1 Introduction

The continual advances in wireless technologies have caused a rapid increase in the use of advanced wireless devices. This has produced significant interest for more spectrum resources over recent years, that causes spectrum scarcity. The underutilization of the spectrum band is the primary reason behind the spectrum scarcity as mentioned by the FCC report [1]. Cognitive radio (CR) has emerged as a reliable solution for spectrum scarcity problem, and gained popularity among researchers worldwide [2]. CR is one of the most prolific technology that provide effective spectrum utilization, in which parameters can be systematically adjusted according to the environment. The users that have license to use the spectrum are called primary users (PUs). They can transmit their information without any restriction. Whereas, secondary users (SUs) are unlicensed users, and can access the spectrum when channel is available or not used by the PUs [3]. One of the most important concept relates to the CR is spectrum sensing (SS). A number of different SS techniques have been proposed and utilized such as energy detection, eigenvalue based detection, waveform based detection, and cyclostationary detection [4]. Out of these methods energy detection (ED) is the widely utilized approach due to its simplicity and non-dependability on the prior information about the PU. Each SUs performs local sensing, however the sensing results gets severely affected by the fading, shadowing, and hidden node problems [5]. This further causes reduction in detection rate and increases the false alarm in the process. The inability to detect the PU successfully reduces the chances of opportunistic spectrum access by the SUs. Moreover, there will be chances of interference in the network if misdetetcion happens.

These issues are well covered in the literature, and researchers proposed cooperative spectrum sensing (CSS) to prevent it. The PU activity detection is significantly improved by the application of CSS and performance of secondary network also highlights an improvement [6,7,8]. CSS techniques have been adopted for both distributed and centralized type CR scenario. In distributed type of SS approach, each SU perform individual sensing and decides about the spectrum availability. On other hand, in centralized type of SS approach, local sensing is performed by each SU, and transmits their results to the fusion center (FC) to identify the PU presence or channel availability. The final decision about the channel availability is made at the FC, and it depends on collective results of all SUs. Several fusion algorithms like hard decision or soft decision fusion algorithms are applied to make a final decision [9]. However, CSS approach has high susceptibility to the security threats. It is important that the CR system is secure and amenable to underlay infrastructure [10]. Numerous security attacks that affect the network performance are highlighted in the literature. The most primary attacks are primary user emulation attack (PUEA) and spectrum sensing data falsification attack (SSDF) [11, 12].

In PUEA, a direct interference from the outliers can be recognized, these outliers tries to act like PU and disturbs the sensing process of the SUs. In this way the FC makes a decision that the channel is busy and the SUs hold their spectrum access process. Whereas in the SSDF attack, false sensing information is transmitted to the FC. This causes an inaccuracy in final global decision about the PU channel availability. Some studies have mentioned about the different possible combination of SSDF attack [13]. First one is always yes malicious user (AYMU) attack; in which SU always transmits ‘1’ (channel unavailable) to the FC irrespective of the determined local result. This attack will cause a halt in opportunistic spectrum access by denying access to the SUs. In contrast, in always no malicious user (ANMU) attack SUs always transmits ‘0’ (channel available) to the FC. Hence, this attack will causes interference to the PU channel. The other attack is always opposite malicious user (AOMU) attack, in which always opposite of local result is transmit to FC. AOMU is a critical attack, and it can increase false alarm in the sensing process. In the random yes malicious user (RYMU) attack, malicious users (MUs) transmit ‘1’ (channel unavailable) randomly to FC irrespective to local result. Whereas, in random no malicious user (RNMU) attack, MUs transmit ‘0’ (channel available) randomly to the FC irrespective to the local sensing result. Lastly the random opposite malicious user (ROMU) attack, in which MUs randomly transmits opposite of the local sensing results to the FC. Several new strategies are proposed by researchers to reduce the impact of these attacks [14,15,16]. In the next section we highlighted some current state of the art related to the concerned area.

