_jnca_2019_06_005
crossref_primary_10_3390_sym8120147
crossref_primary_10_1049_el_2019_2302
crossref_primary_10_1109_ACCESS_2018_2850879
crossref_primary_10_1109_JSYST_2019_2952395
crossref_primary_10_1002_dac_4261
crossref_primary_10_1109_TCYB_2016_2538293
crossref_primary_10_1109_TSIPN_2022_3141215
crossref_primary_10_1016_j_hcc_2024_100220
crossref_primary_10_1109_JIOT_2024_3470009
crossref_primary_10_1109_TCCN_2018_2845382
crossref_primary_10_1002_dac_3512
crossref_primary_10_1016_j_comnet_2022_109206
crossref_primary_10_1007_s40747_024_01664_0
crossref_primary_10_1109_LSENS_2023_3342021
crossref_primary_10_3390_electronics11203372
crossref_primary_10_1016_j_dsp_2017_12_003
crossref_primary_10_1109_TR_2020_3002105
crossref_primary_10_1109_ACCESS_2021_3131339
crossref_primary_10_1109_LCOMM_2018_2806479
crossref_primary_10_1109_TCOMM_2022_3141777
crossref_primary_10_1109_OJCOMS_2020_3009241
crossref_primary_10_1109_TII_2017_2754579
crossref_primary_10_1109_ACCESS_2018_2866485
crossref_primary_10_3390_fi12040063
crossref_primary_10_26782_jmcms_2020_08_00033
crossref_primary_10_1109_TSIPN_2017_2682799
crossref_primary_10_1109_TCSS_2022_3204361
crossref_primary_10_1016_j_jnca_2016_07_008
crossref_primary_10_1186_s13638_018_1269_0
crossref_primary_10_1016_j_phycom_2020_101001
crossref_primary_10_1109_COMST_2022_3159185
crossref_primary_10_1007_s11276_018_1664_9
crossref_primary_10_1007_s13369_024_09617_y
crossref_primary_10_1109_ACCESS_2018_2885732
crossref_primary_10_1109_TCCN_2023_3342409
crossref_primary_10_1109_COMST_2016_2553178
crossref_primary_10_1016_j_oceaneng_2021_109794
crossref_primary_10_1109_TSIPN_2017_2723723
crossref_primary_10_1002_dac_4289
crossref_primary_10_3390_s18020404
crossref_primary_10_1016_j_pmcj_2016_12_010
crossref_primary_10_1109_COMST_2017_2725960
crossref_primary_10_1109_ACCESS_2024_3351278
crossref_primary_10_1016_j_sigpro_2017_01_033
crossref_primary_10_1016_j_aeue_2019_05_027
crossref_primary_10_1109_ACCESS_2017_2756992
crossref_primary_10_3390_s18020473
crossref_primary_10_1016_j_pmcj_2021_101461
crossref_primary_10_1109_TMC_2019_2897099
crossref_primary_10_1109_MPOT_2017_2751656
crossref_primary_10_14778_3407790_3407847
crossref_primary_10_1016_j_phycom_2022_101891
crossref_primary_10_1109_TIFS_2020_2972129
crossref_primary_10_1109_TCSS_2023_3263241
crossref_primary_10_1016_j_isatra_2021_01_036
crossref_primary_10_1109_ACCESS_2024_3468473
crossref_primary_10_1109_TMC_2021_3081715
crossref_primary_10_1109_TSIPN_2021_3067305
crossref_primary_10_1007_s00034_018_0774_z
crossref_primary_10_3390_app11167228
crossref_primary_10_1002_spy2_415
crossref_primary_10_1109_TAC_2019_2957338
crossref_primary_10_3390_electronics10111346
crossref_primary_10_3390_jsan6040029
crossref_primary_10_1016_j_icte_2019_04_003
crossref_primary_10_1016_j_adhoc_2017_11_003
crossref_primary_10_1109_LWC_2020_2972272
crossref_primary_10_2478_quageo_2021_0002
crossref_primary_10_1109_COMST_2018_2863030
crossref_primary_10_1109_JPROC_2018_2828858
crossref_primary_10_1109_TMC_2020_3030061
crossref_primary_10_1109_JIOT_2021_3064583
crossref_primary_10_3390_electronics13173386
crossref_primary_10_1016_j_eswa_2019_01_023
ContentType Journal Article
DBID 97E
RIA
RIE
DOI 10.1109/COMST.2015.2422735
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Statistics
EISSN 2373-745X
EndPage 1363
ExternalDocumentID 7084574
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of US
  grantid: CCF-1456921; CMMI-1434789; CNS-1443917; ECCS-1405121
– fundername: National Natural Science Foundation of China
  grantid: 61172062; 61301160; 61428101
  funderid: 10.13039/501100001809
GroupedDBID 0R~
29I
2WC
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ATWAV
AZLTO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
EBS
EJD
HZ~
IES
IFIPE
IFJZH
IPLJI
JAVBF
LAI
O9-
OCL
P2P
RIA
RIE
RNS
ID FETCH-LOGICAL-c328t-4e3e4fd8f9d12d425b284a4b96420db011e8163ed6d35ddb9afa80df825db2d23
IEDL.DBID RIE
IngestDate Wed Aug 27 02:45:45 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Byzantine defense
Cognitive radio networks
data falsification
Byzantine attack
cooperative spectrum sensing
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c328t-4e3e4fd8f9d12d425b284a4b96420db011e8163ed6d35ddb9afa80df825db2d23
PageCount 22
ParticipantIDs ieee_primary_7084574
PublicationCentury 2000
PublicationDate 2015-01-01
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – month: 01
  year: 2015
  text: 2015-01-01
  day: 01
PublicationDecade 2010
PublicationTitle IEEE Communications surveys and tutorials
PublicationTitleAbbrev COMST
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0042490
Score 2.541772
Snippet The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of...
