optimal sensing disruption: a generalized framework for a...

15
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 67, NO. 2, FEBRUARY 2019 1341 Optimal Sensing Disruption: A Generalized Framework for a Power-Limited Adversary Qihang Peng , Member, IEEE, Pamela C. Cosman, Fellow, IEEE , and Laurence B. Milstein, Fellow, IEEE Abstract—A generalized framework of spectrum sensing disruption for a power-limited adversary is proposed in this paper. In the literature, a conventional sensing attack typically assumes that the adversary has perfect knowledge of the spectral usage status. The framework in this paper considers a more general case where there are uncertainties in the estimates at the adversary. These uncertainties are modeled utilizing the probability of detection and the probability of false alarm. Then, the sum of the conditional probabilities of false detection at the secondary within the spectral range of interest, conditioned on the adversary’s estimated spectrum usage status, is maximized. It is shown that the optimal sensing attack, given perfect estimation is a special case of the proposed framework. When the adver- sary has perfect spectrum usage information, this framework reduces to a previously demonstrated optimal sensing disruption. When the adversary has imperfect information on the spectral status, the proposed framework is significantly more robust than conventional sensing attacks. Further, when the adversary’s power budget increases, it asymptotically approaches the sensing disruption performance upper bound. Index Terms—Spectrum sensing, cognitive radio, intelligent adversary, estimation uncertainty. I. I NTRODUCTION C OGNITIVE radio (CR) can help the problem arising from inefficient usage of limited electromagnetic spectrum under fixed allocation [1], [2]. In CR networks, secondary users (SUs) are allowed to opportunistically access those spectral bands not being used by primary users (PUs), under the constraint that interference to PUs is below some threshold. Spectrum sensing [3]–[6] is an essential component in realizing dynamic spectrum access for CR [7]. It enables SUs to be aware of the electromagnetic surroundings by identifying whether PUs are present within the spectral range of interest. However, spectrum sensing introduces new opportunities for Manuscript received April 10, 2018; revised August 20, 2018; accepted September 30, 2018. Date of publication October 9, 2018; date of current version February 14, 2019. This research was supported by the National Science Foundation of China under Grant No. 61301154, by the China Scholarship Council (201506075100), and by Office of Naval Research under Grant No. N00014-17-S-B00. The associate editor coordinating the review of this paper and approving it for publication was K. Tourki. (Corresponding author: Qihang Peng.) Q. Peng is with the School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China (e-mail: [email protected]). P. C. Cosman and L. B. Milstein are with the Department of Electrical and Computer Engineering, University of California at San Diego, La Jolla, CA 92093 USA (e-mail: [email protected]; [email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TCOMM.2018.2874888 an adversary [8]–[10]. Spectrum sensing attacks [9], [11], [12] can be categorized as sensing link disruption, also termed spoofing, and sensing cooperation disruption, also called a spectrum sensing data falsification (SSDF) attack. In spoofing, the adversary sends electromagnetic signals into vacant bands, to make the secondary mistakenly believe that these bands are used by PUs. Sensing cooperation disruption targets the coop- eration process of cooperative spectrum sensing, where the CR network collects measurements from individual SUs and the adversary pretends to be an SU sending out falsified measure- ments so as to mislead the CR network in the final sensing decision. The focus of this paper is on sensing link disruption, since it applies to both local sensing and cooperative sensing. A. Related Work Numerous research papers considered sensing-link disrup- tion in spectrum sensing [13]–[20]. By assuming that PU location is known, a countermeasure to a sensing-link attack is proposed, based on localization information from received signal strength measurements in [14]. Jin et al. [15] presented the detection of a sensing attack using Fenton’s approximation and Wald’s sequential probability ratio test (WSPRT), and extended this work in [16], where a Neyman-Pearson compos- ite hypothesis test and a Wald’s sequential probability ratio test are analyzed. Secure spectrum sensing based on cryptographic techniques were proposed in [17] and [18], where a public- key cryptography mechanism is used between primary and secondary users. In [19] and [20], learning techniques were applied to mitigate the destructive effects of a sensing attack. The above research mainly focuses on proposing various approaches against sensing-link attacks. However, to better combat this attack, an in-depth analysis and optimal design on the attack itself is necessary. Spoofing feasibility was analyzed in [21], and its impact on CR network performance was investigated in [22]. How to optimally launch a sensing link disruption with a given power budget is important, since it provides a worst-case performance analysis for spectrum sensing mechanisms in the presence of a sensing-link attack. Optimal spoofing for an adversary with a limited power budget under additive white Gaussian noise (AWGN) was derived and analyzed in [11], [23], and [24]. This work was extended for fading propagation envi- ronments in [25] and [26]. However, it was assumed that the adversary knows spectral usage status perfectly. In [27], the adversary is assumed to conduct the attack in a blind way such that it does not know the true status of primary signals. However, the adversary could obtain the spectral usage status 0090-6778 © 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Upload: others

Post on 18-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 67, NO. 2, FEBRUARY 2019 1341

Optimal Sensing Disruption: A GeneralizedFramework for a Power-Limited Adversary

Qihang Peng , Member, IEEE, Pamela C. Cosman, Fellow, IEEE, and Laurence B. Milstein, Fellow, IEEE

Abstract— A generalized framework of spectrum sensingdisruption for a power-limited adversary is proposed in thispaper. In the literature, a conventional sensing attack typicallyassumes that the adversary has perfect knowledge of the spectralusage status. The framework in this paper considers a moregeneral case where there are uncertainties in the estimates atthe adversary. These uncertainties are modeled utilizing theprobability of detection and the probability of false alarm. Then,the sum of the conditional probabilities of false detection at thesecondary within the spectral range of interest, conditioned on theadversary’s estimated spectrum usage status, is maximized. It isshown that the optimal sensing attack, given perfect estimationis a special case of the proposed framework. When the adver-sary has perfect spectrum usage information, this frameworkreduces to a previously demonstrated optimal sensing disruption.When the adversary has imperfect information on the spectralstatus, the proposed framework is significantly more robustthan conventional sensing attacks. Further, when the adversary’spower budget increases, it asymptotically approaches the sensingdisruption performance upper bound.

Index Terms— Spectrum sensing, cognitive radio, intelligentadversary, estimation uncertainty.

I. INTRODUCTION

COGNITIVE radio (CR) can help the problem arisingfrom inefficient usage of limited electromagnetic

spectrum under fixed allocation [1], [2]. In CR networks,secondary users (SUs) are allowed to opportunistically accessthose spectral bands not being used by primary users (PUs),under the constraint that interference to PUs is below somethreshold.

Spectrum sensing [3]–[6] is an essential component inrealizing dynamic spectrum access for CR [7]. It enables SUsto be aware of the electromagnetic surroundings by identifyingwhether PUs are present within the spectral range of interest.However, spectrum sensing introduces new opportunities for

Manuscript received April 10, 2018; revised August 20, 2018; acceptedSeptember 30, 2018. Date of publication October 9, 2018; date of currentversion February 14, 2019. This research was supported by the NationalScience Foundation of China under Grant No. 61301154, by the ChinaScholarship Council (201506075100), and by Office of Naval Research underGrant No. N00014-17-S-B00. The associate editor coordinating the review ofthis paper and approving it for publication was K. Tourki. (Correspondingauthor: Qihang Peng.)

Q. Peng is with the School of Information and Communication Engineering,University of Electronic Science and Technology of China, Chengdu 611731,China (e-mail: [email protected]).

P. C. Cosman and L. B. Milstein are with the Department of Electrical andComputer Engineering, University of California at San Diego, La Jolla, CA92093 USA (e-mail: [email protected]; [email protected]).

Color versions of one or more of the figures in this paper are availableonline at http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TCOMM.2018.2874888

an adversary [8]–[10]. Spectrum sensing attacks [9], [11], [12]can be categorized as sensing link disruption, also termedspoofing, and sensing cooperation disruption, also called aspectrum sensing data falsification (SSDF) attack. In spoofing,the adversary sends electromagnetic signals into vacant bands,to make the secondary mistakenly believe that these bands areused by PUs. Sensing cooperation disruption targets the coop-eration process of cooperative spectrum sensing, where the CRnetwork collects measurements from individual SUs and theadversary pretends to be an SU sending out falsified measure-ments so as to mislead the CR network in the final sensingdecision. The focus of this paper is on sensing link disruption,since it applies to both local sensing and cooperative sensing.

A. Related Work

Numerous research papers considered sensing-link disrup-tion in spectrum sensing [13]–[20]. By assuming that PUlocation is known, a countermeasure to a sensing-link attackis proposed, based on localization information from receivedsignal strength measurements in [14]. Jin et al. [15] presentedthe detection of a sensing attack using Fenton’s approximationand Wald’s sequential probability ratio test (WSPRT), andextended this work in [16], where a Neyman-Pearson compos-ite hypothesis test and a Wald’s sequential probability ratio testare analyzed. Secure spectrum sensing based on cryptographictechniques were proposed in [17] and [18], where a public-key cryptography mechanism is used between primary andsecondary users. In [19] and [20], learning techniques wereapplied to mitigate the destructive effects of a sensing attack.The above research mainly focuses on proposing variousapproaches against sensing-link attacks. However, to bettercombat this attack, an in-depth analysis and optimal designon the attack itself is necessary.

Spoofing feasibility was analyzed in [21], and its impacton CR network performance was investigated in [22]. How tooptimally launch a sensing link disruption with a given powerbudget is important, since it provides a worst-case performanceanalysis for spectrum sensing mechanisms in the presenceof a sensing-link attack. Optimal spoofing for an adversarywith a limited power budget under additive white Gaussiannoise (AWGN) was derived and analyzed in [11], [23], and[24]. This work was extended for fading propagation envi-ronments in [25] and [26]. However, it was assumed thatthe adversary knows spectral usage status perfectly. In [27],the adversary is assumed to conduct the attack in a blind waysuch that it does not know the true status of primary signals.However, the adversary could obtain the spectral usage status

0090-6778 © 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

1342 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 67, NO. 2, FEBRUARY 2019

based on its own measurements. Haghighat and Sadough [28]and Saber and Sadough [29] propose a smart radio-awareadversary that performs its own spectrum sensing, and itconsumes resources in a way that causes more destructionthan current attackers. However, it lacks an in-depth analysisof the optimal attacking strategy.

B. Motivation and Contributions

In this paper, we investigate an intelligent adversary whichhas the ability to estimate the usage status within the spectralrange of interest. A general scenario is considered where therecould be estimation uncertainties on the spectral usage statusat the adversary. That is, there is a non-zero probability at theadversary that a band is estimated to be busy but is actuallyvacant. Similarly, a band could be estimated to be vacant butactually be busy. We derived the optimal spoofing strategywith the assumption that the estimation at the adversary isperfect in [11], where it was shown that the optimal spoofingis equal-power, partial-band spoofing. To the best of ourknowledge, the problem of how to optimally spoof with agiven power budget given realistic estimation uncertaintiesremains unresolved.

We tackle this problem in this paper by introducing the con-ditional probability that a band is actually vacant, given thesensed result on that band at the adversary. The sum of theconditional probabilities of false detection at the secondary,conditioned on the spectral usage status estimates at theadversary, is then derived and maximized. Numerical resultsshow that the proposed spoofing outperforms conventionalsensing disruption strategies, and asymptotically approachesthe performance upper bound when there is no sensing esti-mation uncertainty at the adversary.

The contributions of this paper are as follows:• We propose a generalized framework for sensing dis-

ruption by a power-limited adversary, which provides anintelligent transition for the adversary to launch differentsensing disruptions. It is shown that the optimal sensingdisruption strategy, given perfect estimation, is a specialcase of our proposed framework.

• We show that by applying the proposed framework,the sensing-attack performance of the adversary out-performs conventional algorithms, and asymptoticallyapproaches the ideal sensing disruption performancewhen the adversary has perfect information.

• We provide an optimal disruption strategy for asensing-link attack by optimally allocating an adversarialpower budget across subcarriers in the sense of causingmaximally destructive effects to the target CR network.Meanwhile, it provides a worst-case performance analysisfor secure spectrum sensing in the presence of sensinglink disruption.

This power-limited adversary framework has a variety ofapplications, including military and border patrol scenar-ios (unmanned aircraft, wireless sensor networks, vehicularnetworks, etc.) as well as Cognitive Internet-of-Things (CIoT)scenarios. Many CIoT applications, which are seen as goodfits for spectrum sensing and dynamic spectrum access, suchas healthcare, environmental monitoring, smart grids, intel-

ligent traffic systems, and in-home systems, are not usuallyconsidered as adversarial scenarios. However, there are adver-sarial situations which can arise in all these applications,including terrorism, vandalism, and various financially moti-vated crimes (home burglary, waste dumping, avoiding speed-ing tickets, etc.) where sensor overrides or attacks could bedeployed.

The rest of this paper is organized as follows. The systemmodel and the generalized framework are presented inSection II. In Section III, a sub-optimal solution is given,and relationships of existing sensing disruption strategies withour proposed framework are analyzed. Performance analysis isdescribed in Section IV and numerical results are presented inSection V. Finally, conclusions and future work are discussedin Section VI.

Regarding notation: random processes are written as func-tions of time, e.g., wi(t), random variables are denoted byuppercase bold letters, e.g., NP , and values that the randomvariables equal are represented by lowercase letters, e.g., nP .Variables or parameters associated with the adversary aredenoted either with a tilde (∼) above the symbol or with asubscript or superscript A, and the notation → above a symboldenotes a vector.

II. SYSTEM MODEL AND GENERALIZED FRAMEWORK

FOR SENSING DISRUPTION

The spectral range of interest consists of N bands, wheresome are busy bands occupied by PUs and the rest arevacant bands, not accessed by PUs and available for SUs.The transmissions of PUs are random, so the number ofbusy bands, NP , and the number of vacant bands, NS , arerandom, and at any particular instant of time, NP = nP andNS = nS. An SU carries out spectrum sensing within eachperiodic sensing interval, to determine the spectrum usage sta-tus (busy/vacant) of each band. The sensing decision at the SUon the ith band is denoted Di where i = 1, 2, · · · , N , whichequals 1 or 0, indicating the observed band is busy or vacant,respectively. Each sensing interval is followed by a datatransmission interval.

The adversary, who is a rival entity of the secondary, makesdecisions on the spectral usage status at the start of the sensinginterval. During the SU sensing interval, it sends spoofingsignals into vacant bands, in order to mislead SU sensingdecisions.

With the assumption that the spectral usage information atthe adversary is perfect, optimal spoofing under AWGN wasshown to be an equal-power, partial-band strategy in [11]. Thiscorresponds to the ideal performance upper bound of adversaryspoofing, since its attacking power would not be wasted in anybusy bands. However, for a more realistic case, the estimatesof which bands are vacant have uncertainties which can resultin error decisions on the spectral usage status.

A. Estimation Uncertainties at the Adversary

Let Di,A denote the spectrum usage decision of the adver-sary on the i-th band, where i = 1, 2, · · · , N and thesubscript A indicates the adversary. Di,A equals 0 or 1, with 0indicating that the adversary thinks the i-th band is vacant,

Page 3: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

PENG et al.: OPTIMAL SENSING DISRUPTION: GENERALIZED FRAMEWORK FOR A POWER-LIMITED ADVERSARY 1343

and 1 indicating that the i-th band is busy. Consequently,within the N spectral bands, there are NS bands sensed tobe vacant by the adversary, and NP = N − NS bands sensedto be busy by the adversary. Both NS and NP are randomvariables arising from the estimation uncertainties of Di,A.At any particular time, NS = nS and NP = nP , where nS

and nP are integers within the range [0, N ] and nP = N−nS.Let {nS} and {nP } denote the sets of spectral bands that aresensed by the adversary to be vacant and busy, respectively.For the bands where i ∈ {nP }, Di,A = 1, and for i ∈ {nS},Di,A = 0. When the adversary determines that the i-th band isbusy, i.e., Di,A = 1, the probability that it is actually vacant,denoted by p

(1)0,i , is given by

p(1)0,i � p (H0,i|Di,A = 1)

=p(H0,i)pA

f,i

p(H0,i)pAf,i + p(H1,i)pA

d,i

,(1)

where H0,i represents the event that the i-th band is actu-ally vacant, and H1,i denotes the event that the i-th bandis actually busy. Similarly, the probability that the i-th bandis actually vacant when the adversary thinks it is vacant,denoted p

(0)0,i , is

p(0)0,i � p(H0,i|Di,A = 0)

=p(H0,i)(1 − pA

f,i)

p(H0,i)(1 − pAf,i) + p(H1,i)(1 − pA

d,i). (2)

Note that when there is no estimation uncertainty at theadversary, p

(1)0,i in (1) equals 0 and p

(0)0,i in (2) equals 1.

Otherwise, both of them fall in the range (0, 1).

B. Motivation for the Proposed Framework

The generalized spoofing framework, incorporating theadversary’s estimation uncertainty, originates from maximiz-ing the conditional average number of false detections by theSUs over the actually vacant bands, as described below.

Let Di

(i = 1, 2, · · · , N

)be variables such that Di = 1

means that the i-th band is determined to be busy by thesecondary, while Di = 0 indicates that this band is sensed tobe vacant by the secondary. Therefore, the number of bandssensed to be busy by the secondary is the sum of Di overall i. The expectation of this sum is the average number ofbands sensed to be busy by the secondary, N1, and is givenby

N1 = E(∑N

i=1Di

)

=N∑

i=1

p(Di = 1, H0,i

)+

N∑i=1

p(Di = 1, H1,i

), (3)

where H0,i and H1,i denote the events that the i-th bandis actually vacant and that the i-th band is actually busy,respectively. The two parts composing N1 in (3), denoted N1,0

and N1,1, are given by

N1,0 =∑N

i=1p(Di = 1, H0,i)

N1,1 =∑N

i=1p(Di = 1, H1,i). (4)

For the i-th band, the probability that it is actually busyis denoted p

(H1,i

), and the probability that it is actually

vacant is denoted p(H0,i

). There are a total of 2N dif-

ferent spectrum usage combinations of these N bands. Let�Hm =

(H1,m, H2,m, , · · · , HN,m

)denote the m-th (m =

1, 2, · · · , 2N ) spectrum usage status of the total of N bands,where the ith element in the vector Hi,m = 0 means thatthe i-th band is vacant, and Hi,m = 1 indicates that thei-th band is busy (i = 1, 2, · · · , N). For a given valueof m, �Hm =

(H1,m, H2,m, , · · · , HN,m

)is determined.

Specifically, if Hi,m = 0, then p(H1,i|Hi,m = 0

)= 0 and

p(H0,i|Hi,m = 0

)= 1. If Hi,m = 1, then p

(H1,i|Hi,m = 1

)= 1 and p

(H0,i|Hi,m = 1

)= 0.

The probability of this spectrum usage status of the N bandsis denoted p

(�Hm

), and we have

∑2N

m=1p(

�Hm

)= 1. (5)

In this way, we have

2N∑m=1

p(Di = 1, H0,i

∣∣ �Hm

)p(

�Hm

)= p

(Di = 1, H0,i

)(6)

and

2N∑m=1

p(Di = 1, H1,i

∣∣ �Hm

)p(

�Hm

)= p

(Di = 1, H1,i

). (7)

Substituting (6) and (7) into (3),

N1 =2N∑

m=1

{N∑

i=1

p(Di = 1, H0,i

∣∣ �Hm

)p(

�Hm

)

+N∑

i=1

p(Di = 1, H1,i

∣∣ �Hm

)p(

�Hm

)}. (8)

The summationN∑

i=1

p(Di = 1, H0,i

∣∣ �Hm

)p(

�Hm

)in (8)

sums for i from 1 to N , and for each i, the value of p(

�Hm

)

stays constant. So we can take p(

�Hm

)out of the summation,

and (8) can be written as

N1 =2N∑

m=1

{p(

�Hm

) N∑i=1

p(Di = 1, H0,i

∣∣∣ �Hm

)

+ p(

�Hm

) N∑i=1

p(Di = 1, H1,i

∣∣∣ �Hm

)}. (9)

Let

N(0)1,m =

N∑i=1

p(Di = 1, H0,i

∣∣∣ �Hm

)

N(1)1,m =

N∑i=1

p(Di = 1, H1,i

∣∣∣ �Hm

). (10)

Substituting (10) into (8),

N1 =2N∑

m=1

{N

(0)1,mp

(�Hm

)+ N

(1)1,mp

(�Hm

)}. (11)

Page 4: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

1344 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 67, NO. 2, FEBRUARY 2019

We next analyze the physical interpretations for N(0)1,m

and N(1)1,m. At any particular instant of time, there is a particular

spectrum usage status. Without loss of generality, we use thenotation �Hm to denote this status, whereby there are NS,m

actually vacant bands, and NP,m actually busy bands. That is,∑Ni=1 Hi,m = NP,m and NS,m = N − NP,m. In this way,

N(0)1,m from (10) can be further written as

N(0)1,m =

N∑i=1

p(Di = 1, H0,i

∣∣ �Hm

)

=∑

i∈{

NS,m

} p(Di = 1, H0,i, �Hm

)

p(

�Hm

)

+∑

i∈{

NP,m

} p(Di = 1, H0,i, �Hm

)

p(

�Hm

) , (12)

where{NS,m

}and

{NP,m

}denote the sets of spectral bands

which are actually vacant and actually busy, respectively. Forthe spectral bands which are actually vacant, i.e., i ∈ {

NS,m

},

p(H0,i

∣∣ �Hm

)= 1, and for the bands that are actually busy,

i.e., i ∈ {NP,m

}, p

(H0,i

∣∣ �Hm

)= 0. Then (12) can be further

written as

N(0)1,m =

∑NS,m

i=1p(Di = 1

∣∣H0,i, �Hm

), (13)

which is the average number of false detections within theactually vacant bands for the m-th spectral usage status ofthe N bands �Hm, where m = 1, 2, · · · , 2N . Similarly, N

(1)1,m

in (10) can be written as

N(1)1,m

=∑

i∈{

NS,m

}p(Di = 1

∣∣H1,i, �Hm

)p(H1,i

∣∣ �Hm

)p(

�Hm

)

p(

�Hm

)

+∑

i∈{

NP,m

}p(Di =1

∣∣H1,i, �Hm

)p(H1,i

∣∣ �Hm

)p({

Hi

}m

)

p(

�Hm

)

=∑NP,m

i=1p(Di = 1

∣∣H1,i, �Hm

), (14)

where for i ∈ {NS,m

}: p

(H1,i

∣∣ �Hm

)= 0, and for i ∈{

NP,m

}: p

(H1,i

∣∣ �Hm

)= 1. This shows that N

(1)1,m is the

average number of bands sensed busy by the secondary withinthose actually busy bands, i.e., i ∈ {

NP,m

}, given that at this

instant of time, the actual spectrum usage status is �Hm. Andthus, we have

• N1 is the average number of bands sensed to be busy bythe secondary, averaged over all possible spectral usagestatus combinations, within which

– N(0)1,m is the average number of bands sensed busy

by the secondary among the actually vacant bands,for a given spectral usage status �Hm, and

– N(1)1,m is the average number of bands sensed busy

by the secondary among the actually busy bands, fora given spectral usage status �Hm.

• N1 is the sum of N(0)1,m and N

(1)1,m averaged over all the

spectral usage status, given by

N1 =2N∑

m=1

{(N

(0)1,m + N

(1)1,m

)p(

�Hm

)}. (15)

• Maximizing N(0)1,m =

∑Ni=1 p

(H0,i

)p(Di = 1

∣∣H0,i) isthe goal of our proposed algorithm.

C. Generalized Framework for Sensing Disruption

Motivated by the derivations in Section II-B, we propose ageneralized framework for sensing disruption. In the frame-work, estimation uncertainties at the adversary are incor-porated. In this section, the formulation of the proposedframework is described.

Consider the probability that a band is vacant, but has beensensed to be busy by a SU, conditioned on the event that theadversary sensed the band to be vacant. This probability canbe written as

p(Di = 1, H0,i|Di,A = 0)= p(H0,i|Di,A = 0)p(Di = 1|H0,i, Di,A = 0), (16)

Over all the NS = nS bands that are sensed to be vacantby the adversary, the sum of the conditional probabilities offalse detection at the secondary while the spectral bands areactually vacant, conditioned on Di,A = 0 where i ∈ {nS},and NS = nS , is given by

M NS=nS

J,0 =nS∑i=1

p(Di = 1|H0,i, Di,A = 0)

·p(H0,i|Di,A = 0), (17)

where the subscript “0” of M NS=nS

J,0 indicates the conditionthat Di,A = 0. The superscript NS = nS corresponds to thecondition that the number of bands NS that are sensed vacantby the adversary at some particular instant of time is equalto nS .

On the other hand, when the adversary believes the i-th bandis busy, it might be actually vacant, and the adversary doesnot want to miss out on the attacking opportunity if the bandis actually vacant. So we create a more general formulationfor the adversary to incorporate this band into the optimalattacking strategy. Intuitively, whether to spoof in this band isrelated to the probability of this band being actually vacant.In this way, the probability of a successful sensing attack,given that the sensed decision at the adversary Di,A = 1, canbe formulated as the conditional probability that this band isdetermined to be busy by the secondary when it is actuallyvacant, conditioned on Di,A = 1 at the adversary, which canbe expressed as

p(Di = 1, H0,i

∣∣Di,A = 1)= p(Di = 1

∣∣H0,i, Di,A = 1)p(H0,i|Di,A = 1). (18)

Summing this probability over all the NP = nP bandsthat are sensed busy by the adversary, we obtain the sumof the probabilities of false detection at the secondary when

Page 5: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

PENG et al.: OPTIMAL SENSING DISRUPTION: GENERALIZED FRAMEWORK FOR A POWER-LIMITED ADVERSARY 1345

these bands are actually vacant, conditioned on Di,A = 1,where i ∈ {nP }, and NP = nP . This is by

M NP =nP

J,1 =nP∑i=1

p(Di = 1|H0,i, Di,A = 1)

· p(H0,i|Di,A = 1), (19)

where the subscript “1” of M NP =nP

J,1 indicates the conditionthat Di,A = 1. The superscript NP = nP corresponds tothe condition that the number of bands NP that are sensedvacant by the adversary at some particular instant of time isequal to nP .

Spoofing for a power-limited adversary with estimationuncertainty can be formulated as maximizing the secondary’ssum of probabilities of false detection when the bands areactually vacant, conditioned on the adversary’s sensing esti-mates Di,A (i = 1, 2, · · · , N), NS = nS , with a given powerbudget A0, which can be expressed as

maxnS∑i=1

p(0)0,i p(Di = 1|H0,i, Di,A = 0)

+nP∑i=1

p(1)0,i p(Di = 1|H0,i, Di,A = 1)

s.t.nS∑i=1

a(0)i,J +

nP∑i=1

a(1)i,J ≤ A0

a(0)i,J ≥ 0, i ∈ {nS} and a

(1)i,J ≥ 0, i ∈ {nP}, (20)

where a(0)i,J denotes the spoofing power the adversary allocates

in the i-th band for i ∈ {nS}, and a(1)i,J represents the spoofing

power the adversary distributes in the i-th band for i ∈ {nP }.

III. PROBLEM FORMULATION AND PROPOSED

SUB-OPTIMAL SOLUTION

To obtain the optimal spoofing strategy of the adversary,the key task is to relate M NS=nS

J,0 and M NP =nP

J,1 to theadversary’s attacking parameters, i.e., spoofing power in eachband and sensing capabilities including the probability of falsealarm and the probability of detection.

A. Spectrum Sensing at the Secondary

Under H0,i in the i-th band, i.e., the primary signal is absent,the received signal at the SU is

ri,S(t) = wi,S(t) + hji(t), (21)

where wi,S(t) is additive Gaussian noise in the i-th band withzero mean and variance σ2

n. It is assumed that the thermal noiseis identical across all bands. The spoofing signal emitted bythe adversary in the i-th band is ji(t), which is assumed to beGaussian distributed with zero mean, and hence its varianceequals the spoofing power the adversary puts in this band. Thepath loss factor between the adversary and the SU in the i-thband is denoted h, assumed constant across all bands.

The expression in (21) incorporates cases where the spoof-ing power of the adversary is either present or absent in the i-th

band. When the adversary chooses not to spoof in this band,Ai,J is equal to zero; otherwise, Ai,J is a positive value andnot larger than the adversary’s spoofing power budget A0.

Further, the decisions at the adversary on the spectrumusage status Di,A (i = 1, 2, · · · , N) are random. Accordingly,the corresponding spoofing power allocations in each bandAi,J (i = 1, 2, · · · , N) are random, due to the random charac-teristics of the measurements. At any particular instant of time,measurements are obtained by the adversary, and we let ai,J

denote the spoofing power Ai,J at this time, i.e., Ai,J = ai,J .Specifically, for the i-th band that is sensed to be busy by theadversary, i.e., Di,A = 1, we use the notation A

(1)i,J = a

(1)i,J to

denote the spoofing power the adversary puts in it. Similarly,for the i-th band when Di,A = 0, A

(0)i,J = a

(0)i,J denotes the

spoofing power the adversary allocates to it.

B. Problem Formulation

From Section III-A, the received signal model can be writtenin the same form given in (21), regardless of whether Di,A isequal to 0 or 1. Letting a

(0)i,J denote the spoofing power that the

adversary intends to allocate to the bands where Di,A = 0, andfollowing the same procedures as in [11] and [32], we obtain

p(Di = 1|H0,i, Di,A = 0)

≈ Q

(K

2√

TW (a(0)i,J + σ2

n)−√

TW

), (22)

where Q(·) is the Gaussian tail function, TW is theintegration-time-bandwidth product, and K is the detectionthreshold at the SU’s receiver.

