Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

dc.contributor.authorZhang, Linyuan
dc.contributor.authorDing, Guoru
dc.contributor.authorWu, Qihui
dc.contributor.authorZou, Yulong
dc.contributor.authorHan, Zhu
dc.contributor.authorWang, Jinlong
dc.date.accessioned2020-05-11T16:15:20Z
dc.date.available2020-05-11T16:15:20Z
dc.date.issued4/13/2015
dc.description.abstractThe Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). Over the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Then, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we analyze the spear-and-shield relation between Byzantine attack and defense from an interactive game-theoretical perspective. Moreover, we highlight the unsolved research challenges and depict the future research directions.
dc.identifier.citationCopyright 2015 IEEE Communications Surveys & Tutorials. This is a pre-print version of a published paper that is available at: https://ieeexplore.ieee.org/abstract/document/7084574. Recommended citation: Zhang, Linyuan, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, and Jinlong Wang. "Byzantine attack and defense in cognitive radio networks: A survey." IEEE Communications Surveys & Tutorials 17, no. 3 (2015): 1342-1363. doi: 10.1109/COMST.2015.2422735. This item has been deposited in accordance with publisher copyright and licensing terms and with the author's permission.
dc.identifier.urihttps://hdl.handle.net/10657/6465
dc.publisherIEEE Communications Surveys & Tutorials
dc.subjectCognitive radio networks
dc.subjectcooperative spectrum sensing
dc.subjectdata falsification
dc.subjectByzantine attack
dc.subjectByzantine defense
dc.titleByzantine Attack and Defense in Cognitive Radio Networks: A Survey
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Han_2015_ByzantineAttackandDefenseinCognitivePRE.pdf
Size:
2 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.69 KB
Format:
Plain Text
Description: