Ecology-Based DoS Attack in Cognitive Radio Networks

被引:1
|
作者
Cheng, Shin-Ming [1 ]
Chen, Pin-Yu [2 ]
机构
[1] Natl Taiwan Univ Sciecne & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
来源
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016) | 2016年
关键词
cognitive radio; denial-of-service (DoS) attack; ecosystems; evolutionary game; selfish behavior; GAME;
D O I
10.1109/SPW.2016.10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cognitive radio technology, which is designed to enhance spectrum utilization, depends on the success of opportunistic access, where secondary users (SUs) exploit spectrum void unoccupied by primary users (PUs) for transmissions. We note that the system behaviors are very similar to the interactions among different species coexisting in an ecosystem. However, SUs of a selfish nature or of misleading information may make concurrent transmissions with PUs for additional incentives, and thus disrupt the entire ecosystem. By exploiting this vulnerability, this paper proposes a novel distributed denial-of-service (DoS) attack where invasive species, i.e., malicious users (MUs), induce originally normal-behaved SUs to execute concurrent transmissions with PUs and thus collapse the cognitive radio network. We adopt stochastic geometry to model the spatial distributions of PUs, SUs, and MUs for the analysis of the mutual interference among them. The access strategy of each SU in the spectrum sharing ecosystem, which evolves with the experienced payoffs and interference, is modeled by an evolutionary game. Based on the evolutionary stable strategy concept, we could efficiently identify the fragile operating region at which normal-behaved SUs are eventually evolved to conduct concurrent transmissions and thus to cause the ruin of the network.
引用
收藏
页码:104 / 110
页数:7
相关论文
共 50 条
  • [1] Ecology-based coexistence scheme for heterogeneous cognitive radio networks over TV white space
    Song, Min
    Zheng, Meng
    IET COMMUNICATIONS, 2018, 12 (05) : 620 - 626
  • [2] Ecology of Cognitive Radio Ad Hoc Networks
    Cheng, Shin-Ming
    Chen, Pin-Yu
    Chen, Kwang-Cheng
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (07) : 764 - 766
  • [3] Modeling the Lion Attack in Cognitive Radio Networks
    Juan Hernandez-Serrano
    Olga León
    Miguel Soriano
    EURASIP Journal on Wireless Communications and Networking, 2011
  • [4] Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks
    Seyed Abdolazim Vaziri Yazdi
    Mahdieh Ghazvini
    Wireless Personal Communications, 2019, 108 : 2261 - 2277
  • [5] Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks
    Yazdi, Seyed Abdolazim Vaziri
    Ghazvini, Mahdieh
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (04) : 2261 - 2277
  • [6] Error Detection of Malicious User Attack in Cognitive Radio Networks
    Armi, N.
    Gharibi, W.
    Khan, W. Z.
    Zangoti, H.
    Rizvi, S.
    Wael, C.
    2017 INTERNATIONAL CONFERENCE ON RADAR, ANTENNA, MICROWAVE, ELECTRONICS, AND TELECOMMUNICATIONS (ICRAMET), 2017, : 89 - 92
  • [7] An Overview of Primary User Emulation Attack in Cognitive Radio Networks
    Gupta, Ishu
    Sahu, O. P.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 27 - 31
  • [8] An MDP Approach for Defending Against Fraud Attack in Cognitive Radio Networks
    Shahhoseini, Hadi Shahriar
    Jafari, Amir Hosein
    Afhamisisi, Khadijeh
    IETE JOURNAL OF RESEARCH, 2015, 61 (05) : 492 - 499
  • [9] Performance Analysis of Primary User Emulation Attack in Cognitive Radio Networks
    Zhang, Chaorui
    Yu, Rong
    Zhang, Yan
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 371 - 376
  • [10] A low complexity cluster based data fusion to defense against SSDF attack in cognitive radio networks
    Ghaznavi, Mahsa
    Jamshidi, Ali
    COMPUTER COMMUNICATIONS, 2019, 138 : 106 - 114