Next Article in Journal
Electrical Characteristics of Bulk FinFET According to Spacer Length
Next Article in Special Issue
Misbehavior-Aware On-Demand Collaborative Intrusion Detection System Using Distributed Ensemble Learning for VANET
Previous Article in Journal
A Model-Based Approach to Optimizing Partition Scheduling of Integrated Modular Avionics Systems
Previous Article in Special Issue
FALCON: Framework for Anomaly Detection in Industrial Control Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Detection of Malicious Primary User Emulation Based on a Support Vector Machine for a Mobile Cognitive Radio Network Using Software-Defined Radio

by
Ernesto Cadena Muñoz
1,*,
Luis Fernando Pedraza Martínez
2 and
Jorge Eduardo Ortiz Triviño
1
1
Systems and Industrial Department, Universidad Nacional de Colombia, Bogotá 111321, Colombia
2
Technological Faculty, Universidad Distrital Francisco José de Caldas, Bogotá 111931, Colombia
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(8), 1282; https://doi.org/10.3390/electronics9081282
Submission received: 26 June 2020 / Revised: 13 July 2020 / Accepted: 14 July 2020 / Published: 10 August 2020

Abstract

:
Mobile cognitive radio networks provide a new platform to implement and adapt wireless cellular communications, increasing the use of the electromagnetic spectrum by using it when the primary user is not using it and providing cellular service to secondary users. In these networks, there exist vulnerabilities that can be exploited, such as the malicious primary user emulation (PUE), which tries to imitate the primary user signal to make the cognitive network release the used channel, causing a denial of service to secondary users. We propose a support vector machine (SVM) technique, which classifies if the received signal is a primary user or a malicious primary user emulation signal by using the signal-to-noise ratio (SNR) and Rényi entropy of the energy signal as an input to the SVM. This model improves the detection of the malicious attacker presence in low SNR without the need for a threshold calculation, which can lead to false detection results, especially in orthogonal frequency division multiplexing (OFDM) where the threshold is more difficult to estimate because the signal limit values are very close in low SNR. It is implemented on a software-defined radio (SDR) testbed to emulate the environment of mobile system modulations, such as Gaussian minimum shift keying (GMSK) and OFDM. The SVM made a previous learning process to allow the SVM system to recognize the signal behavior of a primary user in modulations such as GMSK and OFDM and the SNR value, and then the received test signal is analyzed in real-time to decide if a malicious PUE is present. The results show that our solution increases the detection probability compared to traditional techniques such as energy or cyclostationary detection in low SNR values, and it detects malicious PUE signal in MCRN.

1. Introduction

The constant evolution of services and applications, the Internet of things, and the need for more bandwidth in wireless networks lead us to develop, implement and improve technologies such as mobile cognitive radio networks (MCRN), which helps to manage the spectrum scarcity problem [1]. The general concept of cognitive radio is an intelligent communication system that adapts in real-time to the radio environment; it is flexible and makes a better use of frequency resources. For this task, it continuously senses the radio frequency environment to find spectral holes where the primary user (PU) is not transmitting, and it involves the identification of PU activity in the spectrum and frequency hopping in case PU signal detected [2].
The first step in MCRN is to detect the PU presence; we can find several spectrum-sensing techniques such as energy detection, location, feature detection, matched filter detection, covariance-based detection, and cooperative spectrum sensing, among others. The main objective is to detect if there is a PU signal at a specific frequency, and the system must do this in real-time so that the algorithms are not complex and have a good time response [1].
Due to this requirement, a specific attack on the MCRN appears. This is called the primary user emulation (PUE), because it senses the medium all the time, and a secondary user (SU) can adapt its signal to mimic the PU signal, making the MCRN or other SUs release the frequency and hop into another one or cancel the transmission [3]. The objective of the attacker in a malicious attack is to obtain control of the channel while avoiding any user of it—it does not transmit information or communicate by itself, but it is hard to distinguish between a PU or a PUE [4].
The problem of finding this difference is at its worst when analyzing the real wireless environment where PU, SU, and PUE are moving, because traditional detection systems such as energy, location or others are based on the static position attacker, that is, when they move, the systems lead to a false state of alarm [5].
We propose to use a support vector machine (SVM) [6] to learn the behavior of cellular modulation techniques such as Gaussian minimum shift keying (GMSK) or orthogonal frequency division multiplexing (OFDM), and with this information and the received data from a spectrum analyzer, recognize a malicious PUE attack on the network. An energy detector is used to release the channel very quickly and to not interfere with a possible PU that is in the process of communicating. Then, the Rényi entropy of this signal is calculated, and with the signal-to-noise ratio (SNR) value, the SVM learns the PU signal behavior. With these signals learned, the hyperplane is calculated and the system is ready to decide the PUE presence in real-time with the implementation of the algorithm on a software-defined radio (SDR) [7].
This paper is organized as follows: Section 2 presents the previous work; Section 3 introduce SVM concepts and the proposal for malicious PUE detection; the SDR testbed is presented in Section 4; Section 5 presents the results. The discussion is conducted in Section 6, and Section 7 presents the conclusions.

2. Previous Work

In MCRN, resources such as frequency band, modulation type, distance, power, noise, and interference have an impact on the overall system. We try to balance or maximize the use of these resources according to the environment, the technology, and the user services needed. A modern machine learning (ML) technique can be useful for providing a mechanism to maximize the use of the available resources. In our case, the learning capability enables the MCRN to learn and adapt the frequency management according to the wireless environment in real-time [1].
Cognitive radio (CR) is based on intelligence [8], and the learning process is very important to obtain the cognitive part. CRs must learn from the environment and decide their actions. There has been a growing interest in applying ML algorithms to the cognitive radio network (CRN). ML has been proposed and discussed in topics such as complex computation and the error propagation of training algorithm, and the majority of machine learning researchers work on techniques such as linear regression, logistic regression and support vector machines to decide if there is PU presence. ML can be reduced to four learning strategies: supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning [9].
Supervised ML applications such as support vector machines (SVM) result in better PU or PUE detection performance in an MCRN for an expected probability of false alarm when compared with traditional methods. We have to design the training set size, which is the input data in the learning process. Depending on this design, computation time and memory will be required to solve the decision problem. Once this learning process is done, the system can distinguish between signals, and only data points which lie at the margin of the hyperplane are qualified to be categorized as support vectors [2].
Individual spectrum sensing has the hidden primary user (PU) problem, but first we have to optimize the individual sensing process, because the cooperative scheme needs a common channel to transmit, and it requires more resources of the MCRN. It is expected to achieve a higher spectrum-sensing reliability when compared with individual spectrum sensing. All secondary users in the MCRN share their sensing information with the fusion center for a final decision with a hard or soft fusion algorithm and an OR/AND rule to make the final decision [10]. Machine learning techniques are also used for energy detection in cooperative spectrum sensing for CRN, and are even comparable with unsupervised techniques such as K-means [11].
According to [11], the supervised SVM classifier with the linear kernel performs well in terms of the detection probability. The computational complexity of the SVM-linear classifier is compensated by its higher detection capability and comparatively lower training and classification delay.
The detection systems can integrate an artificial neuron network (ANN) into a cognitive engine to learn from environment measurements and analyze how the status of the network affect its performance on different channels. The ANN and the feed-backward ANN belong to supervised learning; the training dataset must be labeled by a human, which is not easy in a real RF environment. The environment adaptation of unsupervised learning algorithms is better than supervised learning algorithms for CRN [9].
Another application is CRN based on genetic algorithms, where these algorithms are used to control channel selection schemes (GA-CSS) for CRs by considering the random arrival of data rate and bit error rate (BER) in order to select the optimal control channel. Besides, an improved genetic algorithm-based spectrum assignment model helps to achieve higher system utility with more cognitive users under the same population size. Learning algorithm-based decision-making is another major task that has been widely investigated in with regard to CR applications such as pattern classification [12].
Linear prediction (LP) algorithms are considered as an important member of statistics and mathematics and, in this case, the spectrum prediction and future values are predicted as a linear function of previous samples. LPs are used in digital signal processing (DSP) due to their remarkable simplicity. They have been implemented for the prediction of the spectrum in the time domain. Some common models for linear prediction models include the auto-regressive (AR) model, the mobile average (MA) model, the model of auto-regressive moving average (ARMA) and the auto-regressive integrated moving average model (ARIMA) [13,14].
The Bayesian interference (BIF) is another approach that been a classic prediction method in CRN. It has been implemented as a part of the Markov system. The scheme can be defined as a derived probability distribution of the system. It is calculated as the posterior probability distribution according to the Bayes rule, from the prior probability distribution and the likelihood function. The problem is to specify a prior probability distribution because it has a significant influence on the complexity of the subsequent computation [13].
A machine learning framework is proposed for primary user emulation attack detection in cognitive radio networks in [15]. It is based on classification models that exploit features extracted using the proposed pattern-described link signature method (PDLS) from the channel impulse response (CIR) in orthogonal frequency division multiplexing (OFDM)-based transceivers [15].
The particle swarm optimization (PSO) algorithm has been applied to the hyper-parameter optimization of the SVM to establish a prediction model for the heat exchanger. A support vector regression (SVR) model is also used to achieve the online prediction of thermal resistance denoising for low-temperature superheaters, showing a prediction accuracy above 98% without adding expensive devices to the system by predicting the results with the SVR with 80% of the samples used for training and 20% for testing [16].
In general, machine learning techniques, if trained correctly, can be a good approach to minimize the delay of the detection and easily use complex models. They use features such as energy statistics, the probability vector of occupancy over time as an input to the model, and propose a classification problem to find the optimal decision if there is a PU, an attacker, or noise [17].

Contributions

In this paper, we describe the malicious PUE attack in the MCRN comparing the theory, simulations, and experiments in the SDR testbed to establish a system to detect this attack, which, to the best of our knowledge, is the first approach to detect this attack with this method. The selfish attack is described in [5]. In this paper, we focus on a malicious attack using ML. The main contributions of this paper are summarized as follows:
  • Analyze and extract the PU signal behavior in systems with different modulations such as GMSK or OFDM.
  • Establish the SNR and entropy as the two dimensions of the SVM.
  • Improve energy detection by adding entropy and feature recognition.
  • Define and implement the SVM with the learning behavior as an input generating the decision of the presence of a malicious PUE.
  • Train and test the SVM with real values from the SDR.
  • Predict the results of the malicious PUE signal.
  • Model and implement the malicious PUE attack in the MCRN.
  • Implement the MCRN testbed and experiment with the SVM learning stage, calculating the SNR and entropy based on the energy.
The rest of this paper is organized as follows: Section 3 introduces the SVM system model; the testbed for the experiments is described in Section 4; numerical results are presented in Section 5; in Section 6, a discussion takes place; finally, conclusions are drawn in Section 7.

3. Support Vector Machine for Malicious Primary User Emulation Detection

In this section, we define the MCRN, users and interactions, variables, and scenarios for the attack. We propose the SVM for malicious PUE detection by using the energy detector and entropy detector.
In the primary network, operators have a BTS, an eNodeB depending on the technology; this element establishes a communication with the PU in some licensed frequencies by using some modulation methods such as GMSK or OFDM. The MCRN uses a spectrum analyzer to sense the medium and detect the spectral holes according to the selected frequency range. When it finds a hole, it starts the communication with the SU that needs some service. SUs connected to the MCRN utilize a cognitive base station (CBS) device to operate phone calls or messages (or anything else that is required) while continuously listening to the presence of the PU [18].
The PUE attack is given by an SU, which, in this case, emulates the PUE signal as a jammer for interfering with the transmission in the selected frequency range. Depending on the detection strategy of the MCRN, the attack will be identified as a licensed PU and has to change its frequency or deny the service to the SUs. One of the most used methods for detection is energy detection, as it senses the PU power in a defined frequency and if it is over a threshold, it is identified as a PU. This is where the PUE attacks by generating a signal in the frequency range. Detections methods vary in terms of energy, features, cyclostationary, and location detection, trying to separate and decide if what they encounter is a PU or a PUE signal [19].
The MCRN, users, and interactions are shown in Figure 1. The PUE attack can affect the MCRN and the primary network depending on the used configuration [20].
We analyzed the mobile network signals such as 3G or 4G systems, identifying the patters in the energy detection in time and calculating the entropy of these values. Combining these with the SNR value and with the measured values, we obtain a database for the training system of the SVM.
The SVM algorithm generates the hyperplane based on the feature vectors maximizing the space between the limit values for each case in the presence or absence of a PU. With these values, the system can now decide if the experimental input is a PU or a malicious PUE attack [1].
The SVM is divided into two parts [21]: The first one is the SVM learning process where we extract parameters such as SNR, entropy, and modulation signal behavior of GMSK and OFDM modulations from the energy detector that makes an analog to digital conversion (A/D). The second is the fast Fourier transform (FFT), which calculates the square and makes an average of the energy signal.
These results are stored in the SVM and train the algorithm just one time. This is shown as the SVM learning process in Figure 2.
After the learning process, the algorithm calculates the hyperplane and vectors and is ready to classify the inputs. In the middle, part of the data is used to test the algorithm and measure the accuracy. The second part is to decide the presence of a malicious PUE. For this process, we made the energy detection and entropy calculation so that it is capable of identifying the signal. These values are the inputs for the SVM classification system and, according to the database and the algorithm of the SVM, it is decided if the presence is a PUE or not. This is shown in Figure 2 as the SVM classification process.
The SVM is a classification model of two classes, it maps the input vectors of energy into a high-dimensional feature space in which they could become linearly separable and if it is not linear it can use kernel functions. In our case, the two dimensions are the SNR and the Entropy of the input signal. In the classification process, a hyperplane in this high-dimensional space is found, that is why it is called a maximal margin classifier where the margin is the distance from a separating hyperplane to the closest data points. Its principle is to find an optimal hyperplane in a given positive and negative two types of data, there could be many hyperplanes between the two sets of data, but only one allows for the maximum margin. The corresponding closest data points are called support vectors and the hyperplane allowing for the maximum margin is called an optimal separating hyperplane [22] as is shown in Figure 3.
In Figure 3, assuming H as the optimal hyperplane, H1 and H2 are the two support planes chosen by the support vectors parallel to H. The margin is defined as the distance between the two support planes. To make the classification, we have to separate the two classes of data by maximizing the margin so that the hyperplane divides the two classes of data [23]. The hyperplane can be defined as Equation (1).
H : w × x + b = 0 H 1 : w × x + b = 1 H 2 : w × x + b = 1
where x represents the argument, w is the weight and b is a constant value [23]. Based on w, we need to minimize the vector norm of w to maximize the category margin, and hence the objective function is Equation (2) [24].
min ( 1 2 w 2 ) s . t . y i ( w × x i + b ) 1 i = 1 . . n
A Lagrange dual method is used to obtain the optimal solution. After introducing the Lagrange multiplier, the problem changes to Equation (3) [23].
min ( 1 2 w 2 ) i = 1 n a i ( y i ( w × x i + b ) 1 ) s . t . a i 0
The solution can be simplified to obtain the final classification decision function Equation (4) [23].
f ( x ) = sgn ( ( w × x i ) + b ) f ( x ) = sgn ( i = 1 n a i × y i ( x i × x + b ) )
where xi are the support vectors, a is the Lagrange multiple vectors and sgn(x) is the symbolic function [23].
Once the general functionality of the SVM has been explained, we proceed to describe the structure of the SVM for the detection model, which is shown in the following pseudocode:
  • GNURadio starts measuring the energy signal at the desired frequency and estimates the SNR value by using the RTLSDR device using the equations described in Section 3.2.
  • The entropy of the energy is calculated with a modified GNURadio main python code using the equations described in Section 3.3.
  • Using the previously installed scikit software, the kernel SVM code is invoked with the fit function and the supported vectors, and the margin and the hyperplane are calculated.
  • The results of the learning process are stored in the scikit program.
  • The second part (classification process) begins with measuring the averaged energy signal and SNR values in real-time by using the RTLSDR device.
  • The entropy of the averaged energy signal is calculated.
  • The prediction code is invoked with entropy and SNR value as an input.
  • The classification is made with the results of the prediction code by giving a binary result if there is a PU (1) or a malicious PUE (0) present.
  • According to these results, the SDR-USRP-2922, configured as a CBS for the MCRN, starts the transmission to the SU.

3.1. PUE Definition

The mathematical definition of PUE considers n(t) as the noise signal, h(t) as the impulse response of the system, s(t) as the received signal from a PU, s’(t) as the mimic signal from the PUEA and y(t) as the received signal [25], as shown in Equation (5).
y ( t ) = { n ( t ) S U h ( t ) × s ( t ) + n ( t ) P U / P U E
For malicious PUE, the PU signal behavior helps us to recognize if it is a PU or a PUE, but the whole system, including energy, entropy, and SVM, allows the detection of malicious PUE.

3.2. Energy Calculation

An additive white Gaussian noise (AWGN) channel is assumed, and we use a time-based energy detection method as in [26]. N is the total number of samples of the energy and Y(n) is added during one Si detection interval, as shown in Equation (6).
Z ( Y n ) = 1 N n = 1 N | Y ( n ) | 2
The energy detector compares Z to a threshold λ and makes a decision regarding the presence or absence of signals. The probability of detection and the probability of false alarm for energy detection is defined in Equation (7) [26].
P d = p ( Z λ | H 1 ) , P f a = p ( Z λ | H 0 ) .
Z is a Gaussian random variable with a mean of zero and variance of σm2, and γ is the signal-to noise-ratio (SNR). The probability of false alarm (Pfa) and the probability of detection (Pd) are defined in Equation (8) [26].
P d = Q ( λ N N × γ 2 × N + 4 × N × γ ) P f a = Q ( λ N 2 × N )
In our proposed solution, we do not define a hypothesis or a threshold; we take the energy samples and filter, average, and use them as an input for the entropy calculation.

3.3. Entropy Calculation

The selected entropy detector is in the frequency domain as it is not sensitive to noise. This system is considered to improve the detection of PU presence in the network and operates with low SNR. It is considered a system without a priori knowledge of the signal. A binary hypothesis test is used to find out the presence of the PU/PUE signal, where H0 is the noise in the absence of a signal and H1 indicates the presence of a signal, as described below [27].
y ( n ) = { u ( n ) H 0 s ( n ) + u ( n ) H 1
A discrete Fourier transform (DFT) is applied to (9) and (10) is obtained [28].
Y ¯ ( k ) = { U ¯ ( k ) H 0 S ¯ ( k ) + U ¯ ( k ) H 1
where Y ¯ (k), S ¯ (k) and U ¯ (k) are the complex spectrum of the received signal, PU signal, and noise, respectively. The DFT size K = N [28]. We use the Rényi entropy described below in Equation (11) [29].
H α ( Y ) = 1 1 α × l o g ( i = 1 n p i α )
Given Y discrete events, Pi is the probability of occurrences in the ith bin, α is the Rényi entropy order, where α ≥ 0 and α ≠ 1. Using the histogram method to estimate the received signal probability of detection, for a given number of bins L, Rényi entropy is estimated by Equation (12) for a statistic test [29,30].
T ( Y ) = 1 1 α × l o g ( i = 1 L k i N α )
In the entropy detector, we compare the test statistics with a threshold for calculating the probability of detection. We will use the entropy value as an input to the SVM directly without making any decision regarding the detection by itself, as it requires the SVM classification results.

4. SDR Testbed for Experiments

For the experiments, we use an RTLSDR 2832 device for spectrum analysis connected to a PC by the USB port, and for the MCRN, an NI USRP-2922 is used with GNURadio [31] with a basic CR protocol implemented. This device works in a range of 400 MHz to 4.4 GHz. To emulate the PUE, we use another USRP which transmits a malicious signal in the selected frequency. We use the uplink (UL) signal to measure the energy. The CBS detects the PU/PUE signal and, according to these values, it assigns a frequency and sends the SU signal. The PUE detects PU signals and sends malicious PUE signals to confuse the CBS detection system which recognizes it as a PU, as can be seen in Figure 4.
In the learning process, we use the primary network of an operator to measure the signals in GMSK and OFDM in a real phone call. We estimate the energy signal for each case. This information is the input for the SVM system with the SNR signal.
For experiments, the PUE is configured to transmit a signal in the absence of a PU signal to avoid interfering with the operator’s network. It has previous knowledge of the PU frequencies, signals, and characteristics to detect it, but the PUE can interfere with this network in a hostile configuration, subsequently affecting PUs and SUs. A python program is implemented to receive the energy data from RTLSDR and the SNR and calculate the entropy. With these data, the program extract the behavior in the learning process and calculates the support vectors and the hyperplane.
In the detection process, the program receives these data, and with the previous knowledge of signals, the SVM decides if there is a malicious PUE present in the system using scikit [32]. This can be seen in the flowchart in Figure 5.
The device performance parameters of center frequency, bandwidth, instantaneous dynamic range (IDR), noise floor, noise figure and sensitivity under the evaluated experiment can be seen in Table 1 according to [33].

5. Results

In this section, the results of the test scenarios are presented and analyzed.

