36 research outputs found

    A Stochastic based Physical Layer Security in Cognitive Radio Networks: Cognitive Relay to Fusion Center

    Get PDF
    © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Cognitive radio networks (CRNs) are found to be, without difficulty wide-open to external malicious threats. Secure communication is an important prerequisite for forthcoming fifth-generation (5G) systems, and CRs are not exempt. A framework for developing the accomplishable benefits of physical layer security (PLS) in an amplify-andforward cooperative spectrum sensing (AF-CSS) in a cognitive radio network (CRN) using a stochastic geometry is proposed. In the CRN the spectrum sensing data from secondary users (SU) are collected by a fusion center (FC) with the assistance of access points (AP) as cognitive relays, and when malicious eavesdropping SU are listening. In this paper we focus on the secure transmission of active APs relaying their spectrum sensing data to the FC. Closed expressions for the average secrecy rate are presented. Analytical formulations and results substantiate our analysis and demonstrate that multiple antennas at the APs is capable of improving the security of an AF-CSSCRN. The obtained numerical results also show that increasing the number of FCs, leads to an increase in the secrecy rate between the AP and its correlated FC

    Vehicle Networks: Statistical and Game Theoretic Approaches to Their Evaluation and Design

    Get PDF
    Vehicle ad hoc networks (VANETs) have become a popular topic in modern research. The main advantages of these networks include: improved security, traffic optimization, and infotainment. However, deploying such networks in practice requires extensive infrastructure. To estimate the network load, one needs to have information about the network, such as the number of clusters, cluster size, etc. Since VANETs are formed by vehicles that rapidly change their location, the network topology is constantly changing, making its analysis by deterministic methods impossible. Therefore, in this dissertation, we use probability theory methods to obtain probability distributions of such fundamental network properties, such as the number of clusters, cluster size, and the number of disconnected vehicles in the case in which the vehicles are located on a highway. In previous articles, some of these characteristics are obtained only in terms of average values, while the total distributions remained unknown. The distribution of the largest cluster size is an important characteristic of the network. It is derived in the dissertation for the first time. We also study the distribution of the number of clusters and the size of the average cluster in the case of a 2D map with an almost arbitrary road topology. To the best of our knowledge, these results are the first for such a general map case. Studying these properties raises a number of new questions about how these network properties change over time. We obtain distributions of the network characteristics, such as the duration of communication between vehicles, and the duration of cluster existence. We also derive the probability that a cluster exists between two time moments, as well as other network properties. The obtained distributions are new in the case of the Markov channel model. The results regarding the distribution of cluster lifetime and the probability of cluster existence between two fixed time moments are obtained in the literature for the first time. This dissertation also addresses the security aspect of VANET. We consider single and multichannel anti-jamming games in the case in which two communicating vehicles are being pursued by the jammer, which tries to disrupt the communication. The optimal strategies of the vehicles and the jammer are described as the Nash equilibrium of this game. We prove theorems that express Nash equilibrium through communication parameters. The considered model with quadratic power term is new as well as the results regarding the Nash equilibrium in the single and multichannel cases. We also first examine performance of such state-of-the-art machine learning algorithms as Dueling Q-learning and Double Q-learning, which by trial and error, successfully converge to the Nash equilibrium, deduced theoretically

    A Stochastic Method to Physical Layer Security of an Amplify-and-Forward Spectrum Sensing in Cognitive Radio Networks: Secondary User to Relay

    Get PDF
    In this paper, a framework for capitalizing on the potential benefits of physical layer security in an amplify-and-forward cooperative spectrum sensing (AF-CSS) in a cognitive radio network (CRN) using a stochastic geometry is proposed. In the CRN network the sensing data from secondary users (SUs) are collected by a fusion center (FC) with the help of access points (AP) as relays, and when malicious eavesdropping secondary users (SUs) are listening. We focus on the secure transmission of active SUs transmitting their sensing data to the AP. Closed expressions for the average secrecy rate are presented. Numerical results corroborate our analysis and show that multiple antennas at the APs can enhance the security of the AF-CSS-CRN. The obtained numerical results show that average secrecy rate between the AP and its correlated FC decreases when the number of AP is increased. Nevertheless, we find that an increase in the number of AP initially increases the overall average secrecy rate, with a perilous value at which the overall average secrecy rate then decreases. While increasing the number of active SUs, there is a decrease in the secrecy rate between the sensor and its correlated AP.Final Accepted Versio

    On Distribution-Preserving Mitigation Strategies for Communication under Cognitive Adversaries

    Full text link
    In wireless security, cognitive adversaries are known to inject jamming energy on the victim's frequency band and monitor the same band for countermeasures thereby trapping the victim. Under the class of cognitive adversaries, we propose a new threat model wherein the adversary, upon executing the jamming attack, measures the long-term statistic of Kullback-Leibler Divergence (KLD) between its observations over each of the network frequencies before and after the jamming attack. To mitigate this adversary, we propose a new cooperative strategy wherein the victim takes the assistance for a helper node in the network to reliably communicate its message to the destination. The underlying idea is to appropriately split their energy and time resources such that their messages are reliably communicated without disturbing the statistical distribution of the samples in the network. We present rigorous analyses on the reliability and the covertness metrics at the destination and the adversary, respectively, and then synthesize tractable algorithms to obtain near-optimal division of resources between the victim and the helper. Finally, we show that the obtained near-optimal division of energy facilitates in deceiving the adversary with a KLD estimator.Comment: Presented at IEEE ISIT 202

    Defeating Proactive Jammers Using Deep Reinforcement Learning for Resource-Constrained IoT Networks

    Full text link
    Traditional anti-jamming techniques like spread spectrum, adaptive power/rate control, and cognitive radio, have demonstrated effectiveness in mitigating jamming attacks. However, their robustness against the growing complexity of internet-of-thing (IoT) networks and diverse jamming attacks is still limited. To address these challenges, machine learning (ML)-based techniques have emerged as promising solutions. By offering adaptive and intelligent anti-jamming capabilities, ML-based approaches can effectively adapt to dynamic attack scenarios and overcome the limitations of traditional methods. In this paper, we propose a deep reinforcement learning (DRL)-based approach that utilizes state input from realistic wireless network interface cards. We train five different variants of deep Q-network (DQN) agents to mitigate the effects of jamming with the aim of identifying the most sample-efficient, lightweight, robust, and least complex agent that is tailored for power-constrained devices. The simulation results demonstrate the effectiveness of the proposed DRL-based anti-jamming approach against proactive jammers, regardless of their jamming strategy which eliminates the need for a pattern recognition or jamming strategy detection step. Our findings present a promising solution for securing IoT networks against jamming attacks and highlights substantial opportunities for continued investigation and advancement within this field

    A Game Theoretic Approach to Modelling Jamming Attacks in Delay Tolerant Networks

    Get PDF
    Cyberspace plays a prominent role in our social, economic and civic welfare and cyber security issues are of paramount importance today. Growing reliance of the intertwined military and civilian applications on wireless computer networks makes these networks highly vulnerable to attacks of which jamming attacks are a vital and exigent problem. In this paper, we study defence against jamming attacks as game in a delay tolerant network, with two adversarial players: the jammer playing against the transmitter. The transmitters seek to choose an optimal time to schedule his transmission securely, so as to maximize the probability of successful delivery before his session expires, while these transmissions are subject to inference from the jammer, who attempts to minimize this probability . We design strategies for the transmitters that offset transmission period based inference of network traffic by the jammer. We model these interactions and decisions as a game and use simulation as a tool to evaluate the games. Probability distribution functions over finite set of strategies are proposed to compute the expected payoff of both the players. Simulation results are used to evaluate the expected payoff along with the resulting equilibrium in cases where players are biased and unbiased. These results are used to strategically decide on the optimal time for both the players, and evaluate the efficiency of the strategies used by the transmitters against jammer attacks.
    corecore