Security and Privacy of Collaborative Spectrum Sensing in Cognitive Radio Networks
Security and Privacy of Collaborative Spectrum Sensing in Cognitive Radio Networks
Security and Privacy of Collaborative Spectrum Sensing in Cognitive Radio Networks
, Haojin Zhu
, Shuai Li
, Suguo Du
and Xu Li
, s.t.
=0
:/
C
1
.
C
2
. .
by :
= p
H(t)
. (1)
Then n
to the FC.
Aggregation Phase: After receiving the spectrum sensing reports from all the participants,
the FC obtains the nal aggregate sensing result by computing:
\
= H(t)
(2)
Since
=1
:/
= 0, it is obvious that \
= p
=1
=1
:
. Note that, the RSS values in collaborative sensing reports are typically not
large. In our experiment, RSS value varies in the range of [30, 0], which makes the plaintext
space quite small. As pointed out by [9], when the plaintext space is small, decryption can be
accomplished via a brute-force search. If utilizing the Pollards lambda method, this computation
time could be nished in 6.93ms. Such a computational overhead can satisfy the real-time
requirements of collaborative sensing, in which the time interval for two regular CR sensing is
2s.
January 28, 2012 DRAFT
11
Fig. 3. A privacy preserving collaborative spectrum sensing framework
The security of PPSRA scheme is based on [9]. In PPSRA, the FC can only obtain the
encrypted data c
from n
0
, which is provided by the FCs own sensing (or any voluntary
secondary users), to replace the real sensing report (of the leaving/joining user) at a predened
probability j. Unlike traditional noise based differential privacy protection techniques which may
have a negative effect on collaborative sensing, such a dummy report based approach will not
pollute the aggregation result. Instead, it only increases the weight of a real sensing report from
the FC of the overall aggregation result and reduce the number of real participants involved in
the collaborative sensing, which are two major metrics considered in the subsequent performance
analysis. In our experiment, it is found that by choosing an appropriate probability :
0
, DDRI
can pose a minimal effect on the performance of collaborative spectrum sensing.
VII. EXPERIMENT AND EVALUATION
In this section, we rst demonstrate the practicality of the identied RLC and DLC attacks
by using real-world experiments. Then, we show the effectiveness of the proposed PPSRA and
DDRI protocols by comparing their privacy leaking with the traditional collaborative spectrum
sensing. In our experiment, it is also shown that PPSRA and DDRI pose a limited negative effect
on the performance of collaborative spectrum sensing.
A. System Setup
Our experiment environment is set up at Building of Electronic Information and Electrical
Engineering School and located at Shanghai Jiao Tong University, Minghang Campus. We use
Universal Software Radio Peripheral (USRP) with a TVRX daughterboard (50 MHz to 860 MHz
Receiver) and a wide band antenna (70 MHz to 1000 MHz) to detect the TV radio signal in
the building. Then we scan the spectrum from 600 MHz to 860 MHz at these 13 places with
each spectrum scanned for 10 seconds totally while every 8 MHz spectrum scanned for 33ms.
To evaluate the privacy leaking risks of various attacks, we emulate an attackers behavior to
geo-locate a secondary user as presented in Section V.
January 28, 2012 DRAFT
13
B. Experiment Results
To demonstrate the effectiveness of the identied RLC and DLC attacks, we consider two
performance metrics, Attack Successful Rate (ASR) and the Location Privacy Entropy (LPE).
In both of RLC and DLC attacks, if the attacker could correctly geo-locate a secondary user by
correlating his sensing report to his physical locations out of total 13 locations, it is regarded as
a successful attack. However, in some cases, the attacker may not accurately correlate a sensing
report to a location. In stead, with a limited number of sensing reports, the attacker can still
derive a potential location set, which includes the real location of the target secondary user. From
the information theory point of view, with RLC and DLC attacks, the attacker can still obtain
a certain location information of the secondary users. Therefore, by adopting the denition of
entropy [10], we could have a similar denition on location privacy, which is used to describe
the uncertainty of the attackers to correlate a sensing report (or the secondary user) to a specic
location. The experiment result of RLC and DLC without any privacy preserving method is
shown in TABLE. I, where c is the bound of distance between centroid and sample point.
Attack Type Max ASR Min ASR Average ASR Average LPE
RLC
1.44 100% 76.92% 91.31% 0.47
2.25 100% 92.31 99.15% 0.06
4.00 61.54% 46.15% 56.77% 0.47
DLC
2.25 92.31% 46.15% 71.08% 1.31
4.00 92.31% 53.85% 79.31% 0.52
6.25 100% 69.23% 84.38% 0.36
TABLE I
THE ATTACK SUCCESS RATE (ASR) AND THE LOCATION PRIVACY ENTROPY (LPE) UNDER DIFFERENT
It is observed that with a proper parameter c, i.e. RLC with c = 2.25 and DLC with c = 6.25
in TABLE. I, in both attacks, ASR can reach about 90% , and the achieved entropy can be close
to 0, while the maximum entropy is log
2
13 3.7. So it indicates that, with a proper parameter
c, the attacker could launch both of the RLC and DLC effectively.
We further evaluate the effectiveness of the proposed PPSRA and DDRI protocols as well
as the impact of DDRI on the performance of the collaborative sensing. In our experiment, we
derive the probability j from a normal distribution `(j. o). It is obvious that without knowing
January 28, 2012 DRAFT
14
1 2 3 4 5 6 7 8 9 10
0
0.5
1
1.5
2
2.5
3
3.5
4
parameter (dBm
2
)
e
n
t
r
o
p
y
entropy under RLC
entropy under DLC
entropy under our framework
(a) Entropy under RLC, DLC and our framework
662670Mhz 798806Mhz 750758Mhz
35
30
25
20
15
10
5
0
T
h
e
f
l
u
c
t
u
a
t
i
o
n
o
f
R
S
S
w
i
t
h
d
i
f
f
e
r
e
n
t
p
r
o
b
a
b
i
l
i
t
y
without DDRI
under DDRI with =0.06
under DDRI with =0.15
under DDRI with =0.3
(b) The uctuation of RSS with different
Fig. 4. The evaluation results about the RLC attack, DLC attack and DDRI and DDRIs impact on collaborative sensing
the individual sensing report, both of the external or internal RLC may not be effective any more.
On the other hand, in terms of DLC, there are still some locations can be inferred, but most of
the correlation is not authentic. So ASR of DLC is also close to 0. In Fig. 4(a), it is observed that
under the protection, the entropy level of secondary users location privacy remains unchanged,
which means the uncertainty of the attackers about users location remains unchanged. Thus,
the users location privacy could be well protected. Fig. 4(b) shows that DDRI pose a limited
effect on the performance of collaborative spectrum sensing.
In summary, the experiment results conrm the existence of RLC and DLC, and substantiate
the effectiveness of the privacy preserving framework.
VIII. CONCLUSION
Collaborative spectrum sensing is regarded as a fundamental task for each secondary user in
cognitive radio networks (CRNs). In this paper, we rstly identify the potential security threats in
collaborative spectrum sensing. We then give a comprehensive survey on the existing works on
secure collaborative spectrum sensing, which shows that location privacy issue has received little
attention so far. With the real-world experiments, we point out three new location privacy related
attacks in collaborative spectrum sensing. To thwart these new attacks, we propose a novel privacy
preserving collaborative spectrum sensing framework including a privacy preserving sensing
report aggregation (PPSRA) protocol to thwart external/internal RLC attack and distributed
January 28, 2012 DRAFT
15
dummy report injection (DDRI) protocol to prevent DLC attack. Our experiment results have
demonstrated the practicality of the identied RLC and DLC attacks and the proposed PPSRA
and DDRI protocols could effectively thwart these attack with a minimized overhead.
REFERENCES
[1] R. Chen, J. Park, and J.H. Reed, Defense against Primary User Emulation Attacks in Cognitive Radio Networks, IEEE
Journal on Selected Areas in Communications, vol.26, no.1, pp.25-37, Jan. 2008.
[2] Y. Liu, P. Ning, H. Dai, Authenticating Primary Users Signals in Cognitive Radio Networks via Integrated Cryptographic
and Wireless Link Signatures, in Proceedings of IEEE Symposium on Security and Privacy 2010, Oakland, CA, May
2010.
[3] W. Wang, H. Li, Y. Sun, Z. Han, CatchIt: Detect Malicious Users in Collaborative Spectrum Sensing, in Proc. of
GLOBECOM09, 2009.
[4] O. Fatemieh, A. Farhadi, R. Chandra, and C. Gunter, Using Classication to Protect the Integrity of Spectrum
Measurements in White Space Networks, in Proc. of NDSS11, 2011.
[5] C. Song and Q. Zhang, Achieving cooperative spectrum sensing in wireless cognitive radio networks, ACM MC2R,
Special Issue on Cognitive Radio Technologies and Systems, Vol. 13, Issue 2, April 2009
[6] B. Wang, K.J. Liu, and T.C. Clancy, Evolutionary cooperative spectrum sensing game: how to collaborate? IEEE Trans.
on Communications, vol.58, no.3, pp.890-900, March 2010.
[7] S. Li, H. Zhu, B. Yang, C. Chen, X. Guan, Believe Yourself: A User-centric Misbehavior Detection Scheme for Secure
Collaborative Spectrum Sensing, in Proc. of ICC11, 2011.
[8] C. Dwork Differential privacy, Invited talk at ICALP, 2006.
[9] E. Shi, T. Chan, E. Rieffel, R. Chow, and D. Song,Privacy-preserving aggregation of time-series data, in Proc. of NDSS11,
2011.
[10] J. Freudiger, M.H. Manshaei, J.P. Hubaux, and D.C. Parkes,On Non-Cooperative Location Privacy: a Game-Theoretic
Analysis, in Proc. of CCS09, 2009.
January 28, 2012 DRAFT