Anomalous spectrum usage attack detection in cognitive radio wireless networks

CaLynna Sorrells, Paul Potier, Lijun Qian, Xiangfang Li
{"title":"Anomalous spectrum usage attack detection in cognitive radio wireless networks","authors":"CaLynna Sorrells, Paul Potier, Lijun Qian, Xiangfang Li","doi":"10.1109/THS.2011.6107900","DOIUrl":null,"url":null,"abstract":"In many mission-critical applications such as military operations or disaster relief efforts, wireless networks employing dynamic spectrum access enabled by cognitive radio technology gain popularity due to their high spectrum efficiency and interoperability. However, the use of cognitive radio further complicates the security problems in wireless networks and introduces additional challenges. For instance, an attacker may mimic the behavior of a licensed primary user and disrupt the communication strategy of opportunistic spectrum usage of cognitive radio nodes, known as Primary User Emulation Attacks. Another example is a smart jammer, who can scan the spectrum and jam channels selectively. A common characteristic of the attacks in both examples is that they cause anomalous spectrum usage and disrupt the dynamic spectrum access, thus we termed them Anomalous Spectrum Usage Attacks in the context of cognitive radio wireless networks. Anomalous Spectrum Usage Attacks are extremely difficult to detect. In order to address these challenges, we propose a cross-layer framework for security enhancement and attack mitigation. In addition to physical layer sensing, we also take advantage of statistical analysis of the routing information of multiple paths collected by the routing module at the network layer. Inference of congested areas due to spectrum shortage can be made by information fusion and the results from the inference module will be compared to prior knowledge of the primary users, and the suspicious spectrum shortage will be subject to selective auditing, where a manager such as a cluster head will poll more detailed data from the cognitive nodes locating near the suspicious area for further analysis. We use a spectrum-aware split multipath routing as a baseline routing for performance evaluation. The effectiveness of the proposed scheme is demonstrated by extensive simulations.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"2675 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"32","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/THS.2011.6107900","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 32

Abstract

In many mission-critical applications such as military operations or disaster relief efforts, wireless networks employing dynamic spectrum access enabled by cognitive radio technology gain popularity due to their high spectrum efficiency and interoperability. However, the use of cognitive radio further complicates the security problems in wireless networks and introduces additional challenges. For instance, an attacker may mimic the behavior of a licensed primary user and disrupt the communication strategy of opportunistic spectrum usage of cognitive radio nodes, known as Primary User Emulation Attacks. Another example is a smart jammer, who can scan the spectrum and jam channels selectively. A common characteristic of the attacks in both examples is that they cause anomalous spectrum usage and disrupt the dynamic spectrum access, thus we termed them Anomalous Spectrum Usage Attacks in the context of cognitive radio wireless networks. Anomalous Spectrum Usage Attacks are extremely difficult to detect. In order to address these challenges, we propose a cross-layer framework for security enhancement and attack mitigation. In addition to physical layer sensing, we also take advantage of statistical analysis of the routing information of multiple paths collected by the routing module at the network layer. Inference of congested areas due to spectrum shortage can be made by information fusion and the results from the inference module will be compared to prior knowledge of the primary users, and the suspicious spectrum shortage will be subject to selective auditing, where a manager such as a cluster head will poll more detailed data from the cognitive nodes locating near the suspicious area for further analysis. We use a spectrum-aware split multipath routing as a baseline routing for performance evaluation. The effectiveness of the proposed scheme is demonstrated by extensive simulations.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
认知无线电无线网络中频谱使用异常攻击检测
在许多关键任务应用中,如军事行动或救灾工作,采用认知无线电技术支持的动态频谱接入的无线网络由于其高频谱效率和互操作性而受到欢迎。然而,认知无线电的使用使无线网络中的安全问题进一步复杂化,并带来了额外的挑战。例如,攻击者可能模仿授权主用户的行为,破坏认知无线电节点的机会频谱使用的通信策略,称为主用户仿真攻击。另一个例子是智能干扰器,它可以扫描频谱并有选择地干扰频道。在这两个例子中,攻击的一个共同特征是它们导致异常频谱使用并破坏动态频谱访问,因此我们将其称为认知无线电无线网络背景下的异常频谱使用攻击。异常频谱使用攻击非常难以检测。为了应对这些挑战,我们提出了一个跨层框架来增强安全性和减轻攻击。除了物理层感知外,我们还利用路由模块在网络层收集的多路径路由信息进行统计分析。通过信息融合对频谱短缺导致的拥塞区域进行推断,并将推断模块的结果与主要用户的先验知识进行比较,对可疑的频谱短缺进行选择性审计,集群负责人等管理者将从可疑区域附近的认知节点中轮询更详细的数据进行进一步分析。我们使用频谱感知分裂多路径路由作为性能评估的基线路由。大量的仿真验证了该方案的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Face recognition despite missing information Separating the baby from the bathwater: Toward a generic and practical framework for anonymization A calibration free hybrid RF and video surveillance system for reliable tracking and identification Low cost, pervasive detection of radiation threats Avoiding the closure of ports during a national emergency
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1