Similarly, let a(1)i,J denote the spoofing power that the adver-

sary intends to allocate to the bands where Di,A = 1, so thatp(Di = 1|H0,i, Di,A = 1) is approximately given by

p(Di = 1|H0,i, Di,A = 1)

≈ Q

(K

2√

TW (a(1)i,J + σ2

n)−√

TW

). (23)

And hence, (20) can be further formulated as

maxnS∑i=1

p(0)0,iQ

(K

2√

TW (a(0)i,J + σ2

n)−√

TW

)

+nP∑i=1

p(1)0,i Q

(K

2√

TW (a(1)i,J + σ2

n)−√

TW

)

s.t.nS∑i=1

a(0)i,J +

nP∑i=1

a(1)i,J ≤ A0

a(0)i,J ≥ 0, i ∈ {nS} and a

(1)i,J ≥ 0, i ∈ {nP }. (24)

C. Proposed Sub-Optimal Solution

This optimization is nonlinear and nonconvex. However,p(0)0,i is identical for all i ∈ {nS}, and p

(1)0,i is identical for

all i ∈ {nP }, where we assume that the probability of falsealarm pA

f,i and the probability of detection pAd,i at the adversary

are identical across the bands. We also assume that the a priori

Page 6: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

1346 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 67, NO. 2, FEBRUARY 2019

probabilities of H0,i and H1,i are independent of i. In this way,if we only focus on maximizing either M NS=nS

J,0 or M NP =nP

J,1 ,then the optimal spoofing power allocation can be directlyobtained by using the algorithm derived in [11]. For brevity,we call this algorithm perfect spoofing, where the adversaryis assumed to have perfect knowledge of the spectral usagestatus. Specifically, let V =

(TW +

√(TW )2 + 8TW

)σ2

n.When V ≥ K , the perfect spoofing strategy corresponds toequal-power, full-band spoofing. When V < K , the perfectspoofing strategy is equal-power, partial-band spoofing. Theoptimal number of spoofed bands equals either x∗ or �x∗�,where · and �·� represent ceiling and floor operationsrespectively, and x∗ satisfies

bx∗A0√2π(A0 + x∗σ2

n)2exp

(−

(bx∗

A0 + x∗σ2n

+ d

)2

/2

)

+ Q

(bx∗

A0 + x∗σ2n

+ d

)= pf , (25)

where b = K/2√

TW , d = −√TW , and pf represents the

probability of false alarm at the secondary in the absence ofspoofing.

However, our objective is to maximize M NS=nS

J,0 +M NP =nP

J,1 , which is nonlinear and nonconvex. Considering

that the values of p(0)0,i and p

(1)0,i are typically not equal,

the equal-power, partial-band strategy would no longer be theoptimal solution for the problem in this paper. On the otherhand, no matter what the optimal spoofing power allocationstrategy is, there would be a portion of the total power budgetassigned to the nS spectral bands, with the rest assignedto the nP bands. Using this characteristic of the objectivefunction, we propose a sub-optimal algorithm for spoofingwith estimation uncertainty:

Step 1: Assign a specific portion ρ (0 � ρ � 1) of thepower budget A0 to M NS=nS

J,0 , and consequently, the remain-

ing power (1 − ρ)A0 is allocated to M NP =nP

J,1 .Step 2: With a power budget ρA0 for the nS sensed vacant

bands, obtain the spoofing strategy via the perfect spoofingalgorithm. Similarly, with a power budget (1 − ρ)A0 for thenP sensed busy bands, calculate the spoofing via the perfectspoofing algorithm.

Step 3: Maximize the objective function by varying ρfrom 0 to 1 in discrete steps.

D. Intelligent Transition for Different Scenarios

In this section, we will show that the proposed frameworkprovides an intelligent transition for the adversary to spoofunder different scenarios.

1) When the Adversary Has Perfect Information: When theadversary has perfect knowledge of which bands are vacantand which bands are busy, pA

d,i = 1 and pAf,i = 0. Then we

have

p(1)0,i = 0 and p

(0)0,i = 1. (26)

In this case, the sensed vacant bands by the adversary arethe actually vacant bands. That is, nS = nS . Substituting (26)into (20), the formulation of the proposed spoofing reduces to

maxnS∑i=1

Q

(K

2√

TW (a(0)i,J + σ2

n)−√

TW

)

s.t.nS∑i=1

a(0)i,J ≤ A0

a(0)i,J ≥ 0, i ∈ {

nS

}, (27)

where{nS

}denotes the set of actually vacant bands. Note

that (27) is identical with the formulation for the optimalsensing disruption in [11]. In other words, optimal spoofingwhen the adversary has perfect spectral information is a specialcase of the proposed framework.

2) When the Spectrum Is Fully Loaded: When the spectrumis fully loaded, p

(H0,i

)= 0 and p

(H1,i

)= 1, and we have

p(1)0,i = 0 and p

(0)0,i = 0. (28)

Then the objective in (20) becomes

nS∑i=1

p(0)0,iQ

(K

2√

TW (a(0)i,J + σ2

n)−√

TW

)

+nP∑i=1

p(1)0,i Q

(K

2√

TW (a(1)i,J + σ2

n)−√

TW

)= 0. (29)

That is, no matter what spoofing power the adversary puts ineach band, the objective is always constant and equal to 0.In this case, the best option for the adversary is not to spoof.This is reasonable, because when the spectrum is fully loaded,there is no vacant band for the secondary to access.

3) When the Spectrum Is Totally Vacant: When the spec-trum is totally vacant, p

(H0,i

)= 1 and p

(H1,i

)= 0. Then we

have p(1)0,i =

pAf,i

pAf,i

= 1 and p(0)0,i =

1 − pAf,i

1 − pAf,i

= 1. The objective

in (20) becomes

∑nS

i=1Q

(K

2√

TW (a(0)i,J + σ2

n)−√

TW

)

+∑nP

i=1Q

(K

2√

TW (a(1)i,J + σ2

n)−√

TW

)

=∑N

i=1Q

(K

2√

TW (ai,J + σ2n)

−√

TW

), (30)

where ai,J = a(0)i,J for i ∈ {

nS

}and ai,J = a

(1)i,J for i ∈ {

nP

}.

We can see from (30) that when all the spectral bands areactually vacant, the proposed algorithm for the adversary is totreat all the spectral bands identically, no matter whether thesensed decision at the adversary is 0 or 1.

We can see that the proposed framework provides anintelligent transition for the adversary to spoof under differentscenarios.

Page 7: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

PENG et al.: OPTIMAL SENSING DISRUPTION: GENERALIZED FRAMEWORK FOR A POWER-LIMITED ADVERSARY 1347

IV. PERFORMANCE ANALYSIS

We use the performance criterion “conditional average num-ber of SU false detections NJ , conditioned on the number ofactually vacant bands NS = nS ,” to evaluate the performance.We use the expression “conditional average number of SUfalse detections NJ” for brievity hereafter. NJ correspondsto the conditional average number of actually vacant bandsthat are falsely determined to be busy by the secondary,conditioned on the spectrum occupancy status at this particularinstant of time. It is given by

NJ =∑

i∈{nS}p(Di = 1|H0,i), (31)

where NS = nS is the number of actually vacant spectralbands at this instant of time, and {nS} denotes the set ofspectral bands which are actually vacant.

At a particular instant of time, we use D(t)

to denote the

measurement set at the adversary, that is D(t)

= (D(t)1,A =

δ1, D(t)2,A = δ2, · · · , D

(t)N,A = δN ), where δi ∈ {0, 1} and

i = 1, 2, ..., N . The superscript t denotes each differentmeasurement set at the adversary. Since there are N spectral

bands, there are 2N different possible measurement sets D(t)

on the spectral usage status. Accordingly, t = 1, 2, · · · , 2N .

Based on a given measurement set D(t=t0)

, the adversarycarries out the proposed optimization given in (10), andobtains the spoofing power allocation A(t=t0)

J = (A(t=t0)1,J =

a1,J , · · · , A(t=t0)i,J = ai,J , ..., A

(t=t0)N,J = aN,J). For brevity,

we use A(t=t0)i,J = ai,J to denote the spoofing power in the

i-th spectral band corresponding to the t = t0 measurement

set at the adversary D(t=t0)

, where i = 1, 2, · · · , N .The conditional average number of false detections at the

secondary over the actually vacant bands, conditioned on thenumber of actually vacant bands NS , the particular measure-

ment set D(t=t0)

and corresponding spoofing power A(t=t0)J

by the adversary, can be calculated as

ND(t=t0)

,A(t=t0)J

J =∑

i∈{nS}p(Di = 1|H0,i, D

(t=t0), A(t=t0)

J ).

(32)

Due to estimation uncertainties, there are a total of 2N

different measurement sets by the adversary. Accordingly,there are 2N spoofing power allocations. When the adversary’s

measurement set D(t=t0)

is determined, the correspondingspoofing power allocation A(t=t0)

J is determined, throughsolving the optimization in (20). In this way, A(t=t0)

J can be

taken as a function of D(t=t0)

, i.e., A(t=t0)J = f(D

(t=t0)).Then we have p(A(t=t0)

J |D(t=t0)) = 1.The conditional average number of false detections at

the secondary, averaged over all possible measurements andcorresponding spoofing power allocations at the adversary, isgiven by

NJ =2N∑

t0=1

{A(t=t0)J }

ND(t=t0)

,A(t=t0)J

J

×p(D(t=t0))p(A(t=t0)

J |D(t=t0)), (33)

Fig. 1. Average number of false detections versus JNR, where N = 20and NS = 10.

where p(D(t=t0)

) is the probability that the adversary’s

measurement set is D(t=t0)

. For example, for the case wherethere are i actually vacant bands sensed to be busy by theadversary, and there are j actually busy bands sensed to bevacant by the adversary, this probability can be calculated by(

nS

i

)(1 − pA

f

)(nS−i)(pA

f

)i

·(

N − nS

j

)(1 − pA

d

)j(pA

d

)N−nS−j, (34)

where nS is the number of actually vacant bands at this time,and pA

f and pAd denote the probability of false alarm and the

probability of detection at the adversary.

V. NUMERICAL RESULTS

Based on the calculations for NJ from (31) to (33),we generate numerical results for performance analysis of theproposed algorithm, as well as comparisons with these threeconventional algorithms:

1) Perfect Algorithm: the adversary is assumed to knowperfectly the actual spectral usage status. This algorithmprovides an upper bound for the sensing disruptionperformance of the adversary.

2) Sensed Algorithm: The adversary only spoofs the bandsit has sensed to be vacant.

3) Blind Algorithm: The adversary considers all the spec-tral bands to be vacant, and uses the procedure from [11]to determine the percentage of bands to be spoofed. Notethat the above procedure was optimal in [11], becausethe adversary knows with certainty which bands werevacant. However, in this baseline algorithm, the adver-sary has no knowledge as to which bands are vacant.

A. Performance Comparisons

The average number of SU false detections with differentvalues of spoofing power budget is plotted in Fig.1, where thespoofing power budget is measured in terms of the jamming tonoise ratio JNR = A0/Nσ2

n in each band. The total numberof spectral bands N = 20, and there are NS = 10 actuallyvacant bands. The SU threshold for determining whether the

Page 8: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

1348 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 67, NO. 2, FEBRUARY 2019

Fig. 2. Average number of false detections versus JNR, where N = 20and NS = 10.

observed band is vacant is chosen such that, in the absenceof spoofing, its probability of false alarm is 0.10. For theadversary, pA

f = 0.10 and pAd = 0.90.

In Fig.1, for any spoofing power, the average number offalse detections for the proposed algorithm is always largerthan those of the sensed and blind algorithms, and asymptot-ically approaches that of the perfect algorithm. When JNRis above approximately 0.70, the blind algorithm outperformsthe sensed algorithm. This is because the sensed algorithmonly attacks the sensed vacant spectral bands, but some of theactually vacant bands are misidentified. When the spoofingpower is not large, it is better for the adversary to attack onlythe sensed vacant bands rather than spreading its power overall the spectral bands. However, when the spoofing poweris large enough, it should spread its power across all thespectral bands to affect the ones misidentified as busy, sincethe spoofing power allocated in each band is still large enoughto make the sensing attack successful.

Both the proposed and blind algorithms asymptoticallyapproach the performance upper bound as the spoofing powerincreases. In contrast, the average number of false detectionsof the sensed algorithm first increases as the spoofing powerincreases, but beyond a certain point, it saturates to a constant.This is because neither the proposed algorithm nor the blindalgorithm limits its attack within the sensed vacant bands,while the sensed algorithm only disrupts the sensed vacantones. As a result, there would be a certain number of actuallyvacant bands not being spoofed.

The effects of the adversary’s different sensing capabilitiesare illustrated in Fig.2. When the sensing capability of theadversary decreases, e.g., from pA

f = 0.10, pAd = 0.90 to pA

f =0.20, pA

d = 0.80, for the same value of the spoofing power,the average number of SU false detections decreases for boththe proposed and sensed algorithms because there is a lowerprobability of hitting the actually vacant bands by the adver-sary. That is, the sensed algorithm is less effective than ourproposed algorithm. Also, note that, under different sensingcapabilities, the proposed algorithm asymptotically approaches

Fig. 3. Average number of SU false detections vs. probability of false alarmat the adversary, where N = 20, NS = 10, and JNR = 0.50.

Fig. 4. Average number of SU false detections vs. probability of detectionat the adversary, where N = 20, NS = 10, and JNR = 0.50.

the performance upper bound as the spoofing power increases,while the average number of SU false detections saturates toa much lower level for the sensed algorithm.

B. Attacking Performance With Varying Probabilitiesof False Alarm and Detection

The average number of SU false detections versus pAf is

plotted in Fig.3, where pAd = 0.90. As pA

f increases, the aver-age number of SU false detections for both the proposed andsensed algorithms decreases, while the average number of falsedetections for the perfect and blind algorithms stays constant.This is because neither the perfect nor the blind algorithmrelies on the adversary’s usage measurements. On the otherhand, when pA

f increases, more actually vacant bands aremistakenly determined to be busy by the adversary, leadingto a lower chance for the adversary to hit the actually vacantbands. As a result, the average number of false detectionsfor either the proposed or the sensed algorithm decreases.However, the average number of SU false detections is alwayslarger for the proposed algorithm than for the sensed algorithmand the gap increases with pA

f .In Fig.4, we observe how the average number of false

detections varies with pAd , when pA

f = 0.10. When pAd

increases, the average number of SU false detections forboth the proposed and sensed algorithms increases because

Page 9: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

PENG et al.: OPTIMAL SENSING DISRUPTION: GENERALIZED FRAMEWORK FOR A POWER-LIMITED ADVERSARY 1349

Fig. 5. Average number of false detections at the secondary versus JNR,where N = 20, NS = 10, pA

f = 0.10, and pAd = 0.90.

the chance that the adversary spoofs actually vacant bandsincreases. The proposed algorithm always outperforms thesensed algorithm.

C. Sensitivity Analysis

In this section, we analyze how the performance variesfor the proposed algorithm when the actual probability ofdetection at the adversary is pA

d , and the adversary thinks itsprobability of detection is pA

d,T .In Fig.5, the average number of false detections at the

secondary is plotted. Here, pAf = 0.10. We consider the

cases when the adversary thinks its probability of detectionis 0.60 or 0.80, while its actual probability of detectionis 0.90. The average number of SU false detections of theproposed algorithm is higher than that of the sensed andblind algorithms. There is no significant performance degra-dation for these cases because, as shown in Appendix A,p(0)0,i ≥ p

(1)0,i . That is, the weight of the optimization for

the sensed vacant bands is always larger than the weightfor the sensed busy bands. Accordingly, the adversary favorsthe sensed vacant bands. Furthermore, when the spoofingpower is small enough (small enough will be defined inAppendix B), then the adversary only spoofs the sensedvacant bands. On the other hand, when the spoofing poweris large enough, then the adversary should allocate a certainportion ρ of its power budget to the sensed vacant bands, andthe remaining portion 1 − ρ of the spoofing power budgetto the sensed busy bands. We will show in Appendix Cthat the adversary favors the sensed vacant bands, that is,the parameter ρ is approximately no smaller than the ratio

nS

nS + nP.

VI. CONCLUSIONS AND FUTURE WORK

This paper presented a generalized framework for a powerlimited adversary. It can be applied for either the case wherethe adversary has perfect knowledge of the spectral usage sta-tus or the scenario where the adversary’s estimates of spectralusage have uncertainties. The framework utilizes the condi-tional probability that, given the adversary’s sensing results,the spectral band of interest is actually vacant. The sensing

disruption strategy obtained under this framework maximizesthe sum of conditional probabilities of false detection at thesecondary, conditioned on the spectral usage status estimatesat the adversary, with the constraint that the adversary hasa limited power budget. Results show that, by utilizing theproposed sensing disruption, the adversary can achieve betterperformance than conventional algorithms. Our future workwill extend this formulation to both the sensing and the datatransmission durations of a cognitive radio network, and inves-tigate optimal spoofing given cooperative spectrum sensing.

APPENDIX APROOF OF THE RELATION BETWEEN p(0)

0,i AND p(1)0,i

Lemma 1: Given that

p(0)0,i = p(H0,i|Di,A = 0)

=p(H0,i)(1 − pA

f,i)

p(H0,i)(1 − pAf,i) + p(H1,i)(1 − pA

d,i)(A-1)

p(1)0,i = p(H0,i|Di,A = 1)

=p(H0,i)pA

f,i

p(H0,i)pAf,i + p(H1,i)pA

d,i

(A-2)

the following relationship holds:

p(0)0,i ≥ p

(1)0,i . (A-3)

Specifically,{

0 < p(H0,i) < 1 : p(0)0,i > p

(1)0,i

p(H1,i) = 0 or p(H1,i) = 1 : p(0)0,i = p

(1)0,i ,

(A-4)

where pAd,i and pA

f,i > 0 denote the probability of detectionat the adversary and the probability of false alarm at theadversary, respectively, and we have pA

d,i > pAf,i.

Proof :Case 1: When 0 < p(H1,i) < 1.Multiplying p(H1,i) on both sides of the inequality pA

d,i >

pAf,i, and subtracting p(H1,i)pA

d,ipAf,i on both sides and regroup-

ing terms, we have

p(H1,i)pAd,i(1 − pA

f,i) > p(H1,i)pAf,i(1 − pA

d,i). (A-5)

Adding p(H0,i)pAf,i(1−pA

f,i) on both sides of (A-5), we have(1 − pA

f,i(p(H1,i)pAd,i + p(H0,i)pA

f,i

)

> pAf,i

(p(H1,i)(1 − pA

d,i) + p(H0,i)(1 − pAf,i)

). (A-6)

Since 0 < p(H0,i) < 1, 0 < p(H1,i) < 1, we havep(H1,i)pA

d,i + p(H0,i)pAf,i > 0 and p(H1,i)(1 − pA

d,i) +p(H0,i)(1 − pA

f,i) > 0. Then (A-6) can be written as

p(H0,i)(1 − pAf,i)

p(H1,i)(1 − pAd,i) + p(H0,i)(1 − pA

f,i)

>p(H0,i)pA

f,i

p(H1,i)pAd,i + p(H0,i)pA

f,i

. (A-7)

Substituting (A-2) and (A-2), we obtain

p(0)0,i > p

(1)0,i . (A-8)

Case 2: When p(H1,i) = 0.

Page 10: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

1350 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 67, NO. 2, FEBRUARY 2019

When p(H1,i) = 0, we have p(H0,i) = 1. Substituting theequalities into (A-2) and (A-2),

p(0)0,i =

p(H0,i)(1 − pAf,i)

p(H0,i)(1 − pAf,i) + p(H1,i)(1 − pA

d,i)

=p(H0,i)(1 − pA

f,i)

p(H0,i)(1 − pAf,i)

= 1 (A-9)

and

p(1)0,i =

p(H0,i)pAf,i

p(H0,i)pAf,i

= 1. (A-10)

Comparing (A-9) and (A-10), we have

p(0)0,i = p

(1)0,i . (A-11)

Case 3: When p(H1,i) = 1.When p(H1,i) = 1, we have p(H0,i) = 0. Substituting the

equalities into (A-2) and (A-2),

p(0)0,i =

p(H0,i)(1 − pAf,i)

p(H0,i)(1 − pAf,i) + p(H1,i)(1 − pA

d,i)= 0

(A-12)

and

p(1)0,i =

p(H0,i)pAf,i

p(H0,i)pAf,i + p(H1,i)pA

d,i

= 0. (A-13)

Comparing (A-12) and (A-13), we have

p(0)0,i = p

(1)0,i . (A-14)

APPENDIX BPROOF OF LEMMA 2

Lemma 2: For a particular instant of time, there are nS

bands sensed to be vacant and nP bands sensed to be busy bythe adversary. When the adversary’s spoofing power budgetA0 is small enough that A0 ≤ c∗ · min(nS , nP ), where c∗

satisfies the following equation

Q( K

2√

TW(c∗ + σ2

n

) −√

TW)− c∗K

2√

2πTW(c∗ + σ2

n

)2

· exp

(− 1

2

(K

2√

TW(c∗ + σ2

n

) −√

TW

)2)= pf ,

(B-1)

the optimal spoofing strategy for the adversary is to spoof onlythe sensed vacant bands.

