A Learning Method for Secondary Users to minimize the effect of Jamming in Cognitive Radio Wireless Sensor-Networks State of the art in CR-WSN security (original) (raw)
Related papers
Game theoretic approach to mitigate security attacks in "Cognitive Radio Networks"
The Spectrum utilization demand due to large number of growth of wireless users that has led to spectrum shortage problem and that is expected to increase more and more by years. Thus, the technology that identified the spectrum shortage is known as Cognitive Radio. It solves the spectrum shortage problem by allowing unauthorized users to consume the spectral resources when Primary Users (PU) is not active. Its main function of Cognitive Radio Networks (CRNs) is Spectrum sensing and also to identified the unused licensed spectrum bands and also to protect the transmissions of primary users (PUs). In Cognitive Radio Networks, the jamming attack is one of the major threats, where several malicious attackers intend to stop the communications of secondary users by giving disturbance. In this project, evolutionary game has been used to applied in order to minimise the attack.
IEEE Transactions on Cognitive Communications and Networking, 2018
Cognitive Radio Network (CRN) enables secondary users to borrow unused spectrum from the proprietary users in a dynamic and opportunistic manner. However, dynamic and open access nature of available spectrum brings a severe sustenance challenge amongst CRNs which makes them vulnerable to various spectrum etiquette attacks. Jamming-based denial-of-service (DoS) attack poses serious threats to legitimate communications and packet delivery. A rational attacker targets specific transmission characteristics to find the highest impacting connection of CRN and causes maximum disruption. With the help of software-defined radios, we have shown that an attacker can intelligently target a particular communication. In this paper, inspired by the honeypot concept in cybercrime, we propose a honeynet based defense mechanism, which aims to deter the attacker from jamming legitimate communications. The honeynet passively learns the attacker's strategy from the history of attacks and actively adapts preemptive decoy mechanisms to prevent attacks on legitimate communications. Simulation results show that the with the help of honeynet mechanism, CRN successfully avoids jamming attacks and thereby improves system performance regarding packet delivery ratio. We further built a prototype using off-the-shelf software defined radio that proves the effectiveness of the proposed mechanism.
AN EFFICIENT COMMUNICATION AND SECURITY FOR COGNITIVE RADIO NETWORKS
A cognitive radio(CR) is a transceiver which automatically detects available channels in wireless spectrum and accordingly changes its transmission or reception parameters. In this paper, it proposes an algorithm for the energy-efficient and spectrum-aware communications requirements in CR network. It enables each node to determine and regulate its transmission strategy to provide minimum energy consumption without sacrificing end-toend delay performance and also maximizes overall spectrum utilization. Spectrum sensing is one of the essential parameter to be considered in CR networks. Therefore, the security aspect of spectrum sensing should be addressed well. Using a Trust-Worthy algorithm, it improves the trustworthiness of the Spectrum sensing in CR-Networks. It implemented using Network Simulator-2.
Mitigating Intrusion and Vulnerabilities in Cognitive Radio Networks
The deployment of Cognitive Radio Networks has been greatly hindered in spite of its potentials by the rate at which intrusions and vulnerabilities replicate within every domain of the network. Cognitive Radio Network is expected to drive the next generation wireless networks that can optimize the use of spectrum due to its unique and dynamic properties, but the high rate of intrusions has frustrated all the efforts of this promising network. Hence, there is need for a more investigation on better security measures to be employed in the network. Therefore, this paper proposes the design and implementation of an Intrusion Detection and Prevention Framework (IDPF) that monitors and analyses all inbound and outbound traffic in CRN in order to mitigate intrusions and vulnerabilities that increases on daily basis against CRN for a reliable and secured network. This will improve the rate of deployment of Cognitive Radio Networks.
