Ecology-Based DoS Attack in Cognitive Radio Networks

被引:1
|
作者
Cheng, Shin-Ming [1 ]
Chen, Pin-Yu [2 ]
机构
[1] Natl Taiwan Univ Sciecne & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
来源
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016) | 2016年
关键词
cognitive radio; denial-of-service (DoS) attack; ecosystems; evolutionary game; selfish behavior; GAME;
D O I
10.1109/SPW.2016.10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cognitive radio technology, which is designed to enhance spectrum utilization, depends on the success of opportunistic access, where secondary users (SUs) exploit spectrum void unoccupied by primary users (PUs) for transmissions. We note that the system behaviors are very similar to the interactions among different species coexisting in an ecosystem. However, SUs of a selfish nature or of misleading information may make concurrent transmissions with PUs for additional incentives, and thus disrupt the entire ecosystem. By exploiting this vulnerability, this paper proposes a novel distributed denial-of-service (DoS) attack where invasive species, i.e., malicious users (MUs), induce originally normal-behaved SUs to execute concurrent transmissions with PUs and thus collapse the cognitive radio network. We adopt stochastic geometry to model the spatial distributions of PUs, SUs, and MUs for the analysis of the mutual interference among them. The access strategy of each SU in the spectrum sharing ecosystem, which evolves with the experienced payoffs and interference, is modeled by an evolutionary game. Based on the evolutionary stable strategy concept, we could efficiently identify the fragile operating region at which normal-behaved SUs are eventually evolved to conduct concurrent transmissions and thus to cause the ruin of the network.
引用
收藏
页码:104 / 110
页数:7
相关论文
共 50 条
  • [21] Survey on Cognitive Radio and Cognitive Radio Sensor Networks
    Asokan, Akhila
    AyyappaDas, R.
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [22] Signal Classification for Detecting Primary User Emulation Attack in Centralized Cognitive Radio Networks
    Akbari, Khatereh
    Abouei, Jamshid
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 342 - 347
  • [23] Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack
    Chen, Chao
    Cheng, Hongbing
    Yao, Yu-Dong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (07) : 2135 - 2141
  • [24] The Defense Against Jamming Attack in Cognitive Radio Networks: Energy Efficiency Management Perspective
    D B.S.
    Jaichandran R.
    Bharathi P.S.
    Meenakshi B.
    Anushya A.
    Devi V.B.
    D, Bhuvana Suganthi (bhuvanasuganthi@gmail.com), 1600, Elsevier B.V. (82):
  • [25] The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-hoc Networks
    Mapunya, Sekgoari
    Velempini, Mthulisi
    2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 235 - 238
  • [26] Mitigating spectrum sensing data falsification attack in ad hoc cognitive radio networks
    Rajkumari, Roshni
    Marchang, Ningrinla
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (02)
  • [27] A novel system model for detecting primary user emulation attack in cognitive radio networks
    Thulasimani L.
    Magdalene A.H.S.
    Thulasimani, Lakshmanan (ltm.ece@psgtech.ac.in), 1600, Inderscience Publishers (18): : 381 - 390
  • [28] Collaborative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks
    Sharifi, Abbas Ali
    Sharifi, Morteza
    Niya, Mir Javad Musevi
    IETE JOURNAL OF RESEARCH, 2016, 62 (02) : 205 - 211
  • [29] Delaunay Triangulation Based Cognitive Information Compression for Cognitive Radio Networks
    Han, Chenyang
    Wei, Zinqing
    Feng, Zhiyong
    Li, Wei
    2018 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2018, : 724 - 729
  • [30] Cognitive User Selection Based on Throughput Estimation in Cognitive Radio Networks
    Khan, Muhammad Sajjad
    Khan, Liaqat
    Kim, Junsu
    Lee, Eung Hyuk
    Kim, Su Min
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 154 - 156