Proof : Recall that the spoofing strategy for the adversaryis to maximize N NS=nS

J,0 +N NP =nP

J,1 . When the primary signalis absent, the received signal ri,S(t) at the SU can be writtenas,

ri,S(t) = wi,S(t) + hji(t), (B-2)

where h is set to unity.Letting a

(0)i,J denote the spoofing power that the adversary

intends to allocate to the bands where Di,A = 0, and following

the same procedures as in [32], p(Di = 1|H0,i, Di,A = 0) isapproximately given by

p(Di = 1|H0,i, Di,A = 0)

≈ Q

(K

2√

TW (a(0)i,J + σ2

n)−√

TW

), (B-3)

where TW is the integration-time-bandwidth product, and Kis the detection threshold at the SU’s receiver.

Similarly, let a(1)i,J denote the spoofing power that the adver-

sary intends to put for the bands where Di,A = 1, so thatp(Di = 1|H0,i, Di,A = 1) is approximately given by

p(Di = 1|H0,i, Di,A = 1)

≈ Q

(K

2√

TW (a(1)i,J + σ2

n)−√

TW

). (B-4)

Therefore, the objective of the optimization M NS=nS

J,0 +

M NP =nP

J,1 can be expressed as

M NS=nS

J,0 + M NP =nP

J,1

=nS∑i=1

p(0)0,i p(Di = 1|Di,A = 0)

+nP∑i=1

p(1)0,i p(Di = 1|Di,A = 1)

≈nS∑i=1

p(0)0,i Q

(K

2√

TW (a(0)i,J + σ2

n)−√

TW

)

+nP∑i=1

p(1)0,i Q

(K

2√

TW (a(1)i,J + σ2

n)−√

TW

). (B-5)

To solve the optimization problem, we proposed a sub-optimal algorithm in Section III, where ρA0 (0 � ρ � 1)spoofing power is allocated to M NS=nS

J,0 , which is

M NS=nS

J,0 =nS∑i=1

p(0)0,i Q

(K

2√

TW (a(0)i,J + σ2

n)−√

TW

),

(B-6)

and (1 − ρ)A0 spoofing power (0 � ρ � 1) is allocated toM NP =nP

J,1 , which is

N NP =nP

J,0 =nP∑i=1

p(1)0,i Q

(K

2√

TW (a(1)i,J + σ2

n)−√

TW

).

(B-7)

Recall in Section III-C that, to obtain the sub-optimal solu-tion for the proposed algorithm as well as a theoretical analysisof the proposed algorithm, we assume pA

f,i is identical acrossthe bands. Similarly, we assume that pA

d,i is identical acrossthese bands. We also assume that the a priori probabilities ofH0,i and H1,i are independent of i. In this case, for the sensedvacant bands by the adversary where Di,A = 0, the probability

Page 11: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

PENG et al.: OPTIMAL SENSING DISRUPTION: GENERALIZED FRAMEWORK FOR A POWER-LIMITED ADVERSARY 1351

that this band is actually vacant, p(0)0,i = p

(H0,i

∣∣Di,A = 0), is

identical, since

p(0)0,i =

(1 − pAf,i)p(H0,i)

(1 − pAf,i)p(H0,i) + (1 − pA

d,i)p(H1,i). (B-8)

Similarly, for the sensed busy bands by the adversary whereDi,A = 1, the probability that this band is actually vacant,p(1)0,i = p

(H0,i

∣∣Di,A = 1), is identical, since

p(1)0,i =

pAf,ip(H0,i)

pAf,ip(H0,i) + pA

d,ip(H1,i). (B-9)

In this case, M NS=nS

J,0 in (B-6) can be further written as

M NS=nS

J,0 =nP∑i=1

p(0)0,i Q

(K

2√

TW (a(0)i,J + σ2

n)−

√TW

),

(B-10)

where the total spoofing power budget for these nS bandsis ρA0. It can be seen from (B-10) that maximizing M NS=nS

J,0

with spoofing power budget ρA0 is equivalent to

maxnS∑i=1

Q

(K

2√

TW (a(0)i,J + σ2

n)−√

TW

)

s.t.

nS∑i=1

a(0)i,J = ρA0

a(0)i,J � 0, i = 1, · · · , nS . (B-11)

It was shown in [11] that the optimal strategy for the adver-sary under the scenario in (B-11) is equal-power, partial-band spoofing. Further, in the case considered for Lemma 2,the spoofing power budget A0 is not large enough to spoofall the nS sensed vacant bands and the nP sensed busybands simultaneously. That is, for this scenario, the optimalnumber n∗

0 of bands that the adversary should spoof with thepower budget ρA0 within the nS bands is smaller than nS ,i.e., n∗

0 < nS . When ρ = 0, i.e., no spoofing power is allocatedfor sensed vacant bands (this is not a sensible strategy butis included here for mathematical completeness), then in thiscase n∗

0 = 0; when 0 < ρ ≤ 1, ρA0 > 0 spoofing power isallocated to the sensed vacant bands, then in this case n∗

0 > 0.The resulting N NS=nS

J,0 can be expressed as follows:

• When ρ = 0,

M NS=nS

J,0 = p(0)0,i

{nS∑i=1

Q

(K

2√

TWσ2n

−√

TW

)}

= p(0)0,i nSpf , (B-12)

where pf is the probability of false alarm at the SU. Herewe assume the noise power is identical over all bands,and hence the false alarm probabilities in different bandsat the secondary, when the spoofing signal is absent, areidentical and denoted as pf .

• When 0 < ρ ≤ 1,

M NS=nS

J,0

= p(0)0,i

{ n∗0∑

i=1

Q

(K

2√

TW

(ρA0

n∗0

+ σ2n

) −√

TW

)

+∑nS

i=n∗0+1

Q

(K

2√

TWσ2n

−√

TW

)}

= p(0)0,i

{n∗

0Q

(K

2√

TW

(ρA0

n∗0

+ σ2n

) −√

TW

)

+(nS − n∗

0

)pf

}. (B-13)

Note that n∗0 corresponds to the optimal number of spoofed

bands that maximizes M NS=nS

J,0 in (B-11) with spoofing powerbudget ρA0. We derive the optimal value of ρ making useof the optimality of n∗

0. We (1) first analyze what equalityrelationship n∗

0 should satisfy to make it the optimal numberof spoofed bands within the nS sensed vacant bands by theadversary, and (2) then substitute this relationship into (B-11)to obtain the optimal value of ρ, i.e., the optimal portion ofthe spoofing power that the adversary should allocate to thesensed vacant bands. Since n∗

0 > 0 is the optimal number thatmaximizes M NS=nS

J,0 in (B-11), we use a continuous variablex

(0 < x < nS

)for exploring the exact value of n∗

0 > 0. Let

g(x)=xQ

(K

2√

TW

(ρA0

x+σ2

n

) −√

TW

)+

(nS − x

)pf ,

(B-14)

where x∗ ≈ n∗0 is the value of x that maximizes g(x). That

is, n∗0 ≈ x∗ = arg

xmax g(x).

Let b = K/2√

TW , d = −√TW , and PJ = ρA0. Then

g(x) in (B-14) can be further written as

g(x) = xQ

(b

PJ/x + σ2n

+ d

)+

(nS − x

)pf . (B-15)

The first derivative of g(x) with respect to x is

dg(x)dx

= Q

(b

PJ/x + σ2n

+ d

)− pf

− PJbx√

2π(PJ + xσ2

n

)2 exp

(− 1

2

(b

PJ/x + σ2n

+ d

)2)

.

(B-16)

Page 12: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

1352 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 67, NO. 2, FEBRUARY 2019

Since the extreme point x∗ satisfies the relation thatdg(x)dx

∣∣∣x=x∗

= 0, from (B-16), we have

Q

(b

PJ/x∗ + σ2n

+ d

)− pf

=PJ/x∗ · b

√2π

(PJ/x∗ + σ2

n

)2 exp

(− 1

2

(b

PJ/x∗ + σ2n

+ d

)2)

.

(B-17)

It can be seen from (B-17) that PJ and x∗ always appear

together in the form ofPJ

x∗ . As PJ is the spoofing powerbudget and x∗ represents the optimal number of spoofedbands, we define

c∗ =PJ

x∗ , (B-18)

where x∗ can be interpreted as the optimal spoofing powerwithin each spoofed band. Substituting (B-18) into (B-17),

Q

(b

c∗ + σ2n

+ d

)− pf =

c∗b√

2π(c∗ + σ2

n

)2

· exp

(− 1

2

(b

c∗ + σ2n

+ d

)2)

, (B-19)

or equivalently,

Q

(b

c∗ + σ2n

+ d

)− pf − c∗b

√2π

(c∗ + σ2

n

)2

· exp

(− 1

2

(b

c∗ + σ2n

+ d

)2)

= 0. (B-20)

It can be seen from (B-20) that the value of c∗ is determined bythe sensing parameters b, d, σ2

n, and pf , and can be obtained bysolving the nonlinear equation (B-20). In other words, as longas the sensing parameters b, d, σ2

n, and pf are determined,then c∗ is determined. That is, c∗ = f(b, d, σ2

n, pf), where thefunction f(·) can be determined through (B-20). Followingthe same derivations in [11], we can show that Eq. (B-20)has one and only one solution for c∗ > 0. Substituting (B-18)and (B-19) into (B-15) yields

g(x∗) =PJb

√2π

(c∗ + σ2

n

)2

· exp

(− 1

2

(b

c∗ + σ2n

+ d

)2)

+ nSpf . (B-21)

Since PJ = ρA0,

g(x∗) = ρA0b

√2π

(c∗ + σ2

n

)2

· exp

(− 1

2

(b

c∗ + σ2n

+ d

)2)

+ nSpf . (B-22)

Considering that n∗0 ≈ x∗ = arg

xmax g(x), M NS=nS

J,0

in (B-13) is approximately given by

M NS=nS

J,0 ≈ p(0)0,ig(x∗)

= p(0)0,iρA0

b√

2π(c∗ + σ2

n

)2

· exp

(− 1

2

(b

c∗ + σ2n

+ d

)2)

+ p(0)0,i nSpf .

(B-23)

Let

=b

√2π

(c∗ + σ2

n

)2 exp

(− 1

2

(b

c∗ + σ2n

+ d

)2)

.

(B-24)

Because c∗ is determined by the sensing parameters of thesystem, can be considered constant, as long as these sensingparameters are fixed. Substituting (B-24) into (B-23),

M NS=nS

J,0 ≈ p(0)0,i ρA0 +p

(0)0,i nSpf . (B-25)

Combining (B-12) and (B-25), we can obtain the expressionfor M NS=nS

J,0 when 0 � ρ � 1 as

M NS=nS

J,0 ≈ p(0)0,i ρA0 +p

(0)0,i nSpf , 0 � ρ � 1. (B-26)

Following the same procedures from (B-12) to (B-25),M NP =nP

J,1 in (B-7) is given by

M NP =nP

J,1 ≈ p(1)0,i (1 − ρ)A0 +p

(1)0,i nSpf , 0 � ρ � 1.

(B-27)

Therefore, the objective of the optimization M NS=nS

J,0 +

M NP =nP

J,1 in (B-5) can be expressed as

M NS=nS

J,0 + M NP =nP

J,1 ≈ p(0)0,i ρA0 +p

(0)0,i nSpf

+ p(1)0,i (1 − ρ)A0 +p

(1)0,i nSpf

= ρA0 (p(0)0,i − p

(1)0,i

)+ p

(0)0,i nSpf

+ p(1)0,i nSpf + p

(1)0,i A0 . (B-28)

Discussion: Appendix A proved that p(0)0,i − p

(1)0,i > 0, based

on the fact that the probability of detection at the adversary isalways larger than its probability of false alarm. Accordingly,when 0 < p(H1,i) < 1, the coefficient of ρ is positive,

i.e., A0 (p(0)0,i − p

(1)0,i

)> 0. This leads to the case that

M NS=nS

J,0 +M NP =nP

J,1 monotonically increases as ρ increases.

The maximal value of the objective M NS=nS

J,0 + M NP =nP

J,1 isreached when ρ = 1. That is, in this case, the optimal strategyis to spoof only the sensed vacant bands.

Page 13: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

PENG et al.: OPTIMAL SENSING DISRUPTION: GENERALIZED FRAMEWORK FOR A POWER-LIMITED ADVERSARY 1353

APPENDIX CPROOF OF LEMMA 3

Lemma 3: When the spoofing power budget at the adversaryis large enough to spoof all the spectral bands of interest, thatis, the adversary allocates a certain portion ρ of its spoofingpower budget to the sensed vacant bands, and the remainingportion 1 − ρ to the sensed busy bands, the optimal value

of ρ satisfies ρ ≥ nS

np + nS.

Proof: When all the spectral bands of interest are spoofed,the objective of the optimization M NS=nS

J,0 + M NP =nP

J,1 canbe expressed as

M NS=nS

J,0 + M NP =nP

J,1

= p(0)0,i nSQ

(b

ρA0/nS + σ2n

+ d

)

+ p(1)0,i nP Q

(b

(1 − ρ)A0/nP + σ2n

+ d

), (C-1)

where b = K/2√

TW , and d = −√TW . Let F (ρ) =

M NS=nS

J,0 + M NP =nP

J,1 . Then we have

F (ρ) = p(0)0,i nSQ

(b

ρA0/nS + σ2n

+ d

)

+ p(1)0,i nP Q

(b

(1 − ρ)A0/nP + σ2n

+ d

). (C-2)

Let

g1(ρ) =b

ρA0/nS + σ2n

+ d = b

(A0

nSρ + σ2

n

)−1

+ d,

(C-3)

g2(ρ) =b

(1 − ρ)A0

nP+ σ2

n

+ d

= b

(A0

nP+ σ2

n − A0

nPρ

)−1

+ d

= b(dP + σ2

n − dpρ)−1

+ d, (C-4)

where dS = A0/nS , and dP = A0/nP . Substituting (C-3)and (C-4) into (C-2),

F (ρ) = p(0)0,i nSQ

(g1(ρ)

)+ p

(1)0,i nP Q

(g2(ρ)

). (C-5)

We need to find out what value of ρ leads to the maximalpoint of F (ρ). The first derivative of F (ρ) with respect to ρis

dF (ρ)dρ

= p(0)0,i nS

[− 1√

2πexp

(− 1

2g21(ρ)

)]dg1(ρ)dρ

+ p(1)0,i nP

[− 1√

2πexp

(− 1

2g22(ρ)

)]dg2(ρ)dρ

, (C-6)

wheredg1(ρ)

dρ= − bdS(

dSρ + σ2n

)2 , (C-7)

dg2(ρ)dρ

=bdP(

dP + σ2n − dP ρ

)2 . (C-8)

Substituting (C-7) and (C-8) into (C-6) yields,

dF (ρ)dρ

=p(0)0,i nSbdS

√2π

(dSρ + σ2

n

)2 exp(− 1

2g21(ρ)

)

− p(1)0,i nP bdP

√2π

(dS + σ2

n − dP ρ)2 exp

(− 1

2g22(ρ)

).

(C-9)

Considering that dS =A0

nS, and dP =

A0

nP, (C-9) can be

further written as

dF (ρ)dρ

=p(0)0,i bA0

√2π

(dSρ + σ2

n

)2 exp(− 1

2g21(ρ)

)

− p(1)0,i bA0

√2π

(dS + σ2

n − dP ρ)2 exp

(− 1

2g22(ρ)

).

(C-10)

The optimal value of ρ, denoted ρ∗, is such thatdF (ρ)

∣∣∣ρ=ρ∗

= 0. That is,

p(0)0,i bA0

√2π

(dSρ∗ + σ2

n

)2 exp(− 1

2g21(ρ

∗))

− p(1)0,i bA0

√2π

(dS + σ2

n − dP ρ∗)2 exp

(− 1

2g22(ρ

∗))

= 0.

(C-11)

When the spoofing power is very large, g1(ρ∗) ≈ d andg2(ρ∗) ≈ d, and we have

exp(− 1

2g21(ρ

∗))≈ exp

(− 1

2g22(ρ

∗)). (C-12)

Substituting (C-12) into (C-11) yields,

p(0)0,i bA0

√2π

(dSρ∗ + σ2

n

)2

≈ p(1)0,i bA0

√2π

(dP + σ2

n − dP ρ∗)2 ⇒

√p(1)0,i

(dSρ∗ + σ2

n

)

≈√

p(0)0,i (dP + σ2

n − dP ρ∗). (C-13)

Solving (C-13), we have

ρ∗ ≈√

p(0)0,i dP +

√p(0)0,iσ

2n −

√p(1)0,i σ

2n√

p(1)0,i dS +

√p(0)0,i dP

. (C-14)

Page 14: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

1354 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 67, NO. 2, FEBRUARY 2019

Since dS = A0/nS , and dP = A0/nP ,

ρ∗ ≈

√p(0)0,i

A0

nP+

√p(0)0,i σ

2n −

√p(1)0,i σ

2n

√p(1)0,i

A0

nS+

√p(0)0,i

A0

nP

=

√p(0)0,i

A0

nP σ2n

+√

p(0)0,i −

√p(1)0,i

√p(1)0,i

A0

nSσ2n

+√

p(0)0,i

A0

nP σ2n

. (C-15)

Note that p(0)0,i ≥ p

(1)0,i , so that

ρ∗ ≥

√p(0)0,i

A0

nP σ2n√

p(1)0,i

A0

nSσ2n

+√

p(0)0,i

A0

nP σ2n

=

√p(0)0,i nS√

p(1)0,i nP +

√p(0)0,i nS

≥√

p(0)0,i nS√

p(0)0,i nP +

√p(0)0,i nS

=nS

nP + nS. (C-16)

That is

ρ∗ ≥ nS

nP + nS. (C-17)

REFERENCES

[1] J. Mitola and G. Q. Maguire, Jr., “Cognitive radio: Making softwareradios more personal,” IEEE Pers. Commun., vol. 6, no. 4, pp. 13–18,Apr. 1999.

[2] S. Haykin, “Cognitive radio: Brain-empowered wireless communica-tions,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220,Feb. 2005.

[3] Z. Quan, S. Cui, and A. H. Sayed, “Optimal linear cooperation forspectrum sensing in cognitive radio networks,” IEEE J. Sel. Topics SignalProcess., vol. 2, no. 1, pp. 28–40, Feb. 2008.

[4] T. Yucek and H. Arslan, “A survey of spectrum sensing algorithms forcognitive radio applications,” IEEE Commun. Surveys Tuts., vol. 11,no. 1, pp. 116–130, 1st Quart., 2009.

[5] Y. Zeng, Y.-C. Liang, A. T. Hoang, and R. Zhang, “A reviewon spectrum sensing for cognitive radio: Challenges and solutions,”EURASIP J. Adv. Signal Process., vol. 2010, p. 381465, Dec. 2010,doi: 10.1155/2010/381465

[6] I. F. Akyildiz, B. F. Lo, and R. Balakrishnan, “Cooperative spectrumsensing in cognitive radio networks: A survey,” Phys. Commun., vol. 4,no. 1, pp. 40–62, Mar. 2011.

[7] D. Cabric, S. M. Mishra, and R. W. Brodersen, “Implementation issuesin spectrum sensing for cognitive radios,” in Proc. Conf. Rec. 38thAsilomar Conf. Signals, Syst. Comput., vol. 1, Nov. 2004, pp. 772–776.

[8] T. X. Brown and A. Sethi, “Potential cognitive radio denial-of-servicevulnerailities and protection countermeasures: A multi-dimensionalanalysis and assessment,” in Proc. 2nd Int. Conf. Cogn. Radio OrientedWireless Netw. Commun., Aug. 2007, pp. 456–464.

[9] R. Chen, J.-M. Park, Y. T. Hou, and J. H. Reed, “Toward secure dis-tributed spectrum sensing in cognitive radio networks,” IEEE Commun.Mag., vol. 46, no. 4, pp. 50–55, Apr. 2008.

