14
1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing 1 Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing Wei Wang, Member, IEEE , Lin Chen, Member, IEEE , Kang G. Shin, Life Fellow, IEEE , Lingjie Duan, Member, IEEE Abstract—Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users (IMUs) adjust their malicious behaviors according to their objectives and the network’s defense schemes. Without long-term collection of information on users’ reputation, the existing schemes fail to thwart such malicious behaviors. In this paper, we construct a joint spectrum sensing and access framework to thwart the malicious behaviors of both rational and irrational IMUs. Lack of reputation information makes the malicious behavior resistance degrade performance since the honest users may be misjudged as IMUs. Based on the moral hazard principal-agent model, we design an incentive compatible mechanism to provide a moderate punishment to IMUs. Our findings show that neither spectrum sensing nor spectrum access alone can prevent malicious behaviors without any information on users’ reputation. According to the different properties of malicious behavior resistance by spectrum sensing and spectrum access, we employ joint spectrum sensing and access to optimally prevent the IMUs sensing falsification. The proposed malicious behavior resistance mechanism is shown to achieve almost the same performance as the ideal case with truthful sensing. Index Terms—Wireless security, cognitive radio, cooperative spectrum sensing, principal-agent model 1 I NTRODUCTION Over the past few years, cooperative spectrum sens- ing [2], [3] has been shown to offer significant perfor- mance gain in incumbent detection in cognitive radio (CR) networks [4], [5], [6]. Multiple secondary users (SUs) report their measurements of the signal strength from primary users (PUs) to a fusion center, which makes a final decision on the presence/absence of any licensed PU nearby. In cases where the sensing results are collected from the SUs without any prior information on users reputation, which is the case for many decentralized CR applications, even a small number of malicious users can sabotage cooperative spectrum sensing to significantly degrade the system performance or even paralyze the system. Malicious attacks in CR spectrum sensing can be categorized into two types, incumbent A part of this paper, focusing on the scenarios with only a single malicious user, was presented at IEEE INFOCOM 2014 [1], April 2014. This work was supported in part by National Natural Science Foun- dation of China (No. 61261130585), ANR under the grant Green- Dyspan (No. ANR-12-IS03), ARO (No. W81NF-12-1-0530), NSF (No. CNS-1160775), SUTD-ZJU Collaboration Research Grant (No. SUTD- ZJU/RES/03/2014) and Open Research Fund of State Key Laboratory of Integrated Services Networks (No. ISN13-08). Wei Wang is with Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China, and also with the State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China. (Email: [email protected]) Lin Chen is with Laboratoire de Recherche en Informatique (LRI), Uni- versity of Paris-Sud 11, Orsay 91405, France. (Email: [email protected]) Kang G. Shin is with Department of Electrical Engineering and Computer Science, The University of Michigan, Ann Arbor, MI 48109-2121, U.S.A. (Email: [email protected]) Lingjie Duan is with Engineering Systems and Design Pillar, Sin- gapore University of Technology and Design, Singapore. (Email: lingjie [email protected]) emulation and sensing data falsification [7]. Recently, several authentication schemes have been proposed to effectively cope with the incumbent emulation attack [8], [9]. We consider the latter type of malicious attacks in this paper. Specifically, we focus on the design of malicious behavior resistance (MBR) mechanisms to thwart the sensing data falsification attack. In contrast to most existing approaches that assume malicious behaviors to follow predefined profiles and then identify attack- ers based on such profiles, we consider more practical scenarios that involve various technical challenges: Challenges due to Intelligent Malicious Behav- iors: The design of MBR mechanisms in such a context is particularly challenging as an attacker can act strategically, rather than simply reporting erroneous sensing results to disrupt the final de- cision. We call such attackers intelligent malicious users (IMUs). IMUs can adjust their behavior adaptively to the system’s MBR mechanisms to maximize their own utilities, making MBR design and configuration difficult. Challenges due to Lack of Reputation Infor- mation: A widely adopted approach for mali- cious user detection is based on reputation, which maintains the reputation of each user based on the behavior history. However, reliable reputation information is not always available since well- established historical statistics may be too expen- sive or even unrealistic in a fast-changing CR environment. The lack of reputation information leads to possible errors in the judgement on

Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

1

Thwarting Intelligent Malicious Behaviors inCooperative Spectrum Sensing

Wei Wang, Member, IEEE , Lin Chen, Member, IEEE ,Kang G. Shin, Life Fellow, IEEE , Lingjie Duan, Member, IEEE

Abstract—Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligentmalicious users (IMUs) adjust their malicious behaviors according to their objectives and the network’s defense schemes. Withoutlong-term collection of information on users’ reputation, the existing schemes fail to thwart such malicious behaviors. In this paper,we construct a joint spectrum sensing and access framework to thwart the malicious behaviors of both rational and irrationalIMUs. Lack of reputation information makes the malicious behavior resistance degrade performance since the honest usersmay be misjudged as IMUs. Based on the moral hazard principal-agent model, we design an incentive compatible mechanismto provide a moderate punishment to IMUs. Our findings show that neither spectrum sensing nor spectrum access alone canprevent malicious behaviors without any information on users’ reputation. According to the different properties of maliciousbehavior resistance by spectrum sensing and spectrum access, we employ joint spectrum sensing and access to optimallyprevent the IMUs sensing falsification. The proposed malicious behavior resistance mechanism is shown to achieve almost thesame performance as the ideal case with truthful sensing.

Index Terms—Wireless security, cognitive radio, cooperative spectrum sensing, principal-agent model

F

1 INTRODUCTIONOver the past few years, cooperative spectrum sens-ing [2], [3] has been shown to offer significant perfor-mance gain in incumbent detection in cognitive radio(CR) networks [4], [5], [6]. Multiple secondary users(SUs) report their measurements of the signal strengthfrom primary users (PUs) to a fusion center, whichmakes a final decision on the presence/absence of anylicensed PU nearby.

In cases where the sensing results are collectedfrom the SUs without any prior information on usersreputation, which is the case for many decentralizedCR applications, even a small number of malicioususers can sabotage cooperative spectrum sensing tosignificantly degrade the system performance or evenparalyze the system. Malicious attacks in CR spectrumsensing can be categorized into two types, incumbent

A part of this paper, focusing on the scenarios with only a single malicioususer, was presented at IEEE INFOCOM 2014 [1], April 2014.This work was supported in part by National Natural Science Foun-dation of China (No. 61261130585), ANR under the grant Green-Dyspan (No. ANR-12-IS03), ARO (No. W81NF-12-1-0530), NSF (No.CNS-1160775), SUTD-ZJU Collaboration Research Grant (No. SUTD-ZJU/RES/03/2014) and Open Research Fund of State Key Laboratory ofIntegrated Services Networks (No. ISN13-08).Wei Wang is with Department of Information Science and ElectronicEngineering, Zhejiang University, Hangzhou 310027, China, and alsowith the State Key Laboratory of Integrated Services Networks, XidianUniversity, Xi’an 710071, China. (Email: [email protected])Lin Chen is with Laboratoire de Recherche en Informatique (LRI), Uni-versity of Paris-Sud 11, Orsay 91405, France. (Email: [email protected])Kang G. Shin is with Department of Electrical Engineering and ComputerScience, The University of Michigan, Ann Arbor, MI 48109-2121, U.S.A.(Email: [email protected])Lingjie Duan is with Engineering Systems and Design Pillar, Sin-gapore University of Technology and Design, Singapore. (Email:lingjie [email protected])

emulation and sensing data falsification [7]. Recently,several authentication schemes have been proposed toeffectively cope with the incumbent emulation attack[8], [9]. We consider the latter type of malicious attacksin this paper.

Specifically, we focus on the design of maliciousbehavior resistance (MBR) mechanisms to thwart thesensing data falsification attack. In contrast to mostexisting approaches that assume malicious behaviorsto follow predefined profiles and then identify attack-ers based on such profiles, we consider more practicalscenarios that involve various technical challenges:

• Challenges due to Intelligent Malicious Behav-iors: The design of MBR mechanisms in such acontext is particularly challenging as an attackercan act strategically, rather than simply reportingerroneous sensing results to disrupt the final de-cision. We call such attackers intelligent malicioususers (IMUs). IMUs can adjust their behavioradaptively to the system’s MBR mechanisms tomaximize their own utilities, making MBR designand configuration difficult.

• Challenges due to Lack of Reputation Infor-mation: A widely adopted approach for mali-cious user detection is based on reputation, whichmaintains the reputation of each user based onthe behavior history. However, reliable reputationinformation is not always available since well-established historical statistics may be too expen-sive or even unrealistic in a fast-changing CRenvironment. The lack of reputation informationleads to possible errors in the judgement on

Page 2: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

2

IMUs, thus degrading performance during MBR.Motivated by the above two design challenges,

we propose a principal-agent-based joint spectrumsensing and access framework to thwart the maliciousbehaviors of IMUs in CR networks. This paper makesthe following main contributions.