SourceID ieee
SourceType Publisher
StartPage 1342
SubjectTerms Byzantine attack
Byzantine defense
Cascading style sheets
Cognitive radio networks
cooperative spectrum sensing
data falsification
Security
Sensors
Sociology
Statistics
Testing
Tutorials
Title Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
URI https://ieeexplore.ieee.org/document/7084574
Volume 17
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Na8JAEF3Ukz30Q1v6zR56bGLcfG16U1uRghaqgjfZzcyCCLHYWNBf30liSlt66C3kkmWH3ffe5M0MY3ciJJxDt225wsSWp4LA0iYGC2JHCxWKwOgs3zEcBYOp9zzzZxV2_1ULg4i5-Qzt7DH_lw-reJOlylqhIz0_9KqsSsKtqNUqb12PZIRTFsU4Uav3MhxPMueWbxMIEUb7P8an5OjRP2LD8ruFaWRpb1Jtx7tfLRn_u7BjdrinkbxTxP2EVTBpsINvzQUbrJ7xyKINc5N1u9udyoZCIO-kqYqXXCXAH9GQikW-SHivtBHxVwWLFR8V9vD3B97h4836A7enbNp_mvQG1n58ghW7QqYWhQA9A9JE0BZAZ1MTFClPRyQ5HNB0sFESG0MIwPUBdKSMkg4Y0oygBQj3jNWSVYLnjBMpUL6kuwACYlwqjNDzjZSu9mUYizZesGa2KfO3okPGfL8fl3-_vmL1LDBFIuOa1dL1Bm8I2lN9m8f0Ez9AozM
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLZ4HIADb8SbHDjS0aVNm3LbBmjANiQYErcpqR1pmtSh0SHBr8ddNwSIA7col0S24s92PtsApzJmnKOg6gXSpV5oosizLkUPU99KE8vI2SLf0e5Ezafw9lk9z8HZVy0MEU3IZ1QplpO_fBym4yJVdh77OlRxOA-LjPuqWlZrzexuyIGEPyuL8ZPzxn37sVtwt1SFYYhRWv0YoDLBj-s1aM9OLmkjg8o4t5X041dTxv9ebR1Wp46kqJWa34A5yjZh5Vt7wU1YLjzJshHzFtTr7x-mGAtBopbnJh0Ik6G4JMdxLIl-JhozIpF4MNgfik5JEH-9EDXxOB690fs2PF1fdRtNbzpAwUsDqXOPlUChQ-0SrErk12kZjExoEw46fLT8tEmzP0YYYaAQbWKc0T46jhrRSpTBDixkw4x2QbBbYJRma4ARy97ECYXKaR1YpeNUVmkPtgqh9F7KHhm9qTz2_94-gaVmt93qtW46dwewXCipTGscwkI-GtMRA31ujyf6_QT1_qZ8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Byzantine+Attack+and+Defense+in+Cognitive+Radio+Networks%3A+A+Survey&rft.jtitle=IEEE+Communications+surveys+and+tutorials&rft.au=Linyuan+Zhang&rft.au=Guoru+Ding&rft.au=Qihui+Wu&rft.au=Yulong+Zou&rft.date=2015-01-01&rft.pub=IEEE&rft.eissn=2373-745X&rft.volume=17&rft.issue=3&rft.spage=1342&rft.epage=1363&rft_id=info:doi/10.1109%2FCOMST.2015.2422735&rft.externalDocID=7084574