5.1. GMSK Experiments

In the first part of the process (learning), we start the systems and read the data. For experiments, we use both GMSK and OFDM UL signals in a phone call as the input to the system. For some SNR values, we acquire the time signal and calculate the energy and entropy to identify the signal in a specific frequency. The frequency depends on the technology and operator, and we use a real operator and phone call to acquire these signals in GSM and 4G-LTE cellular systems.
We calculate the energy of the signal using the RTLSDR, and these data are transmitted to the PC where there are on average 100 samples. The results for the GMSK signal can be seen in Figure 6, where a periodic pattern can be seen in time. These results show that the energy of the modulated signal is not constant in time. If we take the energy in a time that is low (under −90 dBm), the results will have a wrong interpretation, thus, we calculate the entropy of the averaged energy signal according to [34].
The next step is to calculate the entropy of the received energy signal. There are two stages: in the first one, there is only a noise signal; the second one is where a PUE attacks. These signals are processed and the entropy of the averaged energy received is calculated, as can be seen in Figure 7. The idea to use entropy to classify the signals is explained is this figure. The first 100 samples are the calculation of entropy in the absence of a malicious PUE signal, while the rest of the samples are taken when a modulated PU signal is present in the frequency. This is how the system detects the PUE attack.
Based on this information, we observe that entropy values are linearly separable and we increase the probability of detection by implementing an SVM in two stages, namely, the learning part and the testing part. We proceed to take 350 samples for each SNR value from −25 dB to 0 dB and apply an SVM in the learning stage process to define the hyperplane and predict the values. The idea is to develop an SVM using two parameters, SNR and entropy, which are experimental values in an indoor laboratory. The parameters for this stage are shown in Table 2.
After the learning process, we test the SVM algorithm with 1250 samples. The results of this achieve 99% effectiveness for the testing data according to the scikit report.
The last stage is to test the system with the modulated GMSK signal in the SDR. We capture the energy signal in real-time, calculate the entropy and average 100 values. These values are sent to the SVM which gives a binary result, one if a PUE is present and zero if a PU is present. A sample of the hyperplane calculation is shown in Figure 8, where the support vectors are the green circles, and the hyperplane and working zone are blue, showing the maximization of the margin. The yellow circles correspond to a PU signal and the black circles correspond to malicious PUE signal. We can see the support vectors and the hyperplane margin in the learning process. In the classifying process, when an entropy value is calculated, the software detects the malicious PUE signal according to the previously stored data from the learning process.
We take 10,000 samples for different SNRs and energy values with an objective Pfa of 0.1 [28]. With these values, we measure the practical probability of detection as the times of effective detection over all samples. As an example, we compare the entropy detector found in [30], and the objective PD of 90% is obtained −2 dB below the simple entropy detector, while it is −9 dB below the entropy detector used in [35]. Figure 9 shows this comparison, where an improvement in PD for low SNR values between −2 dB and −9 dB compared with entropy values from the literature can be seen. The detection system appears to work better than a simple entropy detector in low SNR values, and it detects malicious PUE properly.

5.2. OFDM Experiments

We use an SDR to transmit and receive information with OFDM modulation similar to GMSK, and the learning process parameters are the same as those in Table 2.
The entropy calculated for the OFDM signal can be seen in Figure 10. The signal trend is similar to GMSK in terms of entropy. The first 50 samples are with the malicious PUE signal present, and the rest are with the PU signal present. The threshold is very close and here the SVM helps us to classify values under these conditions where a simple threshold will lead us to an error.
The SVM machine is implemented with these entropy values and the hyperplane and support vector are calculated by using the learning process, as can be seen in Figure 11. Notably, the margin is smaller than the GMSK signal. If a simple energy detector or entropy detector is used based on a threshold, the results will increase false alarm results, but with the SVM, the results are better for low SNR values and it is able to detect malicious PUE.
We apply the same process of GMSK, that is, we take 10,000 samples for different SNR and energy values with an objective PFA of 0.1 [28]. With these values, we measure the practical probability of detection as the times of effective detection over all samples. We compare these practical results with the entropy detector found in [30], and the objective PD of 90% is obtained −2 dB below the simple entropy detector. Figure 12 shows this comparison, where an improvement in PD for low SNR values compared with entropy values from the literature can be seen, which shows that the malicious PUE can be detected with high performance and effectiveness.

6. Discussion

The results show that the proposed method increases the probability of detection, working significantly better in OFDM than energy or entropy-based detectors when compared with previous work in [30,35,36,37]. The simulations were carried out with the same parameters as the literature, and the experimental results show that for low SNR, the system detects the signal for above 90% for −17.5 dB in GMSK and −11 dB for OFDM. We apply the complete process to 10,000 samples with different SNR and energy values, and the results show that the malicious PUE can be detected with high performance and effectiveness in low SNR values. Table 3 includes a comparison for the detection accuracy with the measure of probability of detection vs. SNR values.
The advantage of this proposal is that we do not need to calculate or measure the energy threshold or entropy threshold for the detection system. The learning process does not take too much time and it needs only 192 s to complete it one time. The computational complexity is intermediate in the learning process and low in the real-time decision, as the system averages the entropy and makes a decision based on the SVM hyperplane calculated in the learning process. If a new signal is required, we prepare the system for a new learning process and the algorithm process it automatically.

7. Conclusions

A malicious PUE detector was proposed based on an SVM with Rényi entropy analysis of energy received for an MCRN. The system was examined in an SDR scenario by using USRP NI-2922 configured with GMSK and OFDM modulations, and the expected results were simulated with Monte Carlo experiments in AWGN channels. The results show that for the two modulations, the probability of detection increases when compared with other detection techniques, without the dependence of a threshold such as energy or entropy techniques by themselves and with better results in low SNR values.
The results show that the SVM outperforms the energy detector method found in the literature by about 12 dB and the entropy method by about 3 dB. The influence of noise decreases due to the entropy calculation, which allows the system to detect PUE with lower SNR values. The system works in the two modulations, but it shows a better performance in OFDM systems where the threshold is hard to find, and it is dynamic in other detection techniques.
The SDR experiments show that the SVM for detection can be implemented in MCRN, and the learning process does not take a significant amount of time for one completion. After that, the system can detect malicious PUE in real-time without an excessive complexity for calculations and with a high probability of detection under lower SNR values.
Regarding future research, we suggest exploring the cooperative scenario in MCRN, where all users are in movement in an indoor scenario and an outdoor scenario.

Author Contributions

Methodology, software, and hardware: E.C.M.; experiment design: E.C.M., L.F.P.M., and J.E.O.T.; performed the experiments: E.C.M., L.F.P.M.; results analysis, review and editing of the paper: E.C.M., L.F.P.M. and J.E.O.T. All authors participated in the discussion and proofread the work. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Colciencias, grant number Doctorado Nacional 757. The APC was funded by Universidad Distrital Francisco José de Caldas, CIDC.