• Moral Hazard Principal-Agent Framework: Weconstruct a principal-agent framework [10] thatoffers IMUs incentives not to report falsified sens-ing results. Since the IMUs cannot be identifieddirectly, it is necessary to consider the risk ofmoral hazard [11] and design the punishmentbased on their sensing outcomes. We use exclu-sion of IMUs from cooperative spectrum sensingand access as a punishment for their maliciousbehaviors. Specifically, we model MBR with themoral hazard principal-agent framework and de-sign a spectrum sensing and access mechanismwith both the participation and the incentivecompatibility constraints.

• Optimal Joint Spectrum Sensing and AccessMechanism: Without any information on users’reputation, we find that joint spectrum sensingand access are required to thwart the maliciousbehaviors of both rational and irrational IMUs. Byanalyzing the resistance cost of MBR methods, wederive the conclusion that the MBR via spectrumsensing can provide an unlimited punishmentwith resistance cost, while the MBR via spectrumaccess provides a limited punishment withoutany resistance cost. We investigate the IMUs’ allpossible malicious behaviors depending on thepenalty factor, which is adopted to minimize theMBR cost. Based on the analysis, we proposeoptimal joint spectrum sensing and access mech-anisms that provide an appropriately moderateincentive to IMUs with the minimum resistancecost.

The rest of this paper is organized as follows.Section 2 introduces our system model and problemformulation and Section 3 models this problem asa principal-agent framework. Section 4 studies theoptimal MBR mechanisms against both types of IMUs.Section 5 evaluates the proposed MBR mechanisms bysimulation. Possible problem extensions are discussedin Section 6. The related work is discussed in Section7, and the paper concludes in Section 8.

2 COOPERATIVE SPECTRUM SENSINGMODEL IN THE PRESENCE OF MALICIOUSUSERS

We consider a generic model of CR networks consist-ing of a set N = {1, · · · , N} of SUs who opportunis-tically exploit the spectrum of PUs [12], [13]. PUs areencouraged to share unused spectrum with SUs andwould be compensated if the collision occurs between

PU and SU. Each SU is equipped with a sensor todiscover spectrum holes. The SUs’ sensing results arereported to a controller (e.g., base station or accesspoint) which uses the SUs’ sensing reports to makea final decision on the presence/absence of PUs andthen allocates the available spectrum to the SUs. Thisprocess is a sort of cooperative spectrum sensing thatcan increase sensing accuracy by eliminating sensingerrors due to hidden terminals and signal fading forcertain SUs.

Mathematically, the spectrum sensing at an individ-ual SU is characterized by the following hypothesistest:

Y =

{X + σ2 H1,

σ2 H0,(1)

where X is the strength of the primary signal sensedby an SU in the presence of a PU, σ2 is the power ofthe thermal noise, H0 and H1 are the hypotheses thatthe spectrum status is “0” (“1”) indicating the absence(presence) of any PU activity.

The performance of each SU’s spectrum sensoris characterized by the probability of misdetection,denoted as Pm, and the probability of false alarm,denoted as Pf . Formally, Pm and Pf can be expressedas:

Pm = Pr{S(i)0 |H1}, Pf = Pr{S(i)

1 |H0}, ∀i ∈ N (2)

where S(i)0 and S(i)

1 denote the individual sensingresult of SU i to be 0 and 1, respectively.

Let R(i)0 and R(i)

1 denote SU i reporting 0 and 1,respectively. The honest user reports his sensing resultto the controller, Pr(R(i)

0 |S(i)0 ) = Pr(R(i)

1 |S(i)1 ) = 1.

Considering the worst case, the IMUs cooperate witheach other and deliberately report a false sensingresult according to their malicious behavior ‘script’.The malicious behaviors are determined to maximizethe IMUs’ utility. Define M as the number of IMUs.We assume that the number of IMUs is much smallerthan that of honest users.

The controller’s decision is characterized by twohypotheses, denoted as H1 and H0, indicating thatthe decision of cooperative spectrum sensing is 1 and0, respectively. In this paper, we adopt the “OR”sensing rule, the simplest and most widely appliedcooperative sensing rule characterized by its stringentprotection on the PU activities [14]. Fig. 1 illustratesthe relationship among the spectrum status, the sens-ing results, the sensing reports and the controller’sdecision.

Unlike most existing approaches to cooperativesensing, here we focus on the design of a joint M-BR mechanism for final sensing decision and actualallocation of the sensed spectrum to each SU if thedecision is H0. Specifically, the joint MBR mechanismis denoted as ρ , (ρS , ρA), where ρS and ρA are thespectrum-sensing and the spectrum-access policies,respectively.

Page 3: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

3

Spectrum

status is 0

Sensing

result is 0

Sensing

report is 0

Spectrum

status is 1

Sensing

result is 1

Sensing

report is 1

1-Pf

1-Pm

Pf

Pm

Controller's

decision is 0

Controller's

decision is 1

Malicious misreporting

Fig. 1. Cooperative spectrum sensing model with malicious behaviors

To compensate the PU performance degradationcaused by the PU-SU collision and provide economicincentives to PUs for spectrum sharing, a penalty [15],[16] would be imposed on the SU system. Let α bethe penalty factor of PU–SU collision, capturing thetradeoff between the SU throughput and the impacton the PU system. If all SUs follow the controller’sspectrum-access policy and a collision occurs, all ofthem are responsible and share the ensuing penalty;otherwise, the penalty is imposed on the particularSU who violates the controller’s allocation policy.

The controller acts on behalf of all SUs and needsto choose an appropriate joint spectrum sensing andaccess policy ρ so as to maximize the aggregate ex-pected utility of all honest SUs in sharing the licensedspectrum. Here, we normalize the total spectrum ben-efit to be 1. The problem can then be formulated as

maxρ

U(ρ) = (1− θ(ρ))(Pr(H0H0)− αPr(H1H0)) (3)

where θ(ρ) is the ratio of the spectrum allocatedto the IMUs to the total sensed spectrum holes un-der the policy ρ, Pr(H0H0) is the probability thatthe controller successfully identifies a spectrum hole,Pr(H1H0) is the probability that the controller falselydecides on the absence of PU activity, although a PUis active. Note that the probability of the controller’sdecision H0 depends on the spectrum-sensing policyρS .

3 PRINCIPAL-AGENT-BASED MALICIOUSBEHAVIOR RESISTANCE BY SPECTRUMSENSING AND ACCESS

To motivate all users to report their sensing result-s honestly, we model secure cooperative spectrumsensing using the moral hazard principal-agent model[10][11], where the “principal” is the controller thatmakes the final sensing decision and then allocatesthe available spectrum to the SUs, and the “agents”are the SUs to sense the spectrum. The “moral hazard”arises in the framework, since the SUs may havean incentive to misreport the sensing results if theinterests of the agent and the principal are not aligned.The controller does not know whether a user reports

the information different from his true sensing result,and can only observe the final reported results, i.e.,the actions of the users are hidden from the controller.Based on the malicious behavior analysis and theprincipal-agent framework, we would like to designMBR mechanisms to thwart the malicious behaviorsof IMUs.

3.1 Malicious Behavior AnalysisThere are various attack strategies that the IMUs canlaunch, depending on their objectives. So, these attackstrategies, captured by the corresponding models,may differ in effectiveness, and may also call fordifferent defense strategies. We investigate two typicalIMUs in this paper according to their motivation.

1) Rational IMU: The rational IMUs aim to maxi-mize their own utilities, which is the most com-mon case.

2) Irrational IMU: The irrational IMUs aim to causethe most damage possible to the system, whichis the worse case.

Both are assumed to have the information of the un-derlying MBR mechanism and adjust their behaviorsintelligently.

For the rational IMUs, the objective is to maximizetheir effective spectrum resource, which is defined asthe accessible spectrum minus the imposed penalty.Note that the rational IMUs may tolerate a higher costfor malicious behaviors than the honest users. We useη ∈ (0, 1] as the coefficient of the penalty tolerance forrational IMUs, i.e., the penalty weights for rationalIMUs are αη. The objective can be written as

maxA

u(A,ρ), (4)

where A is the IMUs’ behaviors. The utility u(A,ρ)can be achieved in two cases. First, the rational IMUsutilize the allocated channel resource when the con-troller’s decision is H0. Second, the rational IMUsoccupy the channel when the controller’s decision isH1.

For the irrational IMUs, the objective is to minimizethe system utility defined in Eq. (3):

minA

U(A,ρ). (5)

Page 4: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

4

Besides the above two cases similar to the rationalIMUs, the irrational IMUs have an extra case, whichincreases the penalty to the system caused by PU–SU collision by cheating from S1 to R0. The irrationalIMUs do not utilize the channel to transmit data sothat the penalty to a single user can be avoided.

The utilities achieved by the rational and irrationalIMUs with different sensing and reporting results areprovided in [1].

3.2 The Principal-Agent FrameworkThe principal-agent model [10][11] is an efficient wayto motivate the agent to act on behalf of the principal.We consider the following key components of coop-erative spectrum sensing in the presence of IMUs inthe principal-agent framework.

