{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:18:59Z","timestamp":1761743939181},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2014,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In cognitive radio networks, spectrum sensing data falsification (SSDF) attack is a crucial factor deteriorating the detection performance of cooperative spectrum sensing. In this paper, we propose and analyze a novel <jats:italic>probabilistic soft<\/jats:italic> SSDF attack model, which goes beyond the existing models for its generalization. Under this generalized SSDF attack model, we firstly obtain closed form expressions of global sensing performance at the fusion center. Then, we theoretically evaluate the performance of the proposed attack model, in terms of destructiveness and stealthiness, sequentially. Numerical simulations match the analytical results well. Last but not least, an interesting trade-off between destructiveness and stealthiness is discovered, which is a fundamental issue involved in SSDF attack, however, ignored by most of the previous studies.<\/jats:p>","DOI":"10.1186\/1687-6180-2014-81","type":"journal-article","created":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T11:01:40Z","timestamp":1401534100000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Performance analysis of probabilistic soft SSDF attack in cooperative spectrum sensing"],"prefix":"10.1186","volume":"2014","author":[{"given":"Linyuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qihui","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Guoru","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Shuo","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Jinlong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"648_CR1","volume-title":"Ph.D. Dissertation, KTH","author":"J Mitola","year":"2000","unstructured":"Mitola J: Cognitive radio: an integrated agent architecture for software defined radio. Ph.D. Dissertation, KTH 2000."},{"issue":"2","key":"648_CR2","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TWC.2012.122212.111638","volume":"12","author":"Q Wu","year":"2013","unstructured":"Wu Q, Ding G, Wang J, Yao YD: Spatial-temporal opportunity detection in spectrum-heterogeneous cogntive radio networks: two-dimensional sensing. IEEE Trans. Wireless Commun 2013, 12(2):516-526.","journal-title":"IEEE Trans. Wireless Commun"},{"issue":"2","key":"648_CR3","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s11277-011-0372-x","volume":"67","author":"H Rifa Pous","year":"2012","unstructured":"Rifa Pous H, Blasco MJ, Garrigues C: Review of robust cooperative spectrum sensing techniques for cognitive radio networks. Wireless Personal Commun 2012, 67(2):175-198. 10.1007\/s11277-011-0372-x","journal-title":"Wireless Personal Commun"},{"issue":"4","key":"648_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCOM.2008.4481340","volume":"46","author":"R Chen","year":"2008","unstructured":"Chen R, Park JM, Hou YT: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun. Mag 2008, 46(4):50-55.","journal-title":"IEEE Commun. Mag"},{"issue":"4","key":"648_CR5","first-page":"1806","volume":"60","author":"F Penna","year":"2012","unstructured":"Penna F, Sun Y, Dolecek L, Cabric D: Detecting and counteracting statistical attacks in cooperative spectrum sensing. IEEE Trans. Signal Process 2012, 60(4):1806-1822.","journal-title":"Signal Process"},{"key":"648_CR6","doi-asserted-by":"publisher","first-page":"3024","DOI":"10.1587\/transcom.E95.B.3024","volume":"9","author":"JN Yao","year":"2012","unstructured":"Yao JN, Wu Q, Wang J: Attacker detection based on dissimilarity of local reports in collaborative spectrum sensing. IEICE Trans. Commun. 2012, 9: 3024-3027.","journal-title":"IEICE Trans. Commun"},{"issue":"11","key":"648_CR7","doi-asserted-by":"publisher","first-page":"3554","DOI":"10.1109\/TWC.2010.091510.100315","volume":"9","author":"H Li","year":"2010","unstructured":"Li H, Han Z: Catch me if you can: an abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Trans. Wireless Commun 2010, 9(11):3554-3565.","journal-title":"IEEE Trans. Wireless Commun"},{"issue":"5","key":"648_CR8","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MSP.2013.2262116","volume":"30","author":"A Vempaty","year":"2013","unstructured":"Vempaty A, Tong L, Varshney P: Distributed inference with byzantine data: state-of-the-art review on data falsification attacks. IEEE Signal Process. Mag 2013, 30(5):65-75.","journal-title":"IEEE Signal Process. Mag"},{"key":"648_CR9","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/CICSyN.2011.51","volume-title":"IEEE Third International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN): 26\u201328 July 2011 (IEEE, Bali, 2011)","author":"F Farmani","year":"2011","unstructured":"Farmani F, Berangi R, MA Jannat-Abad: Detection of SSDF attack using SVDD algorithm in cognitive radio networks. IEEE Third International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN): 26\u201328 July 2011 (IEEE, Bali, 2011) 201-204."},{"issue":"10","key":"648_CR10","doi-asserted-by":"publisher","first-page":"1434","DOI":"10.1109\/TMC.2010.252","volume":"10","author":"AW Min","year":"2011","unstructured":"Min AW, Shin KG, Hu X: Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation. IEEE Trans. Mobile Comput 2011, 10(10):1434-1447.","journal-title":"IEEE Trans. Mobile Comput"},{"key":"648_CR11","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MSP.2013.2251071","volume":"30","author":"G Ding","year":"2013","unstructured":"Ding G, Wu Q, Yao YD, Wang JL, Chen YY: Kernel-based learning for statistical signal processing in cognitive radio networks: Theoretical foundations, example applications, and future directions. IEEE Signal Process. Mag 2013, 30: 126-136.","journal-title":"IEEE Signal Process. Mag"},{"issue":"5","key":"648_CR12","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/MSP.2012.2185911","volume":"29","author":"S Cui","year":"2012","unstructured":"Cui S, Han Z, Kar S, Kim TT, Poor H, Tajer A: Coordinated data-injection attack and detection in smart grid. IEEE Signal Process. Mag 2012, 29(5):106-115.","journal-title":"IEEE Signal Process. Mag"},{"key":"648_CR13","first-page":"1876","volume-title":"INFOCOM","author":"R Chen","year":"2008","unstructured":"Chen R, Park JM, Bian K: Robust distributed spectrum sensing in cognitive radio networks. INFOCOM 13-18 April 2008; Phoenix, AZ (IEEE, 2008), pp. 1876\u20131884"},{"key":"648_CR14","first-page":"1","volume-title":"IEEE Vehicular Technol.ogy Conference (VTC Spring)","author":"Y Han","year":"2012","unstructured":"Han Y, Chen Q, Wang JX: An enhanced DS theory cooperative spectrum sensing algorithm against SSDF attack. IEEE Vehicular Technol.ogy Conference (VTC Spring) 6\u20139 May 2012; Yokohama (IEEE, 2012), pp.1\u20135"},{"key":"648_CR15","first-page":"3406","volume-title":"IEEE International Conference on Communications","author":"P Kaligineedi","year":"2008","unstructured":"Kaligineedi P, Khabbazian M, Bhargava VK: Secure cooperative sensing techniques for cognitive radio systems. IEEE International Conference on Communications 19\u201323 May 2008; Beijing (IEEE, 2008), pp. 3406\u20133410"},{"key":"648_CR16","doi-asserted-by":"publisher","first-page":"3644","DOI":"10.1587\/transcom.E92.B.3644","volume":"12","author":"N Nguyen-Thanh","year":"2009","unstructured":"Nguyen-Thanh N, Koo I: A robust secure cooperative spectrum sensing scheme based on evidence theory and robust statistics in cognitive radio. IEICE Trans. Commun 2009, 12: 3644-3652.","journal-title":"IEICE Trans. Commun"},{"issue":"4","key":"648_CR17","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1109\/PROC.1967.5573","volume":"55","author":"H Urkowitz","year":"1967","unstructured":"Urkowitz H: Energy detection of unknown deterministic signals. Proc. IEEE 1967, 55(4):523-531.","journal-title":"Proc. IEEE"},{"issue":"3","key":"648_CR18","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/LCOMM.2010.03.092240","volume":"14","author":"K Zeng","year":"2010","unstructured":"Zeng K, Paweczak P, Cabric D: Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Commun. Lett 2010, 14(3):226-228.","journal-title":"IEEE Commun. Lett"}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-6180-2014-81.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-6180-2014-81\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-6180-2014-81.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T04:31:05Z","timestamp":1630557065000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-6180-2014-81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["648"],"URL":"https:\/\/doi.org\/10.1186\/1687-6180-2014-81","relation":{},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2 March 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"81"}}