Acknowledgments

We express our gratitude to Colciencias, Universidad Distrital Francisco José de Caldas, Centro de Investigaciones y Desarrollo Científico (CIDC) and Universidad Nacional de Colombia for the founding of this Project.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhou, X.; Sun, M.; Li, G.Y.; Juang, B.-H.F. Intelligent wireless communications enabled by cognitive radio and machine learning. China Commun. 2018, 15, 16–48. [Google Scholar]
  2. Gupta, A.; Majumder, S. Cognitive Radio Spectrum Classification using FLA-SVM. In Proceedings of the 2019 9th Annual Information Technology, Electromechanical Engineering and Microelectronics Conference (IEMECON), Jaipur, India, 13–15 March 2019; pp. 144–149. [Google Scholar]
  3. Dabaghchian, M.; Alipour-Fanid, A.; Zeng, K.; Wang, Q.; Auer, P. Online Learning With Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks. IEEEACM Trans. Netw. TON 2018, 26, 2268–2281. [Google Scholar] [CrossRef] [Green Version]
  4. Yadav, K.; Roy, S.D.; Kundu, S. Enhanced Throughput Performance under Primary User Emulation Attack in Cognitive Radio Networks by Optimal Threshold Selection Approach. In Proceedings of the 2018 2nd International Conference on Electronics, Materials Engineering & Nano-Technology (IEMENTech), Kolkata, India, 4–5 April 2018; pp. 1–6. [Google Scholar]
  5. Muñoz, E.C.; Rodriguez-Colina, E.; Pedraza, L.F.; Paez, I.P. Detection of dynamic location primary user emulation on mobile cognitive radio networks using USRP. EURASIP J. Wirel. Commun. Netw. 2020, 2020, 1–19. [Google Scholar]
  6. Ma, X.; Ning, S.; Liu, X.; Kuang, H.; Hong, Y. Cooperative spectrum sensing using extreme learning machine for cognitive radio networks with multiple primary users. In Proceedings of the 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 12–14 October 2018; pp. 536–540. [Google Scholar]
  7. Ghanem, W.R.; Essam, R.; Dessouky, M. Proposed particle swarm optimization approaches for detection and localization of the primary user emulation attack in cognitive radio networks. In Proceedings of the 2018 35th National Radio Science Conference (NRSC), Cairo, Egypt, 20–22 March 2018; pp. 309–318. [Google Scholar]
  8. Mitola, J. Cognitive radio architecture evolution. Proc. IEEE 2009, 97, 626–641. [Google Scholar] [CrossRef]
  9. Cui, Y.; Jing, X.J.; Sun, S.; Wang, X.; Cheng, D.; Huang, H. Deep learning based primary user classification in cognitive radios. In Proceedings of the 2015 15th International Symposium on Communications and Information Technologies (ISCIT), Nara, Japan, 7–9 October 2015; pp. 165–168. [Google Scholar]
  10. Lu, Y.; Zhu, P.; Wang, D.; Fattouche, M. Machine learning techniques with probability vector for cooperative spectrum sensing in cognitive radio networks. In Proceedings of the 2016 IEEE Wireless Communications and Networking Conference, Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar]
  11. Thilina, K.M.; Choi, K.W.; Saquib, N.; Hossain, E. Machine learning techniques for cooperative spectrum sensing in cognitive radio networks. IEEE J. Sel. Areas Commun. 2013, 31, 2209–2221. [Google Scholar] [CrossRef]
  12. Sharma, V.; Bohara, V. Exploiting machine learning algorithms for cognitive radio. In Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, India, 24–27 September 2014; pp. 1554–1558. [Google Scholar]
  13. Tuberquia-David, L.M.; Cruz, L.; Hernández, C. Spectral Prediction: Approaches in Cognitive Radio Networks. Int. J. Appl. Eng. 2018, 13, 8051–8063. [Google Scholar]
  14. Pedraza, L.F.; Hernandez, C.A.; Rodriguez-Colina, E. Study of models to forecast the radio-electric spectrum occupancy. Indian J. Sci. Technol. 2016, 9, 1–19. [Google Scholar] [CrossRef] [Green Version]
  15. Albehadili, A.; Ali, A.; Jahan, F.; Javaid, A.Y.; Oluochy, J.; Devabhaktuniz, V. Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature (PDLS). In Proceedings of the 2019 Wireless Telecommunications Symposium (WTS), New York City, NY, USA, 9–12 April 2019; pp. 1–7. [Google Scholar]
  16. Tong, S.; Zhang, X.; Tong, Z.; Wu, Y.; Tang, N.; Zhong, W. Online Ash Fouling Prediction for Boiler Heating Surfaces based on Wavelet Analysis and Support Vector Regression. Energies 2020, 13, 59. [Google Scholar] [CrossRef] [Green Version]
  17. Arjoune, Y.; Kaabouch, N. A comprehensive survey on spectrum sensing in cognitive radio networks: Recent advances, new challenges, and future research directions. Sensors 2019, 19, 126. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  18. Karimi, A.; Taherpour, A.; Cabric, D. Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput under Rayleigh Flat Fading Channel. IEEE Trans. Inf. Forensics Secur. 2019, 15, 66–80. [Google Scholar] [CrossRef]
  19. Sureka, N.; Gunaseelan, K. Detection& Defense against Primary User Emulation Attack in Dynamic Cognitive Radio Networks. In Proceedings of the 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), Chennai, India, 14–15 March 2019; Volume 1, pp. 505–510. [Google Scholar]
  20. Bouabdellah, M.; Ghribi, E.; Kaabouch, N. RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks. In Proceedings of the 2019 IEEE International Conference on Electro Information Technology (EIT), Brookings, OR, USA, 20–22 May 2019; pp. 1–6. [Google Scholar]
  21. Vapnik, V.; Vapnik, V. Statistical Learning Theory; Wiley: New York, NY, USA, 1998; Volume 1. [Google Scholar]
  22. Bkassiny, M.; Li, Y.; Jayaweera, S.K. A survey on machine-learning techniques in cognitive radios. IEEE Commun. Surv. Tutor. 2012, 15, 1136–1159. [Google Scholar] [CrossRef]
  23. Cheng, G.; Tong, X. Fuzzy Clustering Multiple Kernel Support Vector Machine. In Proceedings of the 2018 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), Chengdu, China, 15–18 July 2018; pp. 7–12. [Google Scholar]
  24. Elaidi, H.; Elhaddar, Y.; Benabbou, Z.; Abbar, H. An idea of a clustering algorithm using support vector machines based on binary decision tree. In Proceedings of the 2018 International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, Morocco, 2–4 April 2018; pp. 1–5. [Google Scholar]
  25. Jin, F.; Varadharajan, V.; Tupakula, U. Improved detection of primary user emulation attacks in cognitive radio networks. In Proceedings of the 2015 International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia, 18–20 November 2015; pp. 274–279. [Google Scholar] [CrossRef]
  26. Yousef, E.M.; Soliman, H.Y.; Ghuniem, A.M. Sensing-Throughput tradeoff with primary user traffic and cooperative sensing in cognitive radio. In Proceedings of the 2017 2nd International Conference on Computer and Communication Systems (ICCCS), Krakow, Poland, 11–14 July 2017; pp. 121–127. [Google Scholar]
