1,289 research outputs found
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the
spectrum sensing data falsification (SSDF) attack in the literature, is one of
the key adversaries to the success of cognitive radio networks (CRNs). In the
past couple of years, the research on the Byzantine attack and defense
strategies has gained worldwide increasing attention. In this paper, we provide
a comprehensive survey and tutorial on the recent advances in the Byzantine
attack and defense for CSS in CRNs. Specifically, we first briefly present the
preliminaries of CSS for general readers, including signal detection
techniques, hypothesis testing, and data fusion. Second, we analyze the spear
and shield relation between Byzantine attack and defense from three aspects:
the vulnerability of CSS to attack, the obstacles in CSS to defense, and the
games between attack and defense. Then, we propose a taxonomy of the existing
Byzantine attack behaviors and elaborate on the corresponding attack
parameters, which determine where, who, how, and when to launch attacks. Next,
from the perspectives of homogeneous or heterogeneous scenarios, we classify
the existing defense algorithms, and provide an in-depth tutorial on the
state-of-the-art Byzantine defense schemes, commonly known as robust or secure
CSS in the literature. Furthermore, we highlight the unsolved research
challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral
Performance Analysis of Secondary Users in Heterogeneous Cognitive Radio Network
Continuous increase in wireless subscriptions and static allocation of wireless frequency bands to the primary users (PUs) are fueling the radio frequency (RF) shortage problem. Cognitive radio network (CRN) is regarded as a solution to this problem as it utilizes the scarce RF in an opportunisticmanner to increase the spectrumefficiency. InCRN, secondary users (SUs) are allowed to access idle frequency bands opportunistically without causing harmful interference to the PUs. In CRN, the SUs determine the presence of PUs through spectrum sensing and access idle bands by means of dynamic spectrum access. Spectrum sensing techniques available in the literature do not consider mobility. One of the main objectives of this thesis is to include mobility of SUs in spectrum sensing. Furthermore, due to the physical characteristics of CRN where licensed RF bands can be dynamically accessed by various unknown wireless devices, security is a growing concern. This thesis also addresses the physical layer security issues in CRN. Performance of spectrum sensing is evaluated based on probability of misdetection and false alarm, and expected overlapping time, and performance of SUs in the presence of attackers is evaluated based on secrecy rates
Spectrum Sensing and Security Challenges and Solutions: Contemporary Affirmation of the Recent Literature
Cognitive radio (CR) has been recently proposed as a promising technology to improve spectrum utilization by enabling secondary access to unused licensed bands. A prerequisite to this secondary access is having no interference to the primary system. This requirement makes spectrum sensing a key function in cognitive radio systems. Among common spectrum sensing techniques, energy detection is an engaging method due to its simplicity and efficiency. However, the major disadvantage of energy detection is the hidden node problem, in which the sensing node cannot distinguish between an idle and a deeply faded or shadowed band. Cooperative spectrum sensing (CSS) which uses a distributed detection model has been considered to overcome that problem. On other dimension of this cooperative spectrum sensing, this is vulnerable to sensing data falsification attacks due to the distributed nature of cooperative spectrum sensing. As the goal of a sensing data falsification attack is to cause an incorrect decision on the presence/absence of a PU signal, malicious or compromised SUs may intentionally distort the measured RSSs and share them with other SUs. Then, the effect of erroneous sensing results propagates to the entire CRN. This type of attacks can be easily launched since the openness of programmable software defined radio (SDR) devices makes it easy for (malicious or compromised) SUs to access low layer protocol stacks, such as PHY and MAC. However, detecting such attacks is challenging due to the lack of coordination between PUs and SUs, and unpredictability in wireless channel signal propagation, thus calling for efficient mechanisms to protect CRNs. Here in this paper we attempt to perform contemporary affirmation of the recent literature of benchmarking strategies that enable the trusted and secure cooperative spectrum sensing among Cognitive Radios
Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter
Cognitive radio technology addresses the problem of spectrum scarcity by
allowing secondary users to use the vacant spectrum bands without causing
interference to the primary users. However, several attacks could disturb the
normal functioning of the cognitive radio network. Primary user emulation
attacks are one of the most severe attacks in which a malicious user emulates
the primary user signal characteristics to either prevent other legitimate
secondary users from accessing the idle channels or causing harmful
interference to the primary users. There are several proposed approaches to
detect the primary user emulation attackers. However, most of these techniques
assume that the primary user location is fixed, which does not make them valid
when the primary user is mobile. In this paper, we propose a new approach based
on the Kalman filter framework for detecting the primary user emulation attacks
with a non-stationary primary user. Several experiments have been conducted and
the advantages of the proposed approach are demonstrated through the simulation
results.Comment: 14 pages, 9 figure
A Study on Techniques/Algorithms used for Detection and Prevention of Security Attacks in Cognitive Radio Networks
In this paper a detailed survey is carried out on the taxonomy of Security Issues, Advances on Security Threats and Countermeasures ,A Cross-Layer Attack, Security Status and Challenges for Cognitive Radio Networks, also a detailed survey on several Algorithms/Techniques used to detect and prevent SSDF(Spectrum Sensing Data Falsification) attack a type of DOS (Denial of Service) attack and several other  Network layer attacks in Cognitive Radio Network or Cognitive Radio Wireless Sensor Node Networks(WSNN’s) to analyze the advantages and disadvantages of those existing algorithms/techniques
AN INVESTIGATION OF SECURITY CHALLENGES IN COGNITIVE RADIO NETWORKS
The recent advances in wireless communication have led to the problem of growing spectrum scarcity. The available wireless spectrum has become scarcer due to increasing spectrum demand for new wireless applications. The large portion of the allocated spectrum is sporadically used leading to underutilization of significant amount of spectrum. To improve the spectrum efficiency, the idea of cognitive radio technology was introduced. This concept of cognitive radio provides a promising solution for the spectrum scarcity issues in wireless networks. Meanwhile, the security issues of cognitive radio have received more attentions recently since the inherent properties of CR networks would pose new challenges to wireless communications. In this MS thesis, general concepts of security threats to the cognitive radio networks are briefly reviewed. Performances for primary user emulation attacks are studied from Neyman-Pearson criterion point of view. A novel system model with different configurations of the primary users has been proposed and studied. Our experimental results demonstrate the statistical characteristics of the probability of false alarm and miss detection in the proposed system. I will make performance comparison with others’ research in the future.
Adviser: Yaoqing Yan
AN INVESTIGATION OF SECURITY CHALLENGES IN COGNITIVE RADIO NETWORKS
The recent advances in wireless communication have led to the problem of growing spectrum scarcity. The available wireless spectrum has become scarcer due to increasing spectrum demand for new wireless applications. The large portion of the allocated spectrum is sporadically used leading to underutilization of significant amount of spectrum. To improve the spectrum efficiency, the idea of cognitive radio technology was introduced. This concept of cognitive radio provides a promising solution for the spectrum scarcity issues in wireless networks. Meanwhile, the security issues of cognitive radio have received more attentions recently since the inherent properties of CR networks would pose new challenges to wireless communications. In this MS thesis, general concepts of security threats to the cognitive radio networks are briefly reviewed. Performances for primary user emulation attacks are studied from Neyman-Pearson criterion point of view. A novel system model with different configurations of the primary users has been proposed and studied. Our experimental results demonstrate the statistical characteristics of the probability of false alarm and miss detection in the proposed system. I will make performance comparison with others’ research in the future.
Adviser: Yaoqing Yan
- …