2 Related Works

Several techniques have been proposed by the researchers to mitigate the interference between PUs and SUs and to detect the MUs successfully. Authors in [17] proposed a simple outlier detection approach to successfully detect the MUs presence in CR network. The authors considered a low harm type selfish or greedy attack scenario. In [18] a hidden Markov model (HMM) based approach was proposed to identify the MUs presence in CR network. Dempster-Shafer theory-based approach was utilized in [19] to identify the MUs presence. Authors in [15, 20] proposed multiple approach to prevent the effect of data falsification attack in CR network scenario. Authors in [21] developed a metaheuristic-based scenario to identify the presence of MUs in the network. Authors adopted genetic algorithm and calculated the z-score to achieve accurate sensing results. In [22], authors proposed a technique for outlier detection considering fading and noisy environment in a wireless regional area networks (WRANs) scenario. A different approach for compressive SS was proposed by authors in [12] by reconstructing the original signal to identify the presence of MUs. Authors in [23] developed a unique approach covering experimental analysis based on non-Kruskal-Wallis and Conover-Inman theory to detect the presence of MUs in the network.

Beside these approaches emergence of machine learning (ML) has also influenced the concerned research domain. ML impact can be successfully seen by the work performed by the researchers in this area. Different ML based techniques are available in the literature that successfully exploited both the supervised and unsupervised learning techniques for identification of MUs in the network. In most cases the support vector machine (SVM) algorithm provides better results compare to the other approaches as mentioned in [24,25,26]. The applicability of different kernel function available in SVM makes them liable to adopt for classification task. Authors in [27] developed a ML based technique for CSS, in which final global decision was made by the FC adopting a weighted fusion rule. However, Identification of MUs was not considered in the developed work. Authors in [28] adopted the reinforcement learning approach to propose a transmission scheduling technique in CR-IoT scenarios. The authors highlighted the transmission of packets via multiple channels to improve the system throughput. However, MUs detection was not performed in the concerned work. Recently authors in [29, 30], proposed unsupervised learning based approach for CSS in CR networks. However, the MUs detection was not analysed. A novel technique based on fuzzy SVM algorithm was proposed by authors in [31] considering the noise uncertainty problem. However, MUs impact was not studied in the work. Authors in [32] developed a scenario for multiclass hypothesis testing for CR network using the SVM algorithm. However, authors did not analyse the MUs detection in their work. A CSS scheme based on ML algorithms was proposed by authors in [33], where different grouping techniques were used to minimize the overhead. However, the MUs detection was not analysed in the work.

Authors in [34] adopted reinforcement learning and proposed an efficient transmission mode selection technique for CSS. Authors highlighted an improvement in throughput, energy efficiency and reduced the PU interference. However, the study related to MUs detection was not performed. A detailed survey was provided by authors in [35], in which authors highlighted the ML application in several CR related areas such as modulation classification and power allocation. However, the study related to MUs detection was not mentioned. Authors in [36] utilized different supervised and unsupervised ML algorithms for CSS in CR network scenario. However, study of MUs detection for security related aspect was not provided. In [37], the authors developed a technique utilizing the SVM algorithm to classify the PUEA present in the network. An outlier detection approach was proposed by authors in [38], using spatial correlation between the SUs. Recently authors in [39] developed a ML based approach adopting the pattern described link signature (PDLS) method to identify the legitimate users and the MUs in the network. In [40] authors proposed an ML based approach for successful distribution of spectrum in CR scenario. Authors in [41], studied the PUEA and jamming attacks in a CR network. They proposed a ML based algorithm to detect the spectrum hole and attacks present in the network. In [42], authors proposed a MUs classification approach utilizing the SVM algorithm for a dataset. However, training and testing time-based study was not performed in the work. In recent development authors in [43] proposed a SVM based algorithm to detect the MUs presence in the network. Authors developed different dataset for the performance measurement, however the training and testing time-based study was not analysed. Relevant works by the researchers in the concerned area are highlighted in Table 1.