  27. Chandwani, N.; Jain, A.; Vyavahare, P.D. Throughput comparison for Cognitive Radio network under various conditions of primary user and channel noise signals. In Proceedings of the 2015 Radio and Antenna Days of the Indian Ocean (RADIO), Belle Mare, Mauritius, 21–24 September 2015; pp. 1–2. [Google Scholar]
  28. Zhang, Y.L.; Zhang, Q.Y.; Melodia, T. A frequency-domain entropy-based detector for robust spectrum sensing in cognitive radio networks. IEEE Commun. Lett. 2010, 14, 533–535. [Google Scholar] [CrossRef] [Green Version]
  29. Valverde-Albacete, F.J.; Peláez-Moreno, C. The Rényi Entropies Operate in Positive Semifields. Entropy 2019, 21, 780. [Google Scholar] [CrossRef] [Green Version]
  30. Muñoz, E.C.; Martínez, L.F.P.; Hernandez, C.A. Rényi Entropy-Based Spectrum Sensing in Mobile Cognitive Radio Networks Using Software Defined Radio. Entropy 2020, 22, 626. [Google Scholar] [CrossRef]
  31. Ettus, C. Building and Installing the USRP Open-Source Toolchain (UHD and GNU Radio) on Linux. Available online: https://kb.ettus.com/Building_and_Installing_the_USRP_Open-Source_Toolchain_(UHD_and_GNU_Radio)_on_Linux (accessed on 26 June 2020).
  32. Szymanski, P.; Kajdanowicz, T. Scikit-multilearn: A scikit-based Python environment for performing multi-label classification. J. Mach. Learn. Res. 2019, 20, 209–230. [Google Scholar]
  33. Cheema, A.A.; Salous, S. Spectrum Occupancy Measurements and Analysis in 2.4 GHz WLAN. Electronics 2019, 8, 1011. [Google Scholar] [CrossRef] [Green Version]
  34. Nijsure, Y.; Kaddoum, G.; Ghodoosipour, G.; Cai, G.; Wang, L. A novel spectrum sensing mechanism based on distribution discontinuity estimation within cognitive radio. In Proceedings of the 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, Canada, 18–21 September 2016; pp. 1–5. [Google Scholar]
  35. So, J. Entropy-based Spectrum Sensing for Cognitive Radio Networks in the Presence of an Unauthorized Signal. KSII Trans. Internet Inf. Syst. 2015, 9, 20–33. [Google Scholar]
  36. Charan, C.; Smriti. Double Threshold Based Cooperative Spectrum Sensing with Consideration of History of Sensing Nodes in Cognitive Radio Networks. In Proceedings of the 2018 2nd International Conference on Power, Energy and Environment: Towards Smart Technology (ICEPE), Shillong, India, 1–2 June 2018; pp. 1–9. [Google Scholar]
  37. Chen, C.; Chen, Y.; Qian, J.; Xu, J. Triple-Threshold Cooperative Spectrum Sensing Algorithm Based on Energy Detection. In Proceedings of the 2018 5th International Conference on Systems and Informatics (ICSAI), Nanjing, China, 10–12 November 2018; pp. 791–795. [Google Scholar]
Figure 1. Primary network (BTS), mobile cognitive radio network (MCRN) (cognitive base station—CBS), users and primary user emulation (PUE) attack.
Figure 1. Primary network (BTS), mobile cognitive radio network (MCRN) (cognitive base station—CBS), users and primary user emulation (PUE) attack.
Electronics 09 01282 g001
Figure 2. Proposed support vector machine (SVM) learning and classification process.
Figure 2. Proposed support vector machine (SVM) learning and classification process.
Electronics 09 01282 g002
Figure 3. Support vector machine (SVM) operation with two dimensions [22].
Figure 3. Support vector machine (SVM) operation with two dimensions [22].
Electronics 09 01282 g003
Figure 4. Software-defined radio (SDR) testbed for experiments.
Figure 4. Software-defined radio (SDR) testbed for experiments.
Electronics 09 01282 g004
Figure 5. SVM system flowchart.
Figure 5. SVM system flowchart.
Electronics 09 01282 g005
Figure 6. Average energy pattern for the Gaussian minimum shift keying (GMSK) signal.
Figure 6. Average energy pattern for the Gaussian minimum shift keying (GMSK) signal.
Electronics 09 01282 g006
Figure 7. Entropy of the received signal.
Figure 7. Entropy of the received signal.
Electronics 09 01282 g007
Figure 8. SVM with entropy with the GSMK signal.
Figure 8. SVM with entropy with the GSMK signal.
Electronics 09 01282 g008
Figure 9. Probability of detection with SVM vs. entropy for GMSK.
Figure 9. Probability of detection with SVM vs. entropy for GMSK.
Electronics 09 01282 g009
Figure 10. Entropy with and without of the orthogonal frequency division multiplexing (OFDM) signal.
Figure 10. Entropy with and without of the orthogonal frequency division multiplexing (OFDM) signal.
Electronics 09 01282 g010
Figure 11. SVM with entropy with the OFDM signal.
Figure 11. SVM with entropy with the OFDM signal.
Electronics 09 01282 g011
Figure 12. Probability of detection with SVM vs. entropy for OFDM.
Figure 12. Probability of detection with SVM vs. entropy for OFDM.
Electronics 09 01282 g012
Table 1. Device Parameters.
Table 1. Device Parameters.
DeviceCenter Frequency (MHz)Bandwidth (MHz)Noise Floor (dBm)Noise Figure (dB)Sensitivity (dBm)IDR (dB)
USRP292285020−1135−10550
RTLSDR8503.2−1023.5−97.520
Table 2. Learning process parameters.
Table 2. Learning process parameters.
ParameterValue
Number of Samples10,000 in total: 8750 samples for learning; 1250 for testing
Averaged Values350 samples for each signal-to-noise ratio (SNR) value
Noise SignalAdditive white Gaussian noise AWGN
ServicePhone Call
Frequency 831.8 MHz
Time of measurement1 s for each SNR value
Confidence Level95%
Margin of error5%
Table 3. Probability of detection vs. SNR values.
Table 3. Probability of detection vs. SNR values.
SNR ValueProposed SVMEntropy [30]Entropy [35]Energy [36]Energy [37]
−20 dB36%4%0%0%0%
−18 dB82%50%0%0%0%
−17.5 dB90%85%0%0%5%
−15.5 dB92%90%0%0%22%
−15 dB96%94%0%0%25%
−10 dB99%99%83%50%60%
−8.5 dB99%99%96%90%92%

Share and Cite

MDPI and ACS Style

Cadena Muñoz, E.; Pedraza Martínez, L.F.; Ortiz Triviño, J.E. Detection of Malicious Primary User Emulation Based on a Support Vector Machine for a Mobile Cognitive Radio Network Using Software-Defined Radio. Electronics 2020, 9, 1282. https://doi.org/10.3390/electronics9081282

AMA Style

Cadena Muñoz E, Pedraza Martínez LF, Ortiz Triviño JE. Detection of Malicious Primary User Emulation Based on a Support Vector Machine for a Mobile Cognitive Radio Network Using Software-Defined Radio. Electronics. 2020; 9(8):1282. https://doi.org/10.3390/electronics9081282

Chicago/Turabian Style

Cadena Muñoz, Ernesto, Luis Fernando Pedraza Martínez, and Jorge Eduardo Ortiz Triviño. 2020. "Detection of Malicious Primary User Emulation Based on a Support Vector Machine for a Mobile Cognitive Radio Network Using Software-Defined Radio" Electronics 9, no. 8: 1282. https://doi.org/10.3390/electronics9081282

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop