169 research outputs found

    Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

    Full text link
    The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). In the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we analyze the spear and shield relation between Byzantine attack and defense from three aspects: the vulnerability of CSS to attack, the obstacles in CSS to defense, and the games between attack and defense. Then, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Next, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we highlight the unsolved research challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral

    Secure Federated Learning for Cognitive Radio Sensing

    Full text link
    This paper considers reliable and secure Spectrum Sensing (SS) based on Federated Learning (FL) in the Cognitive Radio (CR) environment. Motivation, architectures, and algorithms of FL in SS are discussed. Security and privacy threats on these algorithms are overviewed, along with possible countermeasures to such attacks. Some illustrative examples are also provided, with design recommendations for FL-based SS in future CRs.Comment: 7 pages, 6 figure

    Network Science for IoT

    Get PDF
    The research work presented in this thesis is based on the concept and defintion of network that can spread in several and different real world contexts. Indeed, we can refer to a network in a telecommunications sense considering a collection of transmitters, receivers, and communication channels that send or are used to send information to one another. However, as a matter of fact, in nature there are other several examples of networks: the human brain is one of them. The relationship between the actors in Hollywood can be studied in terms of network as well, a generic social community can be compared to a network, eco-systems are networks of species. The recent Network Science aims at studying all these systems using a set of common mathematical methods. In the following of the thesis, we will focus on some of well known telecommunications networks issues using standard telecommunications procedures to address them, with relevant reference to video flow transmissions and management of electric vehicles networks. At the same time, different models aiming at reach the same goals in contexts that may differ from a telecommunications setup can be used. In more details, we will evaluate queueing systems, jamming problems, groups recognition in networks, and mobile computing using game theoretic approaches. It is worth noting that this aspect can be also seen in a reverse order. Indeed, we will discuss how standard telecommunications analysis can be used to investigate on problems not directly related to a telecommunications background. In particular, one of our future purposes is to investigate on the brain connectivity that is raising significant interest in the recent scientific society

    Cognitive Radio Systems

    Get PDF
    Cognitive radio is a hot research area for future wireless communications in the recent years. In order to increase the spectrum utilization, cognitive radio makes it possible for unlicensed users to access the spectrum unoccupied by licensed users. Cognitive radio let the equipments more intelligent to communicate with each other in a spectrum-aware manner and provide a new approach for the co-existence of multiple wireless systems. The goal of this book is to provide highlights of the current research topics in the field of cognitive radio systems. The book consists of 17 chapters, addressing various problems in cognitive radio systems

    Game Theory for Multi-Access Edge Computing:Survey, Use Cases, and Future Trends

    Get PDF
    Game theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse players with conflicting goals. This paper primarily surveys the literature that has applied theoretical games to wireless networks, emphasizing use cases of upcoming multiaccess edge computing (MEC). MEC is relatively new and offers cloud services at the network periphery, aiming to reduce service latency backhaul load, and enhance relevant operational aspects such as quality of experience or security. Our presentation of GT is focused on the major challenges imposed by MEC services over the wireless resources. The survey is divided into classical and evolutionary games. Then, our discussion proceeds to more specific aspects which have a considerable impact on the game's usefulness, namely, rational versus evolving strategies, cooperation among players, available game information, the way the game is played (single turn, repeated), the game's model evaluation, and how the model results can be applied for both optimizing resource-constrained resources and balancing diverse tradeoffs in real edge networking scenarios. Finally, we reflect on lessons learned, highlighting future trends and research directions for applying theoretical model games in upcoming MEC services, considering both network design issues and usage scenarios

    Cyber Law and Espionage Law as Communicating Vessels

    Get PDF
    Professor Lubin\u27s contribution is Cyber Law and Espionage Law as Communicating Vessels, pp. 203-225. Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws attention to the similarities between the practices – the fact that the actors, technologies, and targets are interchangeable, as are the knee-jerk legal reactions of the international community. In light of the convergence between peacetime Low-Intensity Cyber Operations (LICOs) and peacetime Espionage Operations (EOs) the two should be subjected to a single regulatory framework, one which recognizes the role intelligence plays in our public world order and which adopts a contextual and consequential method of inquiry. The paper proceeds in the following order: Part 2 provides a descriptive account of the unique symbiotic relationship between espionage and cyber law, and further explains the reasons for this dynamic. Part 3 places the discussion surrounding this relationship within the broader discourse on IW, making the claim that the convergence between EOs and LICOs, as described in Part 2, could further be explained by an even larger convergence across all the various elements of the informational environment. Parts 2 and 3 then serve as the backdrop for Part 4, which details the attempt of the drafters of the Tallinn Manual 2.0 to compartmentalize espionage law and cyber law, and the deficits of their approach. The paper concludes by proposing an alternative holistic understanding of espionage law, grounded in general principles of law, which is more practically transferable to the cyber realmhttps://www.repository.law.indiana.edu/facbooks/1220/thumbnail.jp

    CLASSIFYING AND RESPONDING TO NETWORK INTRUSIONS

    Get PDF
    Intrusion detection systems (IDS) have been widely adopted within the IT community, as passive monitoring tools that report security related problems to system administrators. However, the increasing number and evolving complexity of attacks, along with the growth and complexity of networking infrastructures, has led to overwhelming numbers of IDS alerts, which allow significantly smaller timeframe for a human to respond. The need for automated response is therefore very much evident. However, the adoption of such approaches has been constrained by practical limitations and administrators' consequent mistrust of systems' abilities to issue appropriate responses. The thesis presents a thorough analysis of the problem of intrusions, and identifies false alarms as the main obstacle to the adoption of automated response. A critical examination of existing automated response systems is provided, along with a discussion of why a new solution is needed. The thesis determines that, while the detection capabilities remain imperfect, the problem of false alarms cannot be eliminated. Automated response technology must take this into account, and instead focus upon avoiding the disruption of legitimate users and services in such scenarios. The overall aim of the research has therefore been to enhance the automated response process, by considering the context of an attack, and investigate and evaluate a means of making intelligent response decisions. The realisation of this objective has included the formulation of a response-oriented taxonomy of intrusions, which is used as a basis to systematically study intrusions and understand the threats detected by an IDS. From this foundation, a novel Flexible Automated and Intelligent Responder (FAIR) architecture has been designed, as the basis from which flexible and escalating levels of response are offered, according to the context of an attack. The thesis describes the design and operation of the architecture, focusing upon the contextual factors influencing the response process, and the way they are measured and assessed to formulate response decisions. The architecture is underpinned by the use of response policies which provide a means to reflect the changing needs and characteristics of organisations. The main concepts of the new architecture were validated via a proof-of-concept prototype system. A series of test scenarios were used to demonstrate how the context of an attack can influence the response decisions, and how the response policies can be customised and used to enable intelligent decisions. This helped to prove that the concept of flexible automated response is indeed viable, and that the research has provided a suitable contribution to knowledge in this important domain

    Interference charecterisation, location and bandwidth estimation in emerging WiFi networks

    Get PDF
    Wireless LAN technology based on the IEEE 802.11 standard, commonly referred to as WiFi, has been hugely successful not only for the last hop access to the Internet in home, office and hotspot scenarios but also for realising wireless backhaul in mesh networks and for point -to -point long- distance wireless communication. This success can be mainly attributed to two reasons: low cost of 802.11 hardware from reaching economies of scale, and operation in the unlicensed bands of wireless spectrum.The popularity of WiFi, in particular for indoor wireless access at homes and offices, has led to significant amount of research effort looking at the performance issues arising from various factors, including interference, CSMA/CA based MAC protocol used by 802.11 devices, the impact of link and physical layer overheads on application performance, and spatio-temporal channel variations. These factors affect the performance of applications and services that run over WiFi networks. In this thesis, we experimentally investigate the effects of some of the above mentioned factors in the context of emerging WiFi network scenarios such as multi- interface indoor mesh networks, 802.11n -based WiFi networks and WiFi networks with virtual access points (VAPs). More specifically, this thesis comprises of four experimental characterisation studies: (i) measure prevalence and severity of co- channel interference in urban WiFi deployments; (ii) characterise interference in multi- interface indoor mesh networks; (iii) study the effect of spatio-temporal channel variations, VAPs and multi -band operation on WiFi fingerprinting based location estimation; and (iv) study the effects of newly introduced features in 802.11n like frame aggregation (FA) on available bandwidth estimation.With growing density of WiFi deployments especially in urban areas, co- channel interference becomes a major factor that adversely affects network performance. To characterise the nature of this phenomena at a city scale, we propose using a new measurement methodology called mobile crowdsensing. The idea is to leverage commodity smartphones and the natural mobility of people to characterise urban WiFi co- channel interference. Specifically, we report measurement results obtained for Edinburgh, a representative European city, on detecting the presence of deployed WiFi APs via the mobile crowdsensing approach. These show that few channels in 2.4GHz are heavily used and there is hardly any activity in the 5GHz band even though relatively it has a greater number of available channels. Spatial analysis of spectrum usage reveals that co- channel interference among nearby APs operating in the same channel can be a serious problem with around 10 APs contending with each other in many locations. We find that the characteristics of WiFi deployments at city -scale are similar to those of WiFi deployments in public spaces of different indoor environments. We validate our approach in comparison with wardriving, and also show that our findings generally match with previous studies based on other measurement approaches. As an application of the mobile crowdsensing based urban WiFi monitoring, we outline a cloud based WiFi router configuration service for better interference management with global awareness in urban areas.For mesh networks, the use of multiple radio interfaces is widely seen as a practical way to achieve high end -to -end network performance and better utilisation of available spectrum. However this gives rise to another type of interference (referred to as coexistence interference) due to co- location of multiple radio interfaces. We show that such interference can be so severe that it prevents concurrent successful operation of collocated interfaces even when they use channels from widely different frequency bands. We propose the use of antenna polarisation to mitigate such interference and experimentally study its benefits in both multi -band and single -band configurations. In particular, we show that using differently polarised antennas on a multi -radio platform can be a helpful counteracting mechanism for alleviating receiver blocking and adjacent channel interference phenomena that underlie multi -radio coexistence interference. We also validate observations about adjacent channel interference from previous studies via direct and microscopic observation of MAC behaviour.Location is an indispensable information for navigation and sensing applications. The rapidly growing adoption of smartphones has resulted in a plethora of mobile applications that rely on position information (e.g., shopping apps that use user position information to recommend products to users and help them to find what they want in the store). WiFi fingerprinting is a popular and well studied approach for indoor location estimation that leverages the existing WiFi infrastructure and works based on the difference in strengths of the received AP signals at different locations. However, understanding the impact of WiFi network deployment aspects such as multi -band APs and VAPs has not received much attention in the literature. We first examine the impact of various aspects underlying a WiFi fingerprinting system. Specifically, we investigate different definitions for fingerprinting and location estimation algorithms across different indoor environments ranging from a multi- storey office building to shopping centres of different sizes. Our results show that the fingerprint definition is as important as the choice of location estimation algorithm and there is no single combination of these two that works across all environments or even all floors of a given environment. We then consider the effect of WiFi frequency bands (e.g., 2.4GHz and 5GHz) and the presence of virtual access points (VAPs) on location accuracy with WiFi fingerprinting. Our results demonstrate that lower co- channel interference in the 5GHz band yields more accurate location estimation. We show that the inclusion of VAPs has a significant impact on the location accuracy of WiFi fingerprinting systems; we analyse the potential reasons to explain the findings.End -to -end available bandwidth estimation (ABE) has a wide range of uses, from adaptive application content delivery, transport-level transmission rate adaptation and admission control to traffic engineering and peer node selection in peer -to- peer /overlay networks [ 1, 2]. Given its importance, it has been received much research attention in both wired data networks and legacy WiFi networks (based on 802.11 a/b /g standards), resulting in different ABE techniques and tools proposed to optimise different criteria and suit different scenarios. However, effects of new MAC/PHY layer enhancements in new and next generation WiFi networks (based on 802.11n and 802.11ac standards) have not been studied yet. We experimentally find that among different new features like frame aggregation, channel bonding and MIMO modes (spacial division multiplexing), frame aggregation has the most harmful effect as it has direct effect on ABE by distorting the measurement probing traffic pattern commonly used to estimate available bandwidth. Frame aggregation is also specified in both 802.11n and 802.1 lac standards as a mandatory feature to be supported. We study the effect of enabling frame aggregation, for the first time, on the performance of the ABE using an indoor 802.11n wireless testbed. The analysis of results obtained using three tools - representing two main Probe Rate Model (PRM) and Probe Gap Model (PGM) based approaches for ABE - led us to come up with the two key principles of jumbo probes and having longer measurement probe train sizes to counter the effects of aggregating frames on the performance of ABE tools. Then, we develop a new tool, WBest+ that is aware of the underlying frame aggregation by incorporating these principles. The experimental evaluation of WBest+ shows more accurate ABE in the presence of frame aggregation.Overall, the contributions of this thesis fall in three categories - experimental characterisation, measurement techniques and mitigation/solution approaches for performance problems in emerging WiFi network scenarios. The influence of various factors mentioned above are all studied via experimental evaluation in a testbed or real - world setting. Specifically, co- existence interference characterisation and evaluation of available bandwidth techniques are done using indoor testbeds, whereas characterisation of urban WiFi networks and WiFi fingerprinting based location estimation are carried out in real environments. New measurement approaches are also introduced to aid better experimental evaluation or proposed as new measurement tools. These include mobile crowdsensing based WiFi monitoring; MAC/PHY layer monitoring of co- existence interference; and WBest+ tool for available bandwidth estimation. Finally, new mitigation approaches are proposed to address challenges and problems identified throughout the characterisation studies. These include: a proposal for crowd - based interference management in large scale uncoordinated WiFi networks; exploiting antenna polarisation diversity to remedy the effects of co- existence interference in multi -interface platforms; taking advantage of VAPs and multi -band operation for better location estimation; and introducing the jumbo frame concept and longer probe train sizes to improve performance of ABE tools in next generation WiFi networks
    corecore