An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking
Radio environment maps (REM) are widely used to enhance communication efficiency in spatial spectrum sharing. This can be generated using reports from the terminals. However, an open characteristic environment always leads to a security problem; for example, when malicious terminals exist in the env...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9763038/ |
_version_ | 1818504745092907008 |
---|---|
author | Ying Gao Takeo Fujii |
author_facet | Ying Gao Takeo Fujii |
author_sort | Ying Gao |
collection | DOAJ |
description | Radio environment maps (REM) are widely used to enhance communication efficiency in spatial spectrum sharing. This can be generated using reports from the terminals. However, an open characteristic environment always leads to a security problem; for example, when malicious terminals exist in the environment and data falsification attacks occur, the accuracy of the REM is affected by the malicious action. In this study, we improve the double-layer monitor algorithm by optimizing the reward penalty function using a similarity comparison and sustainable monitor. The proposed algorithm can remove malicious terminal reports from the database to improve accuracy. Additionally, we propose a new algorithm involving interpolation based on spatial information to solve the problem of unequal information obtained from the meshes. By interpolation, a database can obtain sufficient datasets from each mesh. Furthermore, we defined an optimal attack strategy using the proposed security algorithm. The influence of malicious terminals can be the strongest among data falsification attacks; thus, we can check the performance more comprehensively. The simulation results indicate that the proposed method can eliminate the influence of malicious terminals and that a highly accurate REM can be obtained under massive malicious terminal attacks. |
first_indexed | 2024-12-10T21:41:20Z |
format | Article |
id | doaj.art-d9eaae62330c456a9a704e4114fb1daf |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-10T21:41:20Z |
publishDate | 2022-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-d9eaae62330c456a9a704e4114fb1daf2022-12-22T01:32:30ZengIEEEIEEE Access2169-35362022-01-0110455084552110.1109/ACCESS.2022.31704789763038An Improvement of Security Scheme for Radio Environment Map Under Massive AttackingYing Gao0https://orcid.org/0000-0002-8816-010XTakeo Fujii1https://orcid.org/0000-0002-7886-5560Advanced Wireless and Communication Research Center (AWCC), The University of Electro-Communications, Tokyo, JapanAdvanced Wireless and Communication Research Center (AWCC), The University of Electro-Communications, Tokyo, JapanRadio environment maps (REM) are widely used to enhance communication efficiency in spatial spectrum sharing. This can be generated using reports from the terminals. However, an open characteristic environment always leads to a security problem; for example, when malicious terminals exist in the environment and data falsification attacks occur, the accuracy of the REM is affected by the malicious action. In this study, we improve the double-layer monitor algorithm by optimizing the reward penalty function using a similarity comparison and sustainable monitor. The proposed algorithm can remove malicious terminal reports from the database to improve accuracy. Additionally, we propose a new algorithm involving interpolation based on spatial information to solve the problem of unequal information obtained from the meshes. By interpolation, a database can obtain sufficient datasets from each mesh. Furthermore, we defined an optimal attack strategy using the proposed security algorithm. The influence of malicious terminals can be the strongest among data falsification attacks; thus, we can check the performance more comprehensively. The simulation results indicate that the proposed method can eliminate the influence of malicious terminals and that a highly accurate REM can be obtained under massive malicious terminal attacks.https://ieeexplore.ieee.org/document/9763038/Radio environment mapradio propagation modelinterpolationwireless networkdata falsification attack |
spellingShingle | Ying Gao Takeo Fujii An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking IEEE Access Radio environment map radio propagation model interpolation wireless network data falsification attack |
title | An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking |
title_full | An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking |
title_fullStr | An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking |
title_full_unstemmed | An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking |
title_short | An Improvement of Security Scheme for Radio Environment Map Under Massive Attacking |
title_sort | improvement of security scheme for radio environment map under massive attacking |
topic | Radio environment map radio propagation model interpolation wireless network data falsification attack |
url | https://ieeexplore.ieee.org/document/9763038/ |
work_keys_str_mv | AT yinggao animprovementofsecurityschemeforradioenvironmentmapundermassiveattacking AT takeofujii animprovementofsecurityschemeforradioenvironmentmapundermassiveattacking AT yinggao improvementofsecurityschemeforradioenvironmentmapundermassiveattacking AT takeofujii improvementofsecurityschemeforradioenvironmentmapundermassiveattacking |