• Agents’ actions: The IMUs will report their sensingresults correctly or incorrectly, which correspondto the high- and low-effort actions, respective-ly, in the principal-agent model, denoted by Ah

(honest report) and Am (malicious report). Obvi-ously, the controller would like to incentivize theusers to choose Ah.

• Cost of agents: Actions Ah and Am will respec-tively incur costs Ch and Cm to the agents. Forthe honest action Ah, the corresponding Ch = 0.With the malicious action Am, the IMUs couldachieve the benefit of sensing falsification. Thefalsification benefit of IMUs when choosing Am

is set as a negative cost, i.e., Cm < 0.• Utility of agents: If the controller acquires a spec-

trum hole successfully, it will allocate the holeto the user, which is considered as a paymen-t/reward. The user i’s utility ui is the sum of thereceived payment from the controller and its cost.

• The principal’s return: By collecting the sensingresults from SUs, the controller makes a finaldecision on the presence/absence of PUs. If anavailable spectrum opportunity is discovered, theutilized spectrum resource is the return of theprincipal. On the other hand, if the controllermakes a wrong decision and generates collisionwith PUs, its return would be negative, a penaltyby the PU system.

• Utility of the principal: The system utility U isthe sum of the utilities of all honest users, asexpressed in Eq. (3). It can also be calculated bythe return minus the spectrum resource allocatedto the IMUs.

Remark 1 (Moral Hazard): There exists “moral haz-ard” since the actions of IMUs are hidden from thecontroller. In this case, the IMUs may misreport thesensing results if the interests of the agent and theprincipal are not aligned. Therefore, it is necessaryto design MBR mechanisms based on the sensingoutcome to thwart malicious behaviors, i.e., avoidingthe risk of moral hazard.

3.3 How to Thwart Malicious Behaviors?In the principal-agent model, an MBR strategy shouldsatisfy the following two essential constraints.

• Participation constraint: The principal provides anon-negative expected utility to the agents, i.e.,ui(Ah) ≥ 0, ∀i.

• Incentive compatibility constraint: The agentachieves a higher expected utility when it obeysthe principal’s policy than that when it doesnt,i.e., ui(Ah) ≥ ui(Am),∀i.

Here we establish two basic structural properties ofthe principal-agent model in cooperative sensing inthe presence of IMUs and provide some insights inhow to thwart them.

Considering the participation constraints of all hon-est users, we can obtain the following lemmas.

Lemma 1: A necessary condition for the N -user sec-ondary system with M IMUs to access the spectrumis that the penalty factor α for the PU–SU collisionshould satisfy

α ≤ Pr(H0)

Pr(H1)

(1− Pf

Pm

)N−M

. (6)

Proof: The participation constraint should be metto guarantee the honest users to participate in sharingspectrum with PUs, i.e., let ui ≥ 0 for all honest usersi. The system utility U ≥ 0 if the utilities of all honestusers are positive. In other words, U ≥ 0 is a necessarycondition of ui ≥ 0 for all honest users i.

U = Pr(H0H0)− αPr(H1H0). (7)

Let’s consider the best case when the sensing resultsfrom IMUs are just ineffective but do not cause neg-ative effects, then the system utility is

U = Pr(H0)(1− Pf )N−M − αPr(H1)P

N−Mm ≥ 0. (8)

Since the above equation shows the utility of the bestcase, the equation is a necessary condition of U ≥ 0.Therefore, the lemma holds.

Lemma 2: To protect the PU system, the lowerbound of the penalty factor α should be

α >Pr(H0)

ηPr(H1). (9)

Proof: To prevent the SUs’ unbridled access, thePU system always adjusts the penalty factor to pre-vent the IMU who transmits data without spectrumsensing. The participation constraint of this type ofusers need not be satisfied, i.e.,

u = Pr(H0)− αηPr(H1) < 0, (10)

so the lemma holds.Remark 2 (Feasible Region of α): The above two lem-

mas provide upper and lower bounds for the penaltyfactor α from the PU system’s perspective. The PUsare encouraged to share their spectrum with SUs,but might not allow the SUs to access the spectrum

Page 5: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

5

without sensing. These bounds provide a feasibleregion of α, which is an important basis for the SUsystem to design the MBR mechanisms.

Since the controller regards those users who report-ed minority results as suspicious, it has the followingtwo mechanisms to cope with IMUs and provide theincentives, which will be investigated in the analysisthat follows.

• MBR via Spectrum Sensing ρS (MBR-S): The con-troller excludes the sensing results reported bysuspicious users with probability ωS .

• MBR via Spectrum Access ρA (MBR-A): The con-troller does not allocate the spectrum access op-portunity to suspicious users with probabilityωA. Other users with the access right share thespectrum equally.

Note that ωS and ωA are the aggregate exclusionprobabilities over multiple time slots, so they couldbe larger than 1, e.g., ωS = 2 indicates that the sensingresults of the suspicious users would be excluded inthe following two time slots.

Remark 3 (Agent/Resistence Cost): To thwart the ma-licious behaviors, the controller using MBR wouldpossibly classify some honest users as malicious false-ly and exclude them from cooperative sensing becauseof the existence of moral hazard. Thus, the controllersuffers the agent/resistance cost, i.e., degrading thenetwork performance.

In the proposed MBR mechanism, besides usingspectrum access to adjust the payments, we use spec-trum sensing to adjust the cost of a malicious agent,which is different from the classic principal-agentmodel, in which the cost does not change with theprincipal’s mechanism.

4 OPTIMAL JOINT SPECTRUM SENSINGAND ACCESS FOR MALICIOUS BEHAVIORRESISTANCEIn this section, we design the optimal joint spectrumsensing and access mechanisms for MBR against ra-tional and irrational IMUs. Our basic idea is to satisfythe incentive compatibility constraint and motivatethe IMUs to report the sensing results honestly withthe minimum resistance cost by an appropriatelymoderate incentive. Thus, the SU system can thwartthe malicious behaviors successfully and achieve themaximal system utility. The user index i is omittedfor simplicity of presentation.

4.1 Thwarting Rational IMUsBased on the malicious behavior analysis in [1], itis possible for the rational IMUs to achieve a largerutility by misreporting R1 when the sensing result isS0. The probability of spectrum status when the actualsensing result is S0, can be calculated as

Pr(H0|S0) =Pr(H0)(1− Pf )

M

Pr(H0)(1− Pf )M + Pr(H1)PMm

(11)

Pr(H1|S0) =Pr(H1)P

Mm

Pr(H0)(1− Pf )M + Pr(H1)PMm

. (12)

We investigate the case without MBR to analyze thenecessity of MBR.

Lemma 3: Without any MBR mechanism, if thepenalty factor α satisfies

α <Pr(H0)(1− Pf )

M (1− (1− Pf )N−MM/N)

Pr(H1)PMm (1− PN−M

m M/N)η, (13)

the rational IMUs always report 1 when the sensingresult is 0.

Proof: If the rational IMUs report honestly withthe sensing result of 0, the expected utility is

u(Ah) =Pr(H0|S0)(1− Pf )N−MM/N

− Pr(H1|S0)PN−Mm αηM/N. (14)

If the rational IMUs misreport from S0 to R1, with-out MBR, the final sensing decision is 1. The expectedutility of the rational IMUs to transmit data is

u(Am) = Pr(H0|S0)− Pr(H1|S0)αη. (15)

The rational IMUs would misreport the sensingresult when the expected utility of misreporting islarger than that of honest reporting. Using the abovetwo equations, we derive the condition of α.

If α satisfies Eq. (13), we need to design an MBRmechanism to prevent the malicious behaviors. Letu(A,ρ) denote the rational IMUs’ utility achievedwith the MBR mechanism ρ. The goal of MBR mech-anism ρ is to make the expected utility of reportingtrue sensing results larger than that of reporting falseresults, i.e., u(Ah,ρ) ≥ u(Am,ρ). We first consider thetwo types of MBR mechanism separately.

By adopting MBR-S, the controller excludes thereported result with probability ωS . It is possiblefor the controller to misclassify some honest usersas suspicious ones, affecting the number of effectiveusers in cooperative spectrum sensing. The expectednumber of excluded users is estimated to be:

NS = (Pr(H0)Pf + Pr(H1)Pm) (N −M)ωS . (16)

Let ωi(t) be the exclusion probability in MBR-Sfor SU i at time slot t, and M be the set of theIMUs who make falsified reports of sensing results.The following lemma deals with the allocation ofexclusion probability over time for a given aggregateexclusion probability.

Lemma 4: Given an aggregate exclusion probabilityωS , different exclusion probability distributions ωi(t)achieve the same total utility for the rational IMUs.

Proof: If the rational IMUs cheat from 0 to 1, withthe exclusion probability ωi(t), the expected utility of

Page 6: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

6

the rational IMUs in the current slot is

u(Am, (ωS , 0))

=Pr(H0|S0)

(∏i∈M

ωi(t)(1− Pf )N−NS−MM/N

+(1−∏i∈M

ωi(t)(1− Pf )N−NS−M )

)

− Pr(H1|S0)

(∏i∈M

ωi(t)PN−NS−Mm αηM/N

+(1−∏i∈M

ωi(t)PN−NS−Mm )αη

). (17)

Since the system does not have the information onwhich SUs are IMUs, i.e., the system does not knowM, it is impossible for the system to jointly allo-cate the exclusion probabilities of different SUs tominimize u(Am, (ωS , 0)). Treating each SU separately,we can find from the above equation that the utilityfunction is linear with respect to ωi(t) for a given i.Thus, given an aggregate exclusion probability ωS , theexclusion probability distribution over time does notaffect the performance of MBR.

The following lemma shows that MBR-S only isineffective in thwarting malicious behaviors.

Lemma 5: MBR-S alone cannot prevent the rationalIMUs’ malicious behaviors.

Proof: With MBR-S only, the utility of rationalIMUs for reporting honestly is

u(Ah, (ωS , 0)) =Pr(H0|S0)(1− Pf )N−NS−MM/N

− Pr(H1|S0)PN−NS−Mm αηM/N. (18)

Because of the participation constraints of SUs,u(Ah, (ωS , 0)) should be larger than 0. When thepenalty factor α satisfies Lemma 3, u(Am, (ωS , 0)) islarger than u(Ah, (ωS , 0)) for small ωS , and thus largerthan 0.

From Eq. (17), u(Am, (ωS , 0)) is a monotonouslyincreasing function of ωi(t). when u(Am, (ωS , 0)) > 0,its minimum is achieved when ωi(t) = 1 for all SUs.Comparing Eqs. (17) and (18), the following inequalityholds:

u(Ah, (ωS , 0)) ≤ u(Am, (ωS , 0)). (19)

Both sides of this inequality are equal only if ωi(t) = 1,∀i.

In this case, a suspicious user would be excludedforever from the cooperative spectrum sensing, ωS →+∞. However, this is not practical since it would alsoexclude honest users due to their sensing errors.

Obviously, the rational IMUs’ utility decreases asthe aggregate exclusion probability ωS increases be-cause its reported result is ignored. With a largeenough ωS , the malicious behaviors can be prevented.However, the MBR-S mechanism also reduces thesystem utility because some results reported from

honest users are ignored, which is considered as theresistance cost.

Lemma 6: The upper bound of ωS in the MBR-Smechanism is

ωS <N −M − log 1−Pf

Pm

αPr(H1)Pr(H0)

(Pr(H0)Pf + Pr(H1)Pm) (N −M). (20)

Proof: With MBR-S, the system utility is:

U =N −M

N

(Pr(H0)(1− Pf )

N−NS−M

−αPr(H1)PN−NS−Mm

). (21)

The upper bound of ωS should be satisfied to ensurethat the system utility is positive. Therefore, Eq. (20)follows.

Using MBR-A only, the controller reduces the prob-ability of allocating the spectrum resource to thesuspicious user.

Lemma 7: MBR-A alone cannot prevent the rationalIMUs’ malicious behaviors.

Proof: If the aggregate exclusion probability ωA inMBR-A is large enough, the sensed spectrum holeswould not be allocated to IMUs. Without MBR-S,the rational IMUs can occupy all the spectrum holesfor transmission by reporting “1” irrespective of thesensing results, so the system has no chance to allocatethe spectrum. With MBR-A only, the rational IMUs’utilities for honest and malicious reports are

u(Ah, (0, ωA)) =Pr(H0|S0)(1− Pf )N−MM/N

− Pr(H1|S0)PN−Mm αηM/N, (22)

u(Am, (0, ωA)) = Pr(H0|S0)− Pr(H1|S0)αη. (23)

The condition of rational IMUs’ malicious reportingis

u(Ah, (0, ωA)) < u(Am, (0, ωA)), (24)

which can be rewritten as

α <Pr(H0|S0)(1− (1− Pf )

N−MM/N)

Pr(H1|S0)(1− PN−Mm M/N)η

. (25)

It is always satisfied by Lemma 3.Based on Lemmas 5 and 7, neither MBR-S nor MBR-

A alone can prevent the rational IMUs’ maliciousbehaviors. Therefore, it is necessary to adopt bothMBR-S and MBR-A to design a joint spectrum sensingand access mechanism.

Although the aggregate exclusion probability ωA

of MBR-A could be large, it should be consideredonly for a few slots because the rational IMUs cancontinue to misreport the sensing result and transmitdata, possibly achieving more utility than the pun-ishment. Here, we consider the case when the IMUsare cooperative and one of them is selected randomlyto misreport the sensing results. Define ωS(t) as theaverage exclusion probability in MBR-S of the IMUsat time slot t. Note that we cannot calculate ωS(t) byaveraging ωi(t) for all IMUs, since the system does

Page 7: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

7

not have the information of the set of IMUs. Instead,we obtain ωS(t) as follows.

According to Lemma 4, different exclusion proba-bility distributions ωS(t) would not change the pun-ishment. Without loss of generality, we set the sameexclusion probability ωS(t) for each time slot. Giventhe aggregate exclusion probability ωS for one-timemalicious behavior, ωS(t) can be calculated as

ωS(t) = ωS Pr(S0R1H1)/M. (26)

where Pr(S0R1H1) is the probability of the rationalIMUs’ malicious behaviors.

Adopting MBR-A can reduce the rational IMUs’utility when the spectrum hole is discovered. Al-though MBR-A also excludes some honest users fromspectrum access, all the honest users have the sameexclusion probability, so no resistance cost is causedby MBR-A.

Remark 4 (Properties of MBR-S and MBR-A): Basedon the above analysis, we conclude that thepunishment by MBR-S could be infinite, whilethat by MBR-A is upper-bounded. However, MBR-Aapplies the punishment without any resistance cost.

According to these properties, we set ωA to be largeenough since MBR-A incurs no resistance cost butits punishment is upper-bounded. To achieve a lowresistance cost, the optimal ωS is set to adjust thepunishment level so that the expected utilities forhonest and malicious reports are the same. Thus, wepropose a MBR mechanism for thwarting the rationalIMUs as Algorithm 1.

Algorithm 1 Optimal MBR Mechanism for RationalIMUs1) MBR-S: ωS is searched to satisfy

Pr(H0H0)M/N = Pr(S0R1H1)∆u(S0R1H1), (27)

where Pr(H0H0) = Pr(H0)ωS(t)(1 − Pf )N−NS−M ,

Pr(S0R1H1) = (Pr(H0)(1 − Pf )M + Pr(H1)P

Mm )(1 −

ωS(t)(1 − Pf )N−NS−M ), and ∆u(S0R1H1) is the ra-

tional IMUs’ expected utility of misreporting. Here,∆u(S0R1H1) = 1.2) MBR-A: ωA is set as

ωA =⌈Pr(H0)ωS(1− Pf )

N−NS−M/M⌉, (28)

where ⌈·⌉ is the ceiling operation.

4.2 Thwarting Irrational IMUs

The irrational IMUs’ utility conflicts with the systemutility. It is difficult to provide the irrational IMUs aneffective incentive based on the classic principal-agentmodel. Fortunately, in our problem, the cost Cm formalicious reports depends on the MBR mechanism,which is different from the classical principal-agentmodel. This difference makes it possible to design

a MBR mechanism to prevent the irrational IMUs’malicious behaviors.

The basic idea of the optimal MBR mechanism forirrational IMUs is similar to that for rational IMUs, butthere exist some differences because of thier differentobjectives. Also, the irrational IMUs can cheat fromS0 to R1 and from S1 to R0.

Lemma 8: Without any MBR mechanism, the irra-tional IMUs always report 1 when the sensing resultis 0. It reports 0 when the sensing result is 1 if thepenalty factor α satisfies

α >Pr(H0)(1− Pf )

N−M (1− (1− Pf )M )

Pr(H1)PN−Mm (1− PM

m ). (29)

Proof: Without MBR, the irrational IMUs’ utilityfor honest reporting when the sensing result is 0, is

u(Ah) =Pr(H0|S0)((1− Pf )

N−M M

N

+ (1− (1− Pf )N−M )

)+ Pr(H1|S0)P

N−Mm α

N −M

N. (30)

The utility for cheating from 0 to 1 is

u(Am) = Pr(H0|S0). (31)

The irrational IMUs report honestly when

α >Pr(H0)(1− Pf )

N

Pr(H1)PNm

(32)

which conflicts with Lemma 1, so the irrational IMUs’report will always cheat from 0 to 1 in the absence ofMBR.

The irrational IMUs’ utility for honestly reportingwhen the sensing result is 1 is calculated as

u(Ah) = Pr(H0|S1), (33)

while that for cheating is

u(Am) =Pr(H0|S1)((1− Pf )

N−M M

N

+ (1− (1− Pf )N−M )

)+ Pr(H1|S1)P

N−Mm α

N −M

N. (34)

The condition of cheating is

α >Pr(H0|S1)(1− Pf )

N−M

Pr(H1|S1)PN−Mm

. (35)

The conditional probabilities are

Pr(H0|S1) =Pr(H0)(1− (1− Pf )

M )

Pr(H0)(1− (1− Pf )M ) + Pr(H1)(1− PMm )

,

(36)

Pr(H1|S1) =Pr(H1)(1− PM

m )

Pr(H0)(1− (1− Pf )M ) + Pr(H1)(1− PMm )

.

(37)According to the the above conditional probabilities,the condition of cheating can be rewritten as Eq. (29)and the lemma holds.

Page 8: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

8

The following lemma discusses the allocation ofexclusion probability over time for a given aggregateexclusion probability, which is similar to that forrational IMUs. The difference is that both types ofmalicious behavior in Lemma 8 should be consideredfor irrational IMUs. Note that the utility u of irrationalIMUs is also different from its definition for rationalIMUs.

Lemma 9: Given an aggregate exclusion probabilityωS , different exclusion probability distributions ωS(t)achieve the same total utility for the irrational IMUs.

Proof: If the irrational IMUs cheat only when thesensing results are 0, with the exclusion probabilityωi(t), the expected utility of the irrational IMUs inthe current slot is

u(Am, (ωS , 0))

=Pr(H0S0)( ∏

i∈M

ωi(t)(1− Pf )N−NS−MM/N

+ (1−∏i∈M

ωi(t)(1− Pf )N−NS−M )

)+ Pr(H1S0)

(∏i∈M

ωi(t)PN−NS−Mm α(N −M)/N

).

(38)

If the irrational IMUs would cheat from 0 to 1 andfrom 1 to 0, the expected utility in the current slot iswritten as (39).

Similar to the situation of rational IMUs, we canfind that the utility function is linear in ωi(t) fora given i for both types of malicious behavior ofirrational IMUs in Lemma 8 by treating each SUseparately. Therefore, this lemma holds.

Now, we show that neither MBR-S nor MBR-Aalone can prevent the irrational IMUs’ malicious be-haviors effectively.

Lemma 10: MBR-S alone cannot prevent the irra-tional IMUs’ malicious behaviors.

Proof: If the irrational IMUs cheat only when thesensing results are 0, with MBR-S only, the utility ofirrational IMUs for reporting honestly is

u(Ah, (ωS , 0)) =Pr(H0S0)((1− Pf )

N−NS−MM/N

+ (1− (1− Pf )N−NS−M )

)+ Pr(H1S0)P

N−NS−Mm α(N −M)/N.

(40)

Comparing Eqs. (38) and (40), u(Ah, (ωS , 0)) =u(Am, (ωS , 0)) is satisfied only when ωi(t) = 1 for allSUs.

u(Ah, (ωS , 0)) ≤ u(Am, (ωS , 0)). (41)

If ωi(t) = 1 for all SUs at all time, a suspicioususer would be excluded forever from the cooperativespectrum sensing, ωS → +∞. However, this is notpractical since it would also exclude honest users dueto their sensing errors. Therefore, it is always satisfiedthat

u(Ah, (ωS , 0)) < u(Am, (ωS , 0)). (42)

If the irrational IMUs would cheat from 0 to 1 andfrom 1 to 0, with MBR-S only, the utility of irrationalIMUs for reporting honestly is written as (43).

Comparing Eqs. (39) and (43), the first and thirdterms are the same as those for the cases with onlycheating from 0 to 1. Since 0 ≤ ωi(t) ≤ 1, the secondterm of Eq. (43) is also equal to or less than that ofEq. (39). Therefore, it is satisfied that u(Ah, (ωS , 0)) <u(Am, (ωS , 0)).

Lemma 11: MBR-A alone cannot prevent the irra-tional IMUs’ malicious behaviors when

α >N

N −M

Pr(H0)(1− Pf )N−M (1− (1− Pf )

M )

Pr(H1)PN−Mm (1− PM

m )(44)

Proof: If the aggregate exclusion probability ωA inMBR-A is large enough, the sensed spectrum holeswould not be allocated to IMUs. Without MBR-S,the rational IMUs can occupy all the spectrum holesfor transmission by reporting “1” irrespective of thesensing results, so the system has no chance to allocatethe spectrum.

If the irrational IMUs cheat only when the sensingresults are 0, with MBR-A only, the irrational IMUs’utilities for honest and malicious reports are

u(Ah, (0, ωA))

=Pr(H0S0)(1− Pf )

N−MM/N + (1− (1− Pf )N−M )

)+ Pr(H1S0)P

N−Mm α(N −M)/N, (45)

u(Am, (0, ωA)) = Pr(H0S0). (46)

The condition of the irrational IMUs’ malicious report-ing is

u(Ah, (0, ωA)) < u(Am, (0, ωA)), (47)

which can be rewritten as

αPr(H1)PNm < Pr(H0)(1− Pf )

N . (48)

According to Lemma 1, the irrational IMUs wouldmisreport their sensing results.

If the irrational IMUs would cheat from 0 to 1 andfrom 1 to 0, with MBR-A only, the irrational IMUs’utilities for honest and malicious reports are

u(Ah, (0, ωA))

=Pr(H0S0)(1− Pf )

N−MM/N + (1− (1− Pf )N−M )

)+ Pr(H0S1) + Pr(H1S0)P

N−Mm α(N −M)/N, (49)

u(Am, (0, ωA))

=Pr(H0S0) + Pr(H0S1)(1− (1− Pf )N−M )

+ Pr(H1S1)PN−Mm α(N −M)/N. (50)

For the parts with S0, i.e., the first and third terms ofu(Ah, (0, ωA)) and the first term of u(Am, (0, ωA)), theanalysis is similar to that of the previous cases withcheating only when the sensing results are 0. For the

Page 9: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

9

u(Am, (ωS , 0)) =Pr(H0S0)

(∏i∈M

ωi(t)(1− Pf )N−NS−MM/N + (1−

∏i∈M

ωi(t)(1− Pf )N−NS−M )

)+ Pr(H0S1)

((1− Pf )

N−NS−MM/N + (1− (1− Pf )N−NS−M )

)+ Pr(H1S0)

(∏i∈M

ωi(t)PN−NS−Mm α(N −M)/N

)+ Pr(H1S1)

(PN−NS−Mm α(N −M)/N

).

(39)u(Ah, (ωS , 0)) =Pr(H0S0)

((1− Pf )

N−NS−MM/N + (1− (1− Pf )N−NS−M )

)+ Pr(H0S1)

(∏i∈M

ωi(t)(1− Pf )N−NS−MM/N + (1−

∏i∈M

ωi(t)(1− Pf )N−NS−M )

)+ Pr(H1S0)P

N−NS−Mm α(N −M)/N. (43)

parts with S1, the condition of the irrational IMUs’malicious reporting is

Pr(H0S1) <Pr(H0S1)(1− (1− Pf )N−M )

+ Pr(H1S1)PN−Mm α(N −M)/N. (51)

By simplifying the above inequality, Eq. (44) can beobtained.

The MBR-A decreases the the irrational IMUs’ util-ity when they cheat from 1 to 0 and the spectrum sta-tus is H0, since no spectrum hole would be allocatedto the IMUs. Note that the possibility that the MBR-Aalone can affect is very small, since the threshold of αin Lemma 11 is almost the same as that in Lemma 8as N is usually much larger than M .

Based on Lemmas 10 and 11, neither MBR-S norMBR-A alone can prevent the irrational IMUs’ ma-licious behaviors. Therefore, it is necessary to adoptboth MBR-S and MBR-A to design a joint spectrumsensing and access mechanism.

We judge whether or not the two types of mis-reporting exist by the penalty factor α according toLemma 8 as

• Regime AI : The penalty factor α satisfies Pr(H0)Pr(H1)

<

α ≤ Pr(H0)(1−Pf )N−M (1−(1−Pf )

M )

Pr(H1)PN−Mm (1−PM

m ). The irrational

IMUs would possibly report R1 when the sensingresult is S0.

• Regime BI : The penalty factor α satisfiesPr(H0)(1−Pf )

N−M (1−(1−Pf )M )

Pr(H1)PN−Mm (1−PM

m )< α ≤

Pr(H0)(1−Pf )N−1

Pr(H1)PN−1m

, In this regime, we mustconsider both types of misreporting.

Note that the exclusion probability ωS(t) for irra-tional IMUs is

ωS(t) = ωS Pr(S0R1)/M, (52)

which is different from (26). This is because the ir-rational IMUs do not have to access the spectrum toobtain the benefit from their malicious behaviors.

To achieve a low resistance cost, we design the opti-mal MBR mechanisms for both regimes as Algorithm2.

Algorithm 2 Optimal MBR Mechanism for IrrationalIMUsRegime AI :1) MBR-S: ωS is searched to satisfy

Pr(H0H0)M/N = Pr(S0R1)∆u(S0R1), (53)

where Pr(H0H0) = Pr(H0)ωS(t)(1−Pf )N−NS−M , and

∆u(S0R1) = (1−ωS(t))(Pr(H0|S0)(1−Pf )

N−NS−M −Pr(H1|S0)P

N−NS−Mm α(N −M)/N

).

2) MBR-A: ωA is set as

ωA =⌈Pr(H0)ωS(1− Pf )

N−NS−M/M⌉. (54)

Regime BI :1) MBR-S: ωS is searched to satisfy

Pr(H0H0)M/N = ∆u, (55)

where Pr(H0H0) = Pr(H0)ωS(1 − Pf )N−NS +

Pr(H0)(1 − (1 − Pf )M )(1 − Pf )

N−NS−M ,and ∆u is the average increased irrationalIMUs’ utility of misreporting, i.e., ∆u =(1−ωS(t))((Pr(H0S0)−Pr(H0S1))(1−Pf )

N−NS−M −Pr(H1S0)P

N−NS−Mm α(N −M)/N).

2) MBR-A: ωA is set as

ωA = ⌈Pr(H0H0)⌉ = 1. (56)

4.3 Thwarting Heterogeneous IMUs

We now consider a more practical scenario in whichboth the rational and irrational IMUs co-exist. TheIMUs within the same type cooperate with each otheras discussed above, while different types of IMUsdetermine their malicious behaviors independentlydue to different objectives (4) and (5) of rational andirrational IMUs. Let MR and MI be the numbers ofrational and irrational IMUs, respectively.

We analyze the case of heterogeneous IMUs using athree-step approach similar to the case of single-typeIMUs considered earlier. The penalty factors α withmalicious behaviors are the same as Lemmas 3 and

Page 10: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

10

8 for rational and irrational IMUs, respectively, sincewhen one type of IMUs deviates from the equilibriumstate, they treat other IMUs as honest users. As aresult, we can also conclude that neither MBR-S norMBR-A alone can prevent the malicious behaviors ofheterogeneous IMUs.

In the presence of heterogeneous IMUs, we needto classify the value of α to more regimes for i-dentifying possible malicious behaviors. Accordingto the conditions of α in Lemmas 3 and 8, we letχR =

Pr(H0)(1−Pf )MR (1−(1−Pf )

N−MRMR/N)

Pr(H1)PMRm (1−P

N−MRm MR/N)η

and χI =

Pr(H0)(1−Pf )N−MI (1−(1−Pf )

MI )

Pr(H1)PN−MIm (1−P

MIm )

for simplicity of expres-sion, and define the regimes as

• Regime AH : The penalty factor α satisfies Pr(H0)Pr(H1)

<

α ≤ min{χR, χI}. Both the rational and irrationalIMUs would possibly report R1 when the sensingresult is S0.

• Regime BH : The penalty factor α satisfies χR <α ≤ χI . Only the irrational IMUs would possiblyreport R1 when the sensing result is S0.

• Regime CH : The penalty factor α satisfies χI <α ≤ χR. In this regime, we must consider all ofthe three types of misreporting.

• Regime DH : The penalty factor α satisfiesmax{χR, χI} < α ≤ Pr(H0)(1−Pf )

N−1

Pr(H1)PN−1m

. The irra-tional IMUs would possibly misreport irrespec-tive of the sensing result.

The basic idea in designing the MBR mechanismfor heterogeneous IMUs is that the system imposesa large enough punishment against the malicious be-haviors to thwart the corresponding IMUs. For reduc-ing the resistance cost, we also adopt the punishmentsuch that the expected utility for honest reporting isequal to the maximum utility for malicious behaviors.We provide the optimal MBR mechanism for hetero-geneous IMUs as Algorithm 3.

5 PERFORMANCE EVALUATION

We now evaluate the performance of the proposedMBR mechanisms by simulation. In this simulation,one controller and a number of users are deployed.The sensing results of all users are generated ran-domly according to the sensing error probabilitiesPf and Pm, which are adjusted by the controller tomaximize the system utility subject to Pf + Pm =0.1. Then, the IMUs choose their reporting and ac-cess behaviors to maximize their utilities, and thecontroller makes the spectrum sensing and accessdecisions using the proposed MBR mechanism. Thespectrum status is also generated randomly accordingto Pr(H0) = Pr(H1) = 0.5. The penalty factor of PU–SU collision is set to α = 5 and η = 1. To evaluatethe average performance, 10000 randomly generatedsensing results are considered.

First, we show the performance of the proposedMBR mechanism in Fig. 2 with the varying number

Algorithm 3 Optimal MBR Mechanism for Heteroge-neous IMUsRegime AH :1) MBR-S: Two values of ωS can be obtained tosatisfy (27) with M = MR and (53) with M = MI ,respectively. ωS is set to the larger value.2) MBR-A: ωA is set as

ωA =⌈Pr(H0)ωS max{(1− Pf )N−NS−MR/MR,

(1− Pf )N−NS−MI/MI}⌉. (57)

Regime BH : The MBR mechanism is the same as thatfor Regime AI .

Regime CH :1) MBR-S: Two values of ωS can be obtained tosatisfy (27) with M = MR and (55) with M = MI ,respectively. ωS is set to the larger value.2) MBR-A: ωA is set as

ωA = ⌈max{Pr(H0)ωS(1− Pf )N−NS−MR/MR, 1}⌉.

(58)Regime DH : The MBR mechanism is the same as thatfor Regime BI .

of users. We consider the three following baselineschemes for performance comparison.

• Ideal sensing: The controller can detect all falsereports of sensing results and equally share thespectrum opportunities among all users.

• Baseline 1 (Carrot-and-Stick) [30]: The users stopcooperation when the malicious behaviors arediscovered, and resume cooperation after a cer-tain period of time.

• Baseline 2 (Fixed punishment) [31]: The fixed valuesof the aggregate exclusion probability ωS are usedto exclude the IMUs from cooperative sensing. Inthis baseline, ωS is set to 10.

The results in Fig. 2 indicate that the proposedMBR mechanism achieves almost the same perfor-mance as the ideal sensing scheme, which can beconsidered as the performance upper bound. In [31],the punishment could be set as a large enough fixedvalue, because the IMUs are detected correctly suchthat the punishment does not cause any resistancecost to the system. Considering the resistance cost,a large cost is incurred if ωS is large, and the mali-cious behaviors cannot be prevented if ωS is small.Therefore, the proposed MBR mechanism optimizesthe punishment as an appropriate moderate value andthus, outperforms the fixed punishment scheme. Boththe proposed MBR and the fixed punishment schemesprovide a large system utility when the users aremany. However, the system utility with Carrot-and-Stick scheme decreases with the increasing of numberof users. The Carrot-and-Stick scheme does not perfor-m well without accurate reputation metrics, because

Page 11: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

11

3 6 9 12 150.0

0.1

0.2

0.3

0.4

0.5

S

yste

m u

tility

Number of users

Proposed Baseline1 Baseline2 Ideal

(a) A rational IMU

3 6 9 12 150.0

0.1

0.2

0.3

0.4

0.5

Sys

tem

util

ity

Number of users

Proposed Baseline1 Baseline2 Ideal

(b) An irrational IMU

3 6 9 12 150.0

0.1

0.2

0.3

0.4

0.5

Sys

tem

util

ity

Number of users

Proposed Baseline1 Baseline2 Ideal

(c) A rational IMU and an irrational IMU

Fig. 2. Performance comparison with different total number of users

all users stop cooperation in the presence of maliciousbehaviors. Although it thwarts the malicious behav-iors of rational IMUs successfully, the normal sensingerrors cause frequent termination of cooperation. Theproposed MBR mechanism stops the cooperation withIMUs only, not the entire cooperation.

Next, we further investigate the key parameter inour proposed mechanism, the aggregate exclusionprobability ωS , to analyze its effects on the systemutility, as plotted in Fig. 3. Here, we consider a simplescenario with 5 users (N = 5) one of whom is mali-cious (M = 1) to give some insights. As ωS increases,the utility of the IMUs decreases, demonstrating thatthe proposed MBR mechanism can reduce the IMUs’utility. There is a jump when ωS is small in the systemutility curve: a result of the IMUs’ stop of dishonestreports. With an increasing ωS , the system can providemore effective resistance to the malicious behaviors,so the system utility increases until the jump point.On the right of the jump point, the system utilitydecreases because of the resistance cost. Figs. 3(c)and 3(d) show the details around the jump point. Itis observed that the jump point for rational IMUsincreases the system utility significantly, while theimprovement at the jump point for irrational IMUsis not so obvious. This is because the controller hasthe incentive compatible MBR mechanism with therational IMUs, and has the opposite objective to theirrational IMUs. From this analysis, we can find thatthe jump point occurs at the optimal ωS in the M-BR mechanism, where the maximal system utility isachieved.

Fig. 4 shows the optimal ωS is decreasing in thepenalty factor α and increasing in the number of usersN . As the penalty factor α gets larger, the requiredωS for thwarting the malicious behaviors is smaller,because a large penalty factor increases the IMUs’risk to be punished with a higher probability due tothe PU–SU collision. Fig. 4(b) shows that the penaltyfactor α has little effect on the optimal value of ωS .The irrational IMUs just report false sensing resultsbut does not transmit over the spectrum holes, thus

avoiding the penalty risk of PU–SU collision. In fact,the optimal ωS would decrease if α is large enough.According to the conditions of the irrational IMUs’malicious behaviors in Lemma 8, the intersection ofthe curves and the horizontal axis occurs at a pointwith a huge α, e.g., α = 2.5 × 106 for N = 5. Inaddition, one can find that the optimal ωS for therational IMUs is larger for a larger number of users.

6 IMPLEMENTATION CONSIDERATIONS

The proposed MBR mechanism provides a principle-agent-based joint spectrum sensing and access frame-work to incentivize the IMUs to report the sensingresults honestly. We now integrate the MBR mecha-nism into the practical cooperative sensing process.

Before the cooperative sensing starts, the controllerneeds to collect a number of parameters for comput-ing the MBR mechanism: 1) the statistics of channelavailability, sensing errors and malicious users areobtained from the historical data or PU spectrumdatabase; 2) the penalty factor α can be told by thePU system; 3) the coordination between the controllerand SUs is needed to obtain N and synchronize theirsensing, reporting, and decision process.

During the spectrum sensing and access, the con-troller identifies the suspicious users based on the re-ported sensing results. As a result, the user identifica-tion information should be included in the sensing re-porting message. Note that identifying the suspicioususers is much easier than identifying the malicioususers, which notably facilitates the implementation.

After the spectrum sensing and access, if the PU–SU collision occurs, the SUs who cause the collisionshare the penalty to compensate the PU system. Aneconomic penalty is becoming a wide-used approachto encourage spectrum sharing [15][16].

From the above discussion, we obtain that theproposed MBR mechanism needs only some trivialmodifications on protocols. Furthermore, we wantto highlight that the framework can handle morecomplicated scenarios with incomplete information byslight modifications.

Page 12: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

12

0 5 10 150.0

0.1

0.2

0.3

0.4

0.5

Util

ity

Exclusion Probability s

System Rational IMU Ideal

(a) Rational IMUs (0 ≤ ωS ≤ 15)

0 5 10 150.0

0.1

0.2

0.3

0.4

0.5

Util

ity

Exclusion Probability s

System Irrational IMU Ideal

(b) Irrational IMUs (0 ≤ ωS ≤ 15)

0.0 0.5 1.0 1.5 2.00.0

0.1

0.2

0.3

0.4

0.5

Util

ity

Exclusion Probability s

System Rational IMU Ideal

(c) Rational IMUs (0 ≤ ωS ≤ 2)

0.0 0.5 1.0 1.5 2.00.0

0.1

0.2

0.3

0.4

0.5

Util

ity

Exclusion Probability s

System Irrational IMU Ideal

(d) Irrational IMUs (0 ≤ ωS ≤ 2)

Fig. 3. Effect of the aggregate exclusion probability ωS

1 4 7 100.0

0.2

0.4

0.6

0.8

1.0

1.2

1.4

1.6

1.8

Agg

rega

te e

xclu

sion

pro

babi

lity

s

Penalty factor

N=5 N=10 N=15

(a) Rational IMUs

1 4 7 100.80

0.85

0.90

0.95

1.00

1.05

Agg

rega

te e

xclu

sion

pro

babi

lity

s

Penalty factor

N=5 N=10 N=15

(b) Irrational IMUs

Fig. 4. Optimal aggregate exclusion probability ωS

Unknown Type of Malicious Users: The proposedframework can be applied to other types of malicioususer by adjusting the parameters of MBR mecha-nisms if the characteristics of the malicious usersare known. For an unknown-type malicious user, theMBR mechanisms for irrational IMUs can be used,although it may conservatively cause a little bit higherresistance cost than that in the cases with the known-type malicious user. In addition, possible maliciousbehaviors can be judged according to the properties ofthe penalty factor α. The MBR mechanism is designedjust for thwarting possible malicious behaviors witha relatively low resistance cost.

Unknown Number of Malicious Users: If the numberof IMUs is known, we can design the MBR mechanismto provide an appropriately large incentive by usingthe approach in this paper. Without the informationabout the number of IMUs, however, it is difficult todesign a MBR mechanism with an exact appropriateresistance cost. One solution is learning from thefeedback of current mechanism [17]. The aggregateexclusion probability ωS can be set as an upper boundfirst according to Lemma 6. The parameter decreasesstep by step and finally approaches the optimal valuebased on the achieved system utility. For the casewhen ωS in Lemma 6 is not large enough, the con-

Page 13: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

13

troller cannot thwart the malicious behaviors whenthe participation constraint is met. This is reasonablebecause it is difficult for the controller to identify thesuspicious users correctly in the presence of too manyIMUs.

7 RELATED WORK

Secure cooperative spectrum sensing has been studiedas a key technology for reliable detection of PUs inCR networks [18]. In [19], a robust reputation-basedfusion scheme for sensing data is proposed basedon the Byzantine failure model. In [20], the “trustfactor” is adopted for each SU based on their reportedsensing results. In [21], the reputation-based schemeis investigated with the assistance of some trustedusers. As mentioned earlier, such a scheme takes along time to collect information and build a reliablereputation. Other researchers focused on the detectionof attackers. In [22], a malicious user is detected basedon SUs’ sensing correction with a similar channel fad-ing effect. In [23], the effect of information asymmetrybetween the attackers and the system is analyzed forindependent and dependent attacks. These threshold-based attacker detection schemes cannot prevent themalicious behaviors if the malicious users are intelli-gent, for example, adopting an attack-and-run strate-gy. Besides the threshold-based detection, the abnor-mal statistical sensing behaviors are identified usingthe hidden Markov model in [24] and the iterativeexpectation maximization in [25], which also needa long time to collect information. In [26], an extrasensing test is launched to detect malicious users.

An incentive-based economic understanding [27],[28] of attack rationality and benefits is more effectivein cooperative sensing, which does not require todifferentiate honest users from malicious ones. In [29],the incentive design is combined with the key tomotivate the users to sense. In [30], all users stopspectrum sensing if some selfish user deviates fromthe cooperation “standard”. Using a repeated gamemodel, the selfish users are “forced” to cooperate.In [31], direct and indirect punishment strategies areproposed for attack prevention. The malicious usersare detected by the PU–SU collision when the coop-erative sensing decision is “busy”, which would notmisjudge the honest users as malicious and avoidthe resistance cost. However, this mechanism is notsuitable for irrational IMUs who do not access thespectrum for transmission. When malicious users can-not be detected deterministically, the punishment byadjusting the cooperative spectrum sensing strategyis ineffective in preventing the malicious behaviorsbecause of its resistance cost. By adopting a moralhazard principal-agent model, we consider spectrumaccess together with spectrum sensing to effectivelythwart the malicious behaviors of IMUs.

8 CONCLUSION

In this paper, we proposed a moral hazard principal-agent-based joint spectrum sensing and access frame-work to thwart both rational and irrational IMUs.By analyzing the malicious behaviors of both typesof IMUs, we explored the properties of the penaltyfactor of PU–SU collision, which is of importance tothe reduction of resistance cost. Since neither spec-trum sensing nor spectrum access alone can preventthe malicious behaviors, we have designed optimaljoint spectrum sensing and access MBR mechanismsbased on the properties of MBR-S and MBR-A. Ournumerical results show that the proposed MBR mech-anism achieves almost the same performance as theideal sensing scheme and outperforms other existingschemes.

REFERENCES[1] W. Wang, L. Chen, K. G. Shin, and L. Duan, “Secure coopera-

tive spectrum sensing and access against intelligent maliciousbehaviors,” Proc. IEEE INFOCOM 2014, Apr. 2014

[2] A. Ghasemi and E. S. Sousa, “Collaborative spectrum sensingfor opportunistic access in fading environments,” Proc. IEEEDySPAN 2005, pp. 131–136, Nov. 2005

[3] I. F. Akyildiz, B. F. Lo, and R. Balakrishnan, “Cooperativespectrum sensing in cognitive radio networks: A survey,” Phy.Commun., vol. 4, no. 1, pp. 40–62, Mar. 2011

[4] K. G. Shin, H. Kim, A. Min, and A. Kumar. “Cognitive radios:From concept to reality,” IEEE Wireless Commun., vol. 17, no. 5,pp. 64–74, Dec. 2010

[5] W. Wang, K. G. Shin, and W. Wang, “Joint spectrum allocationand power control for multi-hop cognitive radio networks,”IEEE Trans. Mobile Comput., vol. 10, no. 7, pp. 1042–1055, Jul.2011

[6] W. Wang, K. G. Shin, and W. Wang, “Distributed resourceallocation based on queue balancing in multi-hop cognitiveradio networks,” IEEE/ACM Trans. Netw., vol. 20, no. 3, pp. 837–850, Jun. 2012

[7] R. Chen, J. M. Park, and Y. T. Hou, “Toward secure distributedspectrum sensing in cognitive radio networks,” IEEE Commun.Mag., vol. 46, no. 4, pp. 50–55, Apr. 2008

[8] S. Anand, Z. Jin, and K. P. Subbalakshmi, “An analyticalmodel for primary user emulation attacks in cognitive radionetworks”, Proc. of IEEE DySPAN 2008, pp. 1–6, Oct. 2008

[9] Z. Yuan, D. Niyato, H. Li, J. B. Song, and Z. Han, “Defeatingprimary user emulation attacks using belief propagation incognitive radio networks,” IEEE J. Sel. Areas Commun., vol. 30,no. 10, pp. 1850 - 1860, Nov. 2012

[10] J. Laffont and D. Martimort, The Theory of Incentives I: ThePrincipal-Agent Model, Princeton University Press, Princeton NJ,U.S., 2001

[11] P. Bolton and M. Dewatripont, Contract Theory, MIT Press, Dec.2004

[12] X. Chen and J. Huang, “Evolutionarily Stable Spectrum Ac-cess,” IEEE Trans. Mobile Comput., vol. 12, no. 7, pp. 1281–1293,Jul. 2013

[13] X. Chen and J. Huang, “Database-assisted Distributed Spec-trum Sharing,” IEEE J. Sel. Areas Commun., vol. 31, no. 11, pp.2349–2361, Nov. 2013

[14] A. Ghasemi and E. Sousa, “Opportunistic spectrum access infading channels through collaborative sensing,” J. Commun.,vol. 2, no. 2, pp. 71–82, Mar. 2007

[15] J. Huang, R. A. Berry, and M. L. Honig, “Distributed inter-ference compensation for wireless networks,” IEEE J. Sel. AreasCommun., vol. 24, no. 5, pp. 1074–1084, May 2006

[16] S. Huang, X. Liu, and Z. Ding, “Optimal sensing-transmissionstructure for dynamic spectrum access,” Proc. of IEEE INFO-COM 2009, Apr. 2009

[17] X. Cao, Stochastic Learning and Optimization: A Sensitivity-BasedApproach, Springer, 2007

Page 14: Thwarting Intelligent Malicious Behaviors in Cooperative ...chen/index_fichiers/publications/tmc2015.pdf · information: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile

1536-1233 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citationinformation: DOI 10.1109/TMC.2015.2398446, IEEE Transactions on Mobile Computing

14

[18] Z. Gao, H. Zhu, S. Li, S. Du, and X. Li, “Security and privacyof collaborative spectrum sensing in cognitive radio networks,”IEEE Wireless Commun., vol.19, no. 6, pp. 106–112, Dec. 2012

[19] R. Chen, J. M. Park, and K. Bian, “Robust distributed spectrumsensing in cognitive radio networks,” Proc. of IEEE INFOCOM2008, Apr. 2008

[20] P. Kaligineedi, M. Khabbazian, V. K. Bhargava, “Secure coop-erative sensing techniques for cognitive radio systems,” Proc. ofIEEE ICC 2008, Jun. 2008

[21] K. Zeng, P. Pawelczak, and D. Cabric, “Reputation-basedcooperative spectrum sensing with trusted nodes assistance,”IEEE Commun. Letters, vol. 14, no. 3, pp. 226–228, Mar. 2010

[22] A. W. Min, K. G. Shin, and X. Hu, “Attack-tolerant distributedsensing for dynamic spectrum access networks,” Proc. of IEEEICNP 2009, Oct. 2009

[23] H. Li and Z. Han, “Catching attacker(s) for collaborativespectrum sensing in cognitive radio systems: An abnormalitydetection approach,” Proc. of IEEE DySPAN 2010, Apr. 2010

[24] X. He, H. Dai, and P. Ning, “HMM-based malicious userdetection for robust collaborative spectrum sensing,” IEEE J.Sel. Areas Commun., vol. 31, no. 11, pp. 2196–2208, Nov. 2013

[25] E. Soltanmohammadi and M. Naraghi-Pour, “Fast detectionof malicious behavior in cooperative spectrum sensing,” IEEEJ. Sel. Areas Commun., vol. 32, no. 3, pp. 377–386, Mar. 2014

[26] T. Bansal, B. Chen, and P. Sinha, “FastProbe: Malicious userdetection in cognitive radio networks through active transmis-sions,” Proc. of IEEE INFOCOM 2014, Apr. 2014

[27] F. Wu, T. Chen, S. Zhong, L. E. Li, and Y. R. Yang, “Incentive-compatible opportunistic routing for wireless networks,” Proc.of ACM Mobicom 2008, Sept. 2008

[28] T. Yu, Z. Zhou, D. Zhang, X. Wang, Y. Liu, and S. Lu,“INDAPSON: An incentive data plan sharing system based onself-organizing network,” Proc. of IEEE INFOCOM 2014, Apr.2014

[29] S. Li, H. Zhu, Z. Gao, X. Guan, and K. Xing, “YouSense: Miti-gating entropy selfishness in distributed collaborative spectrumsensing,” Proc. of IEEE INFOCOM 2013, Apr. 2013

[30] C. Song and Q. Zhang, “Achieving cooperative spectrum sens-ing in wireless cognitive radio networks,” ACM Mob. Comput.Commun. Rev., vol. 13, no. 2, pp. 14–25, Apr. 2009

[31] L. Duan, A. Min, J. Huang, and K. G. Shin, “Attack preventionfor collaborative spectrum sensing in cognitive radio network-s,” IEEE J. Sel. Areas Commun., vol. 30, no. 9, pp. 1658–1665,Oct. 2012

Wei Wang received the B.S. degree and thePh.D. degree from Beijing University of Post-s and Telecommunications, China in 2004and 2009, respectively. Now, he is an as-sociate professor with Department of Infor-mation Science and Electronic Engineering,Zhejiang University, China. From Sept. 2007to Sept. 2008, he was a visiting studentwith University of Michigan, Ann Arbor, USA.From Feb. 2013 to Feb. 2015, he was a HongKong Scholar with Hong Kong University of

Science and Technology, Hong Kong. His research interests mainlyfocus on cognitive radio networks, green communications, and radioresource allocation for wireless networks.

He is the editor of the book “Cognitive Radio Systems” (Intech,2009) and serves as an editor for Transactions on Emerging T-elecommunications Technologies (ETT). He serves as TPC co-chairfor CRNet 2010 and NRN 2011, symposium co-chair for WCSP2013, tutorial co-chair for ISCIT 2011, and also serves as TPCmember for major international conferences.

Lin Chen received his B.E. degree in Ra-dio Engineering from Southeast University,China in 2002 and the Engineer Diplomafrom Telecom ParisTech, Paris in 2005. Healso holds a M.S. degree of Networking fromthe University of Paris 6. He currently worksas associate professor in the department ofcomputer science of the University of Paris-Sud. His main research interests includemodeling and control for wireless networks,distributed algorithm design and game theo-

ry.

Kang G. Shin is the Kevin & NancyO’Connor Professor of Computer Science inthe Department of Electrical Engineering andComputer Science, The University of Michi-gan, Ann Arbor. His current research focuseson QoS-sensitive computing and networkingas well as on embedded real-time and cyber-physical systems.

He has supervised the completion of 75PhDs, and authored/coauthored more than830 technical articles, a textbook and more

than 30 patents or invention disclosures, and received numerousbest paper awards, including the Best Paper Awards from the 2011ACM International Conference on Mobile Computing and Networking(MobiCom11), the 2011 IEEE International Conference on Auto-nomic Computing, the 2010 and 2000 USENIX Annual TechnicalConferences, as well as the 2003 IEEE Communications SocietyWilliam R. Bennett Prize Paper Award and the 1987 OutstandingIEEE Transactions of Automatic Control Paper Award. He has alsoreceived several institutional awards, including the Research Ex-cellence Award in 1989, Outstanding Achievement Award in 1999,Distinguished Faculty Achievement Award in 2001, and StephenAttwood Award in 2004 from The University of Michigan (the highesthonor bestowed to Michigan Engineering faculty); a DistinguishedAlumni Award of the College of Engineering, Seoul National Universi-ty in 2002; 2003 IEEE RTC Technical Achievement Award; and 2006Ho-Am Prize in Engineering (the highest honor bestowed to Korean-origin engineers).

He was a co-founder of a couple of startups and also licensedsome of his technologies to industry.

Lingjie Duan received the PhD degree fromThe Chinese University of Hong Kong in2012. He is an assistant professor in theEngineering Systems and Design Pillar, Sin-gapore University of Technology and De-sign (SUTD). During 2011, he was a visitingscholar in the Department of EECS at theUniversity of California at Berkeley. His re-search interests include network economics,resource allocation, and energy harvesting.He is the Finalist of Hong Kong Young Sci-

entist Award 2014, and is the awardee of CUHK Global Scholarshipfor Research Excellence in 2011. He is now leading the NetworkEconomics and Optimization Lab at SUTD. He serves as a TPC Co-Chair of INFOCOM2014 Workshop on GCCCN, Program Co-Chairof the ICCS2014 special issue on Economic Theory and Communi-cation Networks, and the Wireless Communication Systems (WCS)Symposium Co-Chair of IEEE ICCC 2015. He is also a TPC memberfor many top-tier conferences.