Table 1 Comparison between previous works and the proposed work

2.1 Scope and Contribution of Work

The literature mentioned above focused on mitigation of SSDF and PUEA attacks in CR network. Most of the work applied ML techniques to achieve successful MUs detection. However the timing analysis is not provided in most of the work [43,44,45, 48]. Generally, in ML techniques time required to train and test a dataset plays an important role. Hence it becomes of great importance to perform a study based on timing analysis to achieve a better trade-off between performance and complexity. Authors have adopted supervised learning and ensemble approaches to achieve better performance. However the increased complexity of the system makes them less liable to adopt.

To overcome the shortcomings of previous studies outlined above, we propose an ELM based approach to identify the presence of MUs in the network. This is a simple method, and effective enough to facilitate classification problem with less training time. Main contributions of this work are highlighted below:

  1. 1.

    To the best of our knowledge, timing based analysis for ELM approach is introduced in this work for the first time in the field of malicious user detection. The classification obtained in the context of proposed algorithms are based on supervised algorithm and differ in shape depending on the type of attack induced. Moreover, depending on the type of attack; ROC performance may be varied. Hence, we propose ELM based MU detection algorithm and compare the performance of different methods utilised in the study.

  2. 2.

    The performance of our method is almost identical with that of SVM method and provide best training time results. The proposed approach performs better in terms of detection rate and AUC values with respect to other methods.

  3. 3.

    This method provides an improvement over other methods by providing a better trade-off.

  4. 4.

    Extensive simulations are performed to compare proposed ELM based MU detection algorithm with some of the well known schemes in literature [36, 42, 44]. For fair evaluation, comparison is also done with existing schemes in which unsupervised and supervised both types of ML algorithms are considered [36]. Results show that proposed ELM based scheme significantly outperform similar ML based schemes and recent well known techniques in literature.

Remaining part of the article is organized as follows. Section 3 describes the system model and briefly explains about the generation of energy vector. In Sect. 4, proposed ELM-based MU detection framework is presented. For clarity of understanding, this section describes the implementation of proposed algorithm with ELM. In Sect. 5, the performance analysis and simulation results are provided. Section 5 also presents the challenges found in this work and some future scope of the article. Finally, the article is concluded in Section 6.

3 Cooperative Spectrum Sensing System Model

3.1 System Model

A cooperative spectrum sensing scenario is illustrated in Fig. 1. It has M secondary user (SU) nodes which also act as spectrum sensing units and N malicious user (MU) nodes. It is assumed that the number of SUs are greater than the MUs (\(\textit{M}>\textit{N}\)). The system model consists of only one licensed PU which has the first priority over other users for using the channel. SUs periodically monitor the spectrum and communicate the sensed information to the fusion center (FC) through a dedicated reporting channel. Then, FC makes a global decision on the availability of the spectrum and informs all the SUs whether the licensed spectrum can be accessed. In case of AYMU attack, a higher energy value is received which signifies the PU channel is busy. Whereas, in ANMU attack a low energy value is received to the FC. All users including the normal SUs and MUs transmits their local results to the FC over fading environment. Then, the FC make a robust global decision by separating the normal SUs and MUs based on the proposed ELM algorithm. The final decision was made based on the sensing results of the normal SUs only.

Fig. 1
figure 1

Typical cooperative spectrum sensing system model involving multiple SUs and MUs

The local sensing task is performed by each SUs and send their locally generated results, either \({\mathcal {H}}_0\) or \({\mathcal {H}}_1\). Here \({\mathcal {H}}_0\) or \({\mathcal {H}}_1\) denotes the absence or presence of PUs, respectively. The signal received by the ith SU can be formulated as binary hypothesis,

$$\begin{aligned}{} & {} {{\mathcal {H}}}_0:z_i\left( k\right) =w_i\left( k\right) , \end{aligned}$$
(1)
$$\begin{aligned}{} & {} {{\mathcal {H}}}_1:z_i\left( k\right) =h_ip\left( k\right) +w_i\left( k\right) \end{aligned}$$
(2)

where \(k=1,2,\dots ,K\), K is the number of sampling points, \(i=1,2,\dots ,M\), M represents the number of SUs. Some of the assumptions of the model are stated as follows:

  1. 1.

    \(z_i\left( k\right)\) is the signal received at ith SU for kth sample, \(p\left( k\right)\) is the signal from the PU, and \(h_i\) is the channel gain between PU and ith SU.

  2. 2.

    Noise \(w_i\left( n\right)\) at the ith SU is modelled as additive white Gaussian noise with zero mean and variance \({\sigma }^2 = 1\).

Energy detection (ED) is a widely used conventional technique for the SS. This method is simple to implement without having any prior knowledge about the PU signal. The sensing outcome \(z_{i}(k)\) represents the received power for ith SU in the time domain for a band. The energy at the output of the SU is represented as

$$\begin{aligned} \xi _{i} = \frac{1}{K}\sum ^K_{k=1}{|z_{i}(k)|^2} \end{aligned}$$
(3)

In case of large number of samples the expression 3 can be represented in form of a Gaussian distribution for both hypothesis \({\mathcal {H}}_0\) and \({\mathcal {H}}_1\) with mean value \(\alpha _{{\mathcal {H}}_0},\alpha _{{\mathcal {H}}_1}\) and variance \(\sigma ^2_{{\mathcal {H}}_0},\sigma ^2_{{\mathcal {H}}_1}\) respectively, as:

$$\begin{aligned} \xi _{i} = \left\{ \begin{array}{l} {\alpha _{{\mathcal {H}}_0}}=2\tau _sB,\ \ \ {\sigma }^2_{{\mathcal {H}}_0} = 4\tau _sB \\ {\alpha _{{\mathcal {H}}_1}}=2\tau _sB(1+\varUpsilon _{i}),\ \ \ {\sigma }^2_{{\mathcal {H}}_1} = 4\tau _sB(1+2\varUpsilon _{i}) \end{array}\right. \end{aligned}$$
(4)

where \(\varUpsilon _{i}\) represents the SNR of the ith SU, \(\tau _s\) denotes the sensing duration, and B represents the spectrum bandwidth.

4 Proposed Malicious User Detection Algorithm

This section illustrates the procedure of our proposed algorithm. ELM is adopted for detecting the presence of malicious users. In the proposed approach a neural network was trained and ELM is used as an classifier. The conventional energy detector approach is utilized to generate an energy vector. Each SUs including the MUs perform spectrum sensing based on energy detector, and an energy vector was formed. Afterwards this energy vector is converted into training and testing dataset. In Fig. 2 the proposed approach based on the ELM is presented. Basically, ELM utilizes a feed-forward (FF) type neural network in which gradient based learning is adopted. The iterative procedure is adopted for parameter tuning [50]. However, applying the learning approach efficiently is a time-consuming task. To prevent this random selection of ELM’s output weights are taken into account [51]. In ELM, independent learning is achieved by changing hidden node parameters [52]. In a way it can be said that ELM accuracy depends on different factors. The primary variables that significantly affects the ELM performance are learning parameter, output weights, and norm parameter minimization [53].

Fig. 2
figure 2

Proposed training and spectrum sensing framework based on ELM

For U different energy samples \((r_j, q_j)\), and V hidden neurons, output equation can be given as:

$$\begin{aligned} {{\mathcal {O}}}_j = \sum _{i=1}^{V}\varPhi _i \varrho \left( \varOmega _ir_j + \beta _i\right) \quad \textrm{for}\ \ j = 1..\dots ,U \end{aligned}$$
(5)

where \(r_j = [r_{j1}, r_{j2}, . . . , r_{jn}]^{T} \in {\mathcal {R}}^{n}\) and \(q_j = [q_{j1}, q_{j2}, . . . , q_{jn}]^{T} \in {\mathcal {R}}^{m}\) denote distinct (unique) energy vectors, \(\varrho (.)\) is for activation function, and \(\varPhi\) denotes output weight. \(\varOmega\) and \(\beta\) denote the input weight and bias. The error found in the iteration is \({\mathcal {E}} = \sum _{j=1}^{U}{\mathcal {O}}_j - q_j\). This can be expressed as:

$$\begin{aligned} \sum _{j=1}^{U}\left( \sum _{i=1}^{V}\varPhi _i \varrho \left( \varOmega _ir_j + \beta _i\right) \right) - q_j \end{aligned}$$
(6)

It is generally accepted that the random selection of parameter values can vary insignificantly [53]. Hence, the choice of ideal approximation is seems to be a sensible one. Therefore, the error most likely reduces to zero, i.e.

$$\begin{aligned}{} & {} \sum _{j=1}^{U}\left( \sum _{i=1}^{V}\varPhi _i \varrho \left( \varOmega _ir_j + \beta _i\right) \right) - q_j = 0 \end{aligned}$$
(7)
$$\begin{aligned}{} & {} \sum _{i=1}^{V}\varPhi _i \varrho \left( \varOmega _ir_j + \beta _i\right) = q_j \end{aligned}$$
(8)

The above Eq. 8 can be expressed as \(G\varPhi = J^{+}\) where,

$$\begin{aligned}{} & {} G = \begin{bmatrix} \varrho \left( \varOmega _{1}r_{1} + \beta _{1}\right) &{} \dots &{} \varrho \left( \varOmega _{V}r_{1} + \beta _{V}\right) \\ \vdots &{} \ddots &{} \vdots \\ \varrho \left( \varOmega _{1}r_{U} + \beta _{1}\right) &{} \dots &{} \varrho \left( \varOmega _{V}r_{U} + \beta _{V}\right) \end{bmatrix} \end{aligned}$$
(9)
$$\begin{aligned}{} & {} \varPhi = \begin{bmatrix} \varPhi _{1} \\ \vdots \\ \varPhi _{V} \end{bmatrix} \textrm{and} \ \ J^{+} = \begin{bmatrix} q_{1} \\ \vdots \\ q_{U} \end{bmatrix} \end{aligned}$$
(10)

Given, the sample size is equal to the number of hidden neurons \((U = V)\), G will transform into a square matrix. Moreover, if the matrix G is non singular, then G will be invertible. This may lead to elimination of error in network. If \(V<< U\), then G is not invertible. Therefore, ideal solution in this case is unattainable. Optimum solution could certainly be achieved by reducing the approximation error to a level [51]. This is expressed as the following formula

$$\begin{aligned} {\hat{G}}{\hat{\varPhi }} - J^{+} \approx G\varPhi - J^{+} \end{aligned}$$
(11)

\({\hat{G}}\) and \({\hat{\varPhi }}\) can be denoted as

$$\begin{aligned}{} & {} {\hat{G}} = \begin{bmatrix} {\hat{\varrho }} \left( {\hat{\varOmega }}_{1}r_{1} + {\hat{\beta }}_{1}\right) &{} \dots &{} {\hat{\varrho }} \left( {\hat{\varOmega }}_{V}r_{1} + {\hat{\beta }}_{V}\right) \\ \vdots &{} \ddots &{} \vdots \\ {\hat{\varrho }} \left( {\hat{\varOmega }}_{1}r_{U} + {\hat{\beta }}_{1}\right) &{} \dots &{} {\hat{\varrho }} \left( {\hat{\varOmega }}_{V}r_{U} + {\hat{\beta }}_{V}\right) \end{bmatrix} \end{aligned}$$
(12)
$$\begin{aligned}{} & {} {\hat{\varPhi }} = \begin{bmatrix} {\hat{\varPhi }}_{1} \\ \vdots \\ {\hat{\varPhi }}_{V} \end{bmatrix} \end{aligned}$$
(13)

The errors have been strongly reduced when accounting for proper activation function \({\hat{\varrho }}(.)\) and \({\hat{\varOmega }}, {\hat{\beta }}, {\hat{\varPhi }}\) values. In present work, \({\hat{\varrho }}(.)\) is treated as a continuous sigmoid function. The ELM technique presented is capable of producing less training error and time consumption [53, 54]. Convincing results from randomized selection of \({\hat{\varOmega }}, {\hat{\beta }},\,\textrm{and}\,{\hat{\varPhi }}\) values can be achieved. The \({\hat{\varPhi }}\) values were calculated using MP pseudo-inverse method as mentioned in [52]. The detailed expressions of \({\hat{\varPhi }}\) can be given as

$$\begin{aligned} {\hat{\varPhi }} = {\hat{G}}^{+}\cdot J^{+} = ({\hat{G}}'\cdot {\hat{G}})^{-1}\cdot {\hat{G}}'.J^{+} \end{aligned}$$
(14)