Application of reinforcement learning for security enhancement in cognitive radio networks
Applied Soft Computing, 2015
Cognitive radio network (CRN) enables unlicensed users (or secondary users, SUs) to sense for and opportunistically operate in underutilized licensed channels, which are owned by the licensed users (or primary users, PUs). Cognitive radio network (CRN) has been regarded as the next-generation wireless network centred on the application of artificial intelligence, which helps the SUs to learn about, as well as to adaptively and dynamically reconfigure its operating parameters, including the sensing and transmission channels, for network performance enhancement. This motivates the use of artificial intelligence to enhance security schemes for CRNs. Provisioning security in CRNs is challenging since existing techniques, such as entity authentication, are not feasible in the dynamic environment that CRN presents since they require preregistration. In addition these techniques cannot prevent an authenticated node from acting maliciously. In this article, we advocate the use of reinforcement learning (RL) to achieve optimal or near-optimal solutions for security enhancement through the detection of various malicious nodes and their attacks in CRNs. RL, which is an artificial intelligence technique, has the ability to learn new attacks and to detect previously learned ones. RL has been perceived as a promising approach to enhance the overall security aspect of CRNs. RL, which has been applied to address the dynamic aspect of security schemes in other wireless networks, such as wireless sensor networks and wireless mesh networks can be leveraged to design security schemes in CRNs. We believe that these RL solutions will complement and enhance existing security solutions applied to CRN To the best of our knowledge, this is the first survey article that focuses on the use of RL-based techniques for security enhancement in CRNs.
Securing cognitive radio networks
International Journal of Communication Systems, 2010
Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio device uses general purpose computer processors that run radio applications software to perform signal processing. The use of this software enables the device to sense and understand its environment and actively change its mode of operation based on its observations. Unfortunately, this solution entails new security challenges. Our objective in this paper is to analyze the security issues of the main recent developments and architectures of cognitive radio networks. We present vulnerabilities inherent to those systems, identify novel types of abuse, classify attacks, and analyze their impact on the operation of cognitive radio‐based systems. Moreover, we discuss and propose security solutions to mitigate such threats. Copyright © 2010 John Wiley & Sons, Ltd.
Cognitive radio network security: A survey
Journal of Network and Computer Applications, 2012
Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to minimize this problem by dynamically using the free spectrum in wireless communications and mobile computing. Cognitive radio networks (CRNs) can be formed using cognitive radios by extending the radio link features to network layer functions. The objective of CRN architecture is to improve the whole network operation to fulfil the user's demands anytime and anywhere, through accessing CRNs in a more efficient way, rather than by just linking spectral efficiency. CRNs are more flexible and exposed to wireless networks compared with other traditional radio networks. Hence, there are many security threats to CRNs, more so than other traditional radio environments. The unique characteristics of CRNs make security more challenging. Several crucial issues have not yet been investigated in the area of security for CRNs. A typical public key infrastructure (PKI) scheme which achieves secure routing and other purposes in typical ad hoc networks is not enough to guarantee the security of CRNs under limited communication and computation resources. However, there has been increasing research attention on security threats caused specifically by CR techniques and special characteristics of CR in CRNs. Therefore, in this research, a survey of CRNs and their architectures and security issues has been carried out in a broad way in this paper.
A Novel Anti-Jamming Technique for Cognitive Radio Network
International Journal of Grid and Distributed Computing
As the use of wireless applications is increasing every day; it results into shortage of limited available spectrum. Licensed spectrum is unutilized and unlicensed spectrum is overcrowded, so to increase the efficiency of allocated spectrum and to fulfill the need of unlicensed spectrum, CRN is proposed. Some routing protocols are designed for wireless communication keeping in mind that all nodes are cooperating. So this approach can solve the problem of spectrum scarcity. However due to the flexibility of such network, it is vulnerable to many security threats. Jamming attack is one of the most popular security threats which cause denial of service in the network. Various solutions are available in the literature to deal with jamming attack but still there are some open challenges in jamming attack. In this paper various anti-jamming techniques and analyze the open issues of jamming which are still there in the cognitive radio network. An anti-jamming technique is proposed in this paper to deal with the open issues. Simulation is done in MATLAB-2013 and results show that proposed method performs well.
A survey of security issues in Cognitive Radio Networks
China Communications, 2015
In wireless communication systems it is important to identify the suitable frequency spectrum bands for future functionalities. The radio spectrum is allocated to various functions, services and applications but most part of the spectrum is not utilized efficiently. To solve this underutilization of frequency spectrum problem Cognitive Radio (CR) concept has been put forwarded. This survey paper brings the importance of cognitive radio in the dynamic spectrum access and the various CR attacks. The main objective of Cognitive Radio is to utilize the limited and under-utilized frequency spectrum effectively without disturbing the primary users. As the effect of it, Cognitive radio has to interact with the environment in which it is operating and to find the unused band of spectrum to transmit accordingly and subsequently adapts to the environment in which it is operating. This paper categories the various Cognitive Radio Network attacks and various issues related to it.