An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking

Radio environment maps (REM) are widely used to enhance communication efficiency in spatial spectrum sharing. This can be generated using reports from the terminals. However, an open characteristic environment always leads to a security problem; for example, when malicious terminals exist in the env...

Full description

Bibliographic Details
Main Authors: Ying Gao, Takeo Fujii
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9763038/
_version_ 1818504745092907008
author Ying Gao
Takeo Fujii
author_facet Ying Gao
Takeo Fujii
author_sort Ying Gao
collection DOAJ
description Radio environment maps (REM) are widely used to enhance communication efficiency in spatial spectrum sharing. This can be generated using reports from the terminals. However, an open characteristic environment always leads to a security problem; for example, when malicious terminals exist in the environment and data falsification attacks occur, the accuracy of the REM is affected by the malicious action. In this study, we improve the double-layer monitor algorithm by optimizing the reward penalty function using a similarity comparison and sustainable monitor. The proposed algorithm can remove malicious terminal reports from the database to improve accuracy. Additionally, we propose a new algorithm involving interpolation based on spatial information to solve the problem of unequal information obtained from the meshes. By interpolation, a database can obtain sufficient datasets from each mesh. Furthermore, we defined an optimal attack strategy using the proposed security algorithm. The influence of malicious terminals can be the strongest among data falsification attacks; thus, we can check the performance more comprehensively. The simulation results indicate that the proposed method can eliminate the influence of malicious terminals and that a highly accurate REM can be obtained under massive malicious terminal attacks.
first_indexed 2024-12-10T21:41:20Z
format Article
id doaj.art-d9eaae62330c456a9a704e4114fb1daf
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-10T21:41:20Z
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-d9eaae62330c456a9a704e4114fb1daf2022-12-22T01:32:30ZengIEEEIEEE Access2169-35362022-01-0110455084552110.1109/ACCESS.2022.31704789763038An Improvement of Security Scheme for Radio Environment Map Under Massive AttackingYing Gao0https://orcid.org/0000-0002-8816-010XTakeo Fujii1https://orcid.org/0000-0002-7886-5560Advanced Wireless and Communication Research Center (AWCC), The University of Electro-Communications, Tokyo, JapanAdvanced Wireless and Communication Research Center (AWCC), The University of Electro-Communications, Tokyo, JapanRadio environment maps (REM) are widely used to enhance communication efficiency in spatial spectrum sharing. This can be generated using reports from the terminals. However, an open characteristic environment always leads to a security problem; for example, when malicious terminals exist in the environment and data falsification attacks occur, the accuracy of the REM is affected by the malicious action. In this study, we improve the double-layer monitor algorithm by optimizing the reward penalty function using a similarity comparison and sustainable monitor. The proposed algorithm can remove malicious terminal reports from the database to improve accuracy. Additionally, we propose a new algorithm involving interpolation based on spatial information to solve the problem of unequal information obtained from the meshes. By interpolation, a database can obtain sufficient datasets from each mesh. Furthermore, we defined an optimal attack strategy using the proposed security algorithm. The influence of malicious terminals can be the strongest among data falsification attacks; thus, we can check the performance more comprehensively. The simulation results indicate that the proposed method can eliminate the influence of malicious terminals and that a highly accurate REM can be obtained under massive malicious terminal attacks.https://ieeexplore.ieee.org/document/9763038/Radio environment mapradio propagation modelinterpolationwireless networkdata falsification attack
spellingShingle Ying Gao
Takeo Fujii
An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking
IEEE Access
Radio environment map
radio propagation model
interpolation
wireless network
data falsification attack
title An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking
title_full An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking
title_fullStr An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking
title_full_unstemmed An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking
title_short An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking
title_sort improvement of security scheme for radio environment map under massive attacking
topic Radio environment map
radio propagation model
interpolation
wireless network
data falsification attack
url https://ieeexplore.ieee.org/document/9763038/
work_keys_str_mv AT yinggao animprovementofsecurityschemeforradioenvironmentmapundermassiveattacking
AT takeofujii animprovementofsecurityschemeforradioenvironmentmapundermassiveattacking
AT yinggao improvementofsecurityschemeforradioenvironmentmapundermassiveattacking
AT takeofujii improvementofsecurityschemeforradioenvironmentmapundermassiveattacking