ELM method is much quicker than conventional gradient based methods. To achieve minimum training error and least norm weight, it is also necessary to include proper selection of weight initialization and activation functions. The details of the proposed ELM based algorithm are described in Algorithm 1.

figure c

5 Simulation Results

Here we present tests that evaluate the performance of the proposed technique compared with some current state of the art algorithms. Similar to [42, 43, 54], a setup was developed to aid in the development and testing of the proposed method. To perform simulation we consider a total of 10 CR users with 4 randomly chosen MUs, and 6 normal SUs. PU signal is modelled as a Gaussian random variable. The channel between PU and SU is assumed to be Rayleigh flat fading. The total number of samples was 100, and 20000 iterations were performed for each user to create an energy vector. The used bandwidth is 6 MHz based on the IEEE 802.22 standard. The probability of PU being in active and idle state is \(P\left( {{\mathcal {H}}}_1\right)\) and \(P\left( {{\mathcal {H}}}_0\right)\), respectively. For all the simulations, parameters are set as follows: \({\sigma }^2=1\), \(\alpha =4\), \(P\left( {{\mathcal {H}}}_0\right) =0.5\) and \(P\left( {{\mathcal {H}}}_1\right) =0.5\). The proposed ELM based scheme is having a single hidden layer with 5 hidden nodes.

First we checked the performance of the ELM in terms of accuracy with varying values of number of neurons. The number of neuron value is varied between 0 to 50. It is evident from Fig. 3 that the testing accuracy achieved is better compare to the training accuracy. This highlights that the classification achieved from the ELM is accurate. Next to adopt an activation function (AF), we check the ROC performance of the ELM based algorithm for different AFs. From Fig. 4 we can see that the BentIde is providing best results followed by the Sigmoid. Throughout this article we adopted Sigmoid AF and Relu weight initialization scheme (WIS) for performance evaluation.

Fig. 3
figure 3

Accuracy performance of the proposed schemes, signifying correct classification. Comparison is made with varying number of neurons

Fig. 4
figure 4

Variation of probability of detection \(P_d\) for different activation function

The simulation results are presented in two sections. First, we present the results for the proposed scheme based on the different cases of attacks in the network namely, a) MUs absent, b) AYMUs present, c) ANMUs present, and d) RMUs present. Secondly, the performance of the proposed ELM-based approach is compared with other schemes in the literature. The significance of the proposed technique is highlighted using the receiver operating characteristics (ROC) curve. The energy values obtained from the spectrum sensing for normal users is utilized for plotting the ROC. It is worth mentioning here that the energy value achieved is higher in case of AYMU, that signifies the PU absence. The lower energy value for the ANMU signifies the PU presence. Whereas, in the RMU energy level lies in the mid region signifying the behaviours of AYMU and ANMU alternatively with probability \(1-P\left( {{\mathcal {H}}}_0\right)\).

We evaluated the performance of proposed ELM based scheme in case of AYMU, ANMU and RMU attacks present in the network. The results are presented in the figures 57. We compared the performance of the proposed scheme with other techniques like SVM [42], K-means [36], Naive Bayesian (NB), Gaussian mixture model (GMM) and the traditional energy detection (ED) [55]. In Fig. 5 the ROC curve of the proposed ELM-based approach for AYMU attack is presented and compared with the existing schemes in literature. From the figure it is clear that the proposed approach obtains similar results like the SVM [42] based approach. Whereas, compare to the K-means [36], GMM, NB, and ED [55], it performs superiorly. This highlights that the proposed approach effectively classifies the normal SUs and the AYMUs. It is worth to mention here that both the SVM and proposed ELM based approach are supervised learning approaches and the actual status of the channel will known to the FC via a labelled data. Hence the identical performance is justified.

Fig. 5
figure 5

Comparison of ROC performance for different techniques (AYMU attack)

Fig. 6 presents the ROC curve for different techniques in case of ANMU attack in the network. We compare the performance of the proposed approach with other schemes in the literature. From the figure it is clear that the proposed approach obtains similar results like the SVM based approach [42]. Whereas, compare to the K-means [36], GMM, NB and ED [55] it performs superiorly. This highlights that the proposed approach effectively classifies the normal SUs and the ANMUs. One interesting observation is that the ROC performance for all the approaches including the proposed one is decreased. This is due to the fact that the energy level received in case of ANMU is less compare to the AYMU.

Fig. 6
figure 6

Comparison of ROC performance for different techniques (ANMU attack)

Figure 7 present the ROC curve for different techniques in case of RMUs in the network. We compared the performance of proposed techniques with other schemes. From figure we can see that the proposed ELM based approach achieves identical performance like SVM [42], and outperforms all the other K-means [36], GMM, NB, and ED approaches [55]. This represents that the classification achieved in the proposed approach is accurate and legitimate users are successfully separated from the MUs. Moreover, the risk involved in RMUs consideration is significantly reduced. It is worth noting that the performance of all the approaches reduced compared to the AYMU and ANMU cases. This is due to fact that some random MUs present in the network will send low values of sensing information. Whereas, some random MUs will send higher values of sensing information irrespective of the locally determined results.

Fig. 7
figure 7

Comparison of ROC performance for different techniques (RMU attack)

The bar plot in Fig. 8 presents the comparison of training time spent for different techniques for varying number of samples. We selected 100 and 500 number of samples for the comparison. The result demonstrates that the training time increases for increasing number of samples value. It was found that among the competitive techniques only ELM (proposed method) and NB presents approximately a constant training time for increased value of samples. Whereas, the SVM technique [42] takes greater time to train the data samples. The results highlight the improved performance of the proposed algorithm to training a dataset quickly compare to the other competitive techniques.

Fig. 8
figure 8

Comparison of training time for different techniques as varying number of samples \(K = 100, 500\)

The results presented above were for Sigmoid function and ReLu Scheme. However, different AFs are available in the literature and there is a possibility of achieving different performance for different set of parameter selection. For achieving a concrete outcome, timing analysis for different set of parameters must be taken into account. Hence we presented a detailed timing analysis for different combination of AF and WIS. The detailed results are provided in Table 2. It is evident from Table 2, that area under curve (AUC) results are efficient for Xavier and ReLu scheme. Moreover, Sigmoid and Tanh functions are providing better performance. However, in case of no AF, performance of each WIS is similar. This represents the worth of selecting a proper AF for performance measurement.

Table 2 Timing analysis of the proposed approach for different activation function

5.1 Discussion

The proposed technique falls under the supervised ML domain, however the simple structure in terms of complexity and improved training time is an added advantage. The technique can be successfully applied to real world scenarios. The present work concerned with providing a improved trade-off between MUs identification and training time, and the objective is achieved. However the present work can be extended for real-time applications to build for a future scope. Another possibility is to apply optimization algorithm to achieve the best possible weight and optimal parameters for ELM technique. This will further improve the performance of the algorithm.

6 Conclusion

In this study, we presented a simple technique based on ELM algorithm to alleviate the malicious users attack in a cooperative spectrum sensing scenario. In conventional ML based spectrum sensing techniques, the classification results are seems to be satisfactory, however the increased computational time is an issue to consider. Proposed ELM based technique achieves similar results like other ML techniques with significant improvement in the computational time. It is clear from the presented results, that the proposed approach is better in terms of training time performance. Most importantly, proposed approach provides better trade-off than the other competitive schemes. However, the proposed approach is having some shortcomings such as a high number of hidden nodes are required in ELM to achieve better result. This signifies the adopted model is memorizing the data in place of prediction to provide the results. The authors will further analysed this shortcoming in the future work to improve the performance.