[10] R. Chen, J.-M. Park, and K. Bian, “Robust distributed spectrum sensingin cognitive radio networks,” in Proc. IEEE INFOCOM, Apr. 2008,pp. 1876–1884.

[11] Q. Peng, P. C. Cosman, and L. B. Milstein, “Optimal sensing disruptionfor a cognitive radio adversary,” IEEE Trans. Veh. Technol., vol. 59,no. 4, pp. 1801–1810, May 2010.

[12] J. Wang, I.-R. Chen, J. J. P. Tsai, and D.-C. Wang, “Trust-based mechanism design for cooperative spectrum sensing in cog-nitive radio networks,” Comput. Commun., vol. 116, pp. 90–100,Jan. 2018.

[13] A. G. Fragkiadakis, E. Z. Tragos, and I. G. Askoxylakis, “A surveyon security threats and detection techniques in cognitive radio net-works,” IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 428–445,1st Quart., 2013.

[14] R. Chen, J. M. Park, and J. H. Reed, “Defense against primary useremulation attacks in cognitive radio networks,” IEEE J. Sel. AreasCommun., vol. 26, no. 1, pp. 25–37, Jan. 2008.

[15] Z. Jin, S. Anand, and K. P. Subbalakshmi, “Detecting primary useremulation attacks in dynamic spectrum access networks,” in Proc.IEEE ICC, Jun. 2009, pp. 1–5.

[16] Z. Jin, S. Anand, and K. P. Subbalakshmi, “Mitigating primary useremulation attacks in dynamic spectrum access networks using hypothesistesting,” ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 13,no. 2, pp. 74–85, Apr. 2009.

[17] K. M. Borle, B. Chen, and W. Du, “A physical layer authentica-tion scheme for countering primary user emulation attack,” in Proc.IEEE ICASSP, May 2013, pp. 2935–2939.

[18] A. Alahmadi, M. Abdelhakim, J. Ren, and T. Li, “Defense against pri-mary user emulation attacks in cognitive radio networks using advancedencryption standard,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 5,pp. 772–781, May 2014.

[19] S. A. Selvi and M. Sundararajan, “SVM based two level authenticationfor primary user emulation attack detection,” Indian J. Sci. Technol.,vol. 9, no. 29, Aug. 2016.

[20] Y. Li and Q. Peng, “Achieving secure spectrum sensing in presenceof malicious attacks utilizing unsupervised machine learning,” in Proc.IEEE MILCOM, Nov. 2016, pp. 174–179.

[21] S. Anand, Z. Jin, and K. P. Subbalakshmi, “An analytical model forprimary user emulation attacks in cognitive radio networks,” in Proc.3rd IEEE Symp. New Frontiers Dyn. Spectr. Access Netw., Chicago, IL,USA, Oct. 2008, pp. 1–6.

[22] Z. Jin, S. Anand, and K. P. Subbalakshmi, “Impact of primary useremulation attacks on dynamic spectrum access networks,” IEEE Trans.Commun., vol. 60, no. 9, pp. 2635–2643, Sep. 2012.

[23] Q. Peng, P. C. Cosman, and L. B. Milstein, “Worst-case sensing decep-tion in cognitive radio networks,” in Proc. IEEE Globecom, Honolulu,HI, USA, Dec. 2009, pp. 1–5.

[24] Q. Peng, P. C. Cosman, and L. B. Milstein, “Spoofing or jamming:Performance analysis of a tactical cognitive radio adversary,” IEEEJ. Sel. Areas Commun., vol. 29, no. 4, pp. 903–911, Apr. 2011.

[25] M. Soysa, P. C. Cosman, and L. B. Milstein, “Optimized spoofing andjamming a cognitive radio,” IEEE Trans. Commun., vol. 62, no. 8,pp. 2681–2695, Aug. 2014.

[26] M. Soysa, P. C. Cosman, and L. Milstein, “Disruptive attacks on videotactical cognitive radio downlinks,” IEEE Trans. Commun., vol. 64,no. 4, pp. 1411–1422, Apr. 2016.

[27] N. Nguyen-Thanh, P. Ciblat, A. T. Pham, and V.-T. Nguyen, “Sur-veillance strategies against primary user emulation attack in cogni-tive radio networks,” IEEE Trans. Wireless Commun., vol. 14, no. 9,pp. 4981–4993, Sep. 2015.

[28] M. Haghighat and S. M. S. Sadough, “Smart primary user emulation incognitive radio networks: Defence strategies against radio-aware attacksand robust spectrum sensing,” Trans. Emerg. Telecommun. Technol.,vol. 26, no. 9, pp. 1154–1164, 2015, doi: 10.1002/ett.2848.2014.

[29] M. J. Saber and S. M. S. Sadough, “Optimisation of cooperativespectrum sensing for cognitive radio networks in the presence of smartprimary user emulation attack,” Trans. Emerg. Telecommun. Technol.,vol. 28, no. 1, p. e2885, 2017, doi: 10.1002/ett.2885.2017.

[30] Q. Dong, Y. Chen, X. Li, and K. Zeng. (Apr. 2018). “An adaptiveprimary user emulation attack detection mechanism for cognitive radionetworks.” [Online]. Available: https://arxiv.org/abs/1804.09266

[31] D.-T. Ta, N. Nguyen-Thanh, P. Maillé, and V.-T. Nguyen, “Strate-gic surveillance against primary user emulation attacks in cognitiveradio networks,” IEEE Trans. Cogn. Commun. Netw., vol. 4, no. 3,pp. 582–596, Sep. 2018.

[32] H. Urkowitz, “Energy detection of unknown deterministic signals,” Proc.IEEE, vol. 55, no. 4, pp. 523–531, Apr. 1967.

Page 15: Optimal Sensing Disruption: A Generalized Framework for a …code.ucsd.edu/pcosman/Peng_2.2019.pdf · The sensing decision at the SU on the ith band is denoted D i where i =1,2,·

PENG et al.: OPTIMAL SENSING DISRUPTION: GENERALIZED FRAMEWORK FOR A POWER-LIMITED ADVERSARY 1355

Qihang Peng received the B.S., M.S., and Ph.D.degrees from the School of Information andCommunication Engineering, University of Elec-tronic Science and Technology of China (UESTC),Chengdu, China, in 2004, 2007, and 2011, respec-tively. She was a Visiting Scholar with the Depart-ment of Electronic and Computer Engineering,University of California at San Diego, La Jolla,CA, USA. She is currently an Associate Professorof UESTC. Her research interests include spec-trum sensing, wireless communication systems, and

machine learning in cognitive radio.

Pamela C. Cosman (S’88–M’93–SM’00–F’08)received the B.S. degree (Hons.) in electrical engi-neering from the California Institute of Technologyin 1987, and the Ph.D. degree in electrical engi-neering from Stanford University in 1993. Followingan NSF Post-Doctoral Fellowship at Stanford andat the University of Minnesota (1993–1995), shejoined the Faculty of the Department of Electricaland Computer Engineering, University of Californiaat San Diego, San Diego, where she is currently aProfessor.

Her research interests are in the areas of image and video compression andprocessing, and wireless communications. She has written over 250 technicalpapers in these fields, and one children’s book, The Secret Code Menace,that introduces error correction coding through a fictional story. His awardsinclude the ECE Departmental Graduate Teaching Award, the Career Awardfrom the National Science Foundation, the GLOBECOM 2008 Best PaperAward, HISB 2012 Best Poster Award, the 2016 UC San Diego AffirmativeAction and Diversity Award, and the 2017 Athena Pinnacle Award (Individualin Education). Her administrative positions include serving as the Director ofthe Center for Wireless Communications (2006–2008), the ECE DepartmentVice Chair (2011–2014), and the Associate Dean for Students (2013–2016).

Dr. Cosman is a member of Tau Beta Pi and Sigma Xi. She has been amember of the Technical Program Committee or the Organizing Committeefor numerous conferences, including most recently serving as a TechnicalProgram Co-Chair of ICME 2018. She was an Associate Editor of the IEEECOMMUNICATIONS LETTERS (1998–2001), and an Associate Editor of theIEEE SIGNAL PROCESSING LETTERS (2001–2005). She was the Editor-in-Chief (2006–2009) and a Senior Editor (2003-2005 and 2010–2013) of theIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS.

Laurence B. Milstein (S’66–M’68–SM’77–F’85)received the B.E.E. degree from the City Collegeof New York, New York, NY, USA, in 1964, andthe M.S. and Ph.D. degrees in electrical engineeringfrom the Polytechnic Institute of Brooklyn, Brook-lyn, NY, in 1966 and 1968, respectively. From 1968to 1974, he was with the Space and Communica-tions Group of Hughes Aircraft Company, and from1974 to 1976, he was a member of the Departmentof Electrical and Systems Engineering, RensselaerPolytechnic Institute, Troy, NY. Since 1976, he has

been with the Department of Electrical and Computer Engineering, Universityof California at San Diego, La Jolla, where he is currently the EricssonProfessor of wireless communications and a former Department Chairman,involved in the area of digital communication theory with special emphasison spread-spectrum communication systems. He has also been a consultantto both government and industry in the areas of radar and communications.

Dr. Milstein has been a member of the board of governors of both theIEEE Communications Society and the IEEE Information Theory Society.He was a recipient of the 1998 Military Communications Conference LongTerm Technical Achievement Award, an Academic Senate 1999 UCSDDistinguished Teaching Award, an IEEE Third Millennium Medal in 2000,the 2000 IEEE Communications Society Armstrong Technical AchievementAward, and various prize paper awards. He was also a recipient of the IEEECommunications Theory Technical Committee (CTTC) Service Award in2009, and the CTTC Achievement Award in 2012. In 2015, he received theUCSD Chancellor’s Associates Award for Excellence in Graduate Teaching.He was a Former Chair of the IEEE Fellows Selection Committee. He was anAssociate Editor for Communication Theory for the IEEE TRANSACTIONS

ON COMMUNICATIONS, an Associate Editor for Book Reviews for the IEEETRANSACTIONS ON INFORMATION THEORY, an Associate Technical Editorfor the IEEE Communications Magazine, and the Editor-in-Chief of the IEEEJOURNAL ON SELECTED AREAS IN COMMUNICATIONS. He was the VicePresident for Technical Affairs of the IEEE Communications Society in 1990and 1991.