On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networks (original) (raw)
Related papers
Collaborative jamming and collaborative defense in cognitive radio networks
Pervasive and Mobile Computing, 2013
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportunistically access and use parts of the spectrum not being used by others. Though cooperation among nodes is desirable for efficient network operations and performance, there might be some malicious nodes whose objective could be to hinder communications and disrupt network operations. The absence of a central authority or any policy enforcement mechanism makes these kinds of open-access network more vulnerable and susceptible to attacks.
Wireless Communications and Mobile Computing
Cognitive radio networks (CRNs) allow coexistence of unlicensed users (UUs) and licensed users (LUs) and hence, mutual interference between UUs and LUs is neither ignored nor considered as Gaussian-distributed quantity. Additionally, exploiting jamming signals to purposely interfere with signal reception of eavesdroppers is a feasible solution to improve security performance of CRNs. This paper analyzes reliability-security trade-off, which accounts for maximum transmit power constraint, interference power constraint, jamming signal, and Rayleigh fading, and considers interference from LUs as non-Gaussian-distributed quantity. Toward this end, exact closed-form expressions of successful detection probability and successful eavesdropping probability, from which reliability-security trade-off is straightforwardly visible, are first suggested and then validated by Monte-Carlo simulations. Various results demonstrate that interference from LUs considerably decreases both probabilities w...
Markov Model Based Jamming and Anti-Jamming Performance Analysis for Cognitive Radio Networks
In this paper, we conduct a cross-layer analysis of both the jamming capability of the cognitiveradio-based jammers and the anti-jamming capability of the cognitive radio networks (CRN). We use a Markov chain to model the CRN operations in spectrum sensing, channel access and channel switching under jamming. With various jamming models, the jamming probabilities and the throughputs of the CRN are obtained in closed-form expressions. Furthermore, the models and expressions are simplified to determine the minimum and the maximum CRN throughput expressions under jamming, and to optimize important anti-jamming parameters. The results are helpful for the optimal anti-jamming CRN design. The model and the analysis results are verified by simulations.
International Journal of Engineering Research and Technology (IJERT), 2015
https://www.ijert.org/analysis-and-simulation-of-anti-jamming-performance-of-cognitive-radio-networks-using-markov-models https://www.ijert.org/research/analysis-and-simulation-of-anti-jamming-performance-of-cognitive-radio-networks-using-markov-models-IJERTV4IS040403.pdf Rapid growth of wireless devices highlights the importance of effective utilization of the spectrum. Cognitive radio (CR) is one of the growing technology to overcome the spectrum scarcity problem. Cognitive radio network(CRN) has more design challenges and security threats as it allows dynamic spectrum sensing. Spectrum sharing policy among the licensed and unlicensed users, opens up the possibility of various security threats. Malicious attackers can launch the jamming attacks to prevent the efficient utilization of the spectrum opportunities. A Markov chain model helps to predict the behavior of open spectrum access in the unlicensed bands. In this paper, different types of jammers and their jammed region are identified based on the signal strength, packet sent ratio, packet delivered ratio. Markov theory based CRN transmission model is developed to compute the jamming probabilities and the throughput. Jamming strategy and anti-jamming performance of CRNs are analyzed using Markov model.
An Anti-Jamming Cognitive Radio Technique
The presence of a single radio link between the transmitter and the receiver is peculiar of a single hop wireless network. When the radio link is intentionally jammed, the communication is spoiled and the throughput of the network is significantly reduced. Moreover, the attacker location information is essential when that network topology is used in an Electronic Defense system. Furthermore, Cognitive Radio (CR) devices, sense the whole available spectrum pool and switch the communication to a new spectrum hole. In this paper, their usage is shown to be improving the jamming resilience of the network. Moreover, we propose a unique node based algorithm to localize the Jammer, having as input data the only phase shifts information. The basic scenario with a single CR Mobile Object, a Base Station and a jammer has been simulated on the platform NS2 and the throughput of the network is shown to be almost stable around a certain value during the attack. Eventually, after a large number of simulations, we estimate that the error location is less than 1 meter
A Novel Anti-Jamming Technique for Cognitive Radio Network
International Journal of Grid and Distributed Computing
As the use of wireless applications is increasing every day; it results into shortage of limited available spectrum. Licensed spectrum is unutilized and unlicensed spectrum is overcrowded, so to increase the efficiency of allocated spectrum and to fulfill the need of unlicensed spectrum, CRN is proposed. Some routing protocols are designed for wireless communication keeping in mind that all nodes are cooperating. So this approach can solve the problem of spectrum scarcity. However due to the flexibility of such network, it is vulnerable to many security threats. Jamming attack is one of the most popular security threats which cause denial of service in the network. Various solutions are available in the literature to deal with jamming attack but still there are some open challenges in jamming attack. In this paper various anti-jamming techniques and analyze the open issues of jamming which are still there in the cognitive radio network. An anti-jamming technique is proposed in this paper to deal with the open issues. Simulation is done in MATLAB-2013 and results show that proposed method performs well.
A stochastic game model for jamming in multi-channel cognitive radio systems
2010
The security issue in collaborative sensing in cognitive radio networks can be modeled within the framework of a jamming and anti-jamming scenario with attackers and secondary users. This leads to a stochastic zero-sum (Markovian) game model, which we adopt in this paper and study the resulting strategies. Primary users, secondary users and jammers are the three types of agents in the system. The primary users dictate the system states and their transitions while the secondary users and jammers behave noncooperatively to achieve their goals independently. The Markovian game model captures not only the zero-sum interactions between secondary users and the jammers but also the dynamics of the system. The results obtained indicate that the secondary users can enhance their security levels or increase their long-term payoffs by either improving their sensing capabilities to confuse the jammer with the choice or choosing to communicate under states where the available channels are less prone to jamming. Results of numerical experiments included in the paper show that the payoffs of the secondary users increase with the number of available jamming-free channels and are eventually limited by the behavior of primary users.
Analysis of Attacks in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. It solves the spectrum scarcity problem by allocating the spectrum dynamically to unlicensed users. It uses the free spectrum bands which are not being used by the licensed users without causing interference to the incumbent transmission. So, spectrum sensing is the essential mechanism on which the entire communication depends. Cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. So that it causes the crucial threat in the cognitive radio network. In this paper, our objectives are to give the various security issues in cognitive radio networks and advantage and disadvantage of security mechanisms with the existing techniques to mitigate it.
A hybrid fec code for mitigating jamming attacks in fault-model-classified cognitive radio networks
2013
Opportunistic sharing of spectrum through the concept of Cognitive Radio network (CRN) has been considered the next stage in the effort of the government to alleviate the spectrum shortage problem. The idea is to salvage spectra that are rendered fallowed by the licensed (primary) users during their on and off period. Recent literature reiterated that this next generation wireless network is capable of providing ubiquitous connectivity of highbandwidth communications to both urban and rural communities. It has diverse application domains ranging from distance education to other government-delivered essential services like remote health care delivery and emergency rescue response. The security requirements of CRN must be specified because of the sensitive nature and variety of application domains of the network. Violation of any of the requirements, either maliciously or inadvertently, by The new hybrid FEC code is defined as the concatenation of the Raptor code and the Secure Hash Algorithm-2 (SHA-2). We use the Raptor code part of the code to recover data loss, since Raptor code is an FEC code that allows encoded communicated data to be recovered at the destination without the need for a re-transmission, with high probability even when some of the data is lost due to jamming. The SHA-2 part of the code is used to verify the integrity of data received at the destination since CR jammers are capable of manipulating transmitted data. This is possible because SHA-2 can transform any set of data elements into a unique fixed length hash value, which can be verified at both the sender and the receiver for any data manipulation by CR jammers. When data communicated is detected to be lost or manipulated, the approach explores a recovery block based on the application scenario. The algorithm for our proposed solution is presented and its validity and threshold functions are established. We simulate our proposed solution in NS-2 and evaluate its performance by comparing it with ordinary FEC code implementation. The result of the analysis using suitable performance metrics shows that the proposed solution is very efficient and robust against the different rates of jamming perpetrated by CR jammers in a fault-model classified CRN. In addition, the encoding and decoding algorithm of the proposed hybrid FEC code was found to be very efficient because of the observed high recovery rate of the algorithm capable of providing consistent low packet loss ratio (PLR), even at the jammers worst case scenario of 100% jamming rate. v ACKNOWLEDGMENTS I would like to thank the following people and groups: My supervisor, Dr. Axel Krings for his mentoring and invaluable contribution to the success of this work. He was always there to give me direction many times when I was lost at what to do next.
Game theoretic approach to mitigate security attacks in "Cognitive Radio Networks"
The Spectrum utilization demand due to large number of growth of wireless users that has led to spectrum shortage problem and that is expected to increase more and more by years. Thus, the technology that identified the spectrum shortage is known as Cognitive Radio. It solves the spectrum shortage problem by allowing unauthorized users to consume the spectral resources when Primary Users (PU) is not active. Its main function of Cognitive Radio Networks (CRNs) is Spectrum sensing and also to identified the unused licensed spectrum bands and also to protect the transmissions of primary users (PUs). In Cognitive Radio Networks, the jamming attack is one of the major threats, where several malicious attackers intend to stop the communications of secondary users by giving disturbance. In this project, evolutionary game has been used to applied in order to minimise the attack.