Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks

被引:29
作者
Wang, Qian [1 ]
Ren, Kui [2 ]
Ning, Peng [3 ]
Hu, Shengshan [1 ]
机构
[1] Wuhan Univ, Sch Comp Sci, State Key Lab Software Engn, Wuhan 430072, Peoples R China
[2] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
[3] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
基金
国家高技术研究发展计划(863计划); 美国国家科学基金会; 中国国家自然科学基金;
关键词
Antijamming; cognitive radio networks (CRNs); multiradio multichannel; spectrum access;
D O I
10.1109/TVT.2015.2511071
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
For achieving optimized spectrum usage, most existing opportunistic spectrum sensing and access protocols model the spectrum sensing and access problem as a partially observed Markov decision process by assuming that the information states and/or the primary users' (PUs) traffic statistics are known a priori to the secondary users (SUs). While theoretically sound, the existing solutions may not be effective in practice due to two main concerns. First, the assumptions are not practical, as before the communication starts, PUs' traffic statistics may not be readily available to the SUs. Second and more serious, existing approaches are extremely vulnerable to malicious jamming attacks. By leveraging the same statistic information and stochastic dynamic decision-making process that the SUs would follow, a cognitive attacker with sensing capability can sense and jam the channels to be accessed by SUs, while not interfering PUs. To address these concerns, we formulate the antijamming, multichannel access problem as a nonstochastic multi-armed bandit problem. By leveraging probabilistically shared information between the sender and the receiver, our proposed protocol enables them to hop to the same set of channels with high probability while gaining resilience to jamming attacks without affecting PUs' activities. We analytically show the convergence of the learning algorithms and derive the performance bound based on regret. We further discuss the problem of tracking the best adaptive strategy and characterize the performance bound based on a new regret. Extensive simulation results show that the probabilistic spectrum sensing and access protocol can overcome the limitation of existing solutions and is highly resilient to various jamming attacks even with jammed acknowledgment (ACK) information.
引用
收藏
页码:8331 / 8344
页数:14
相关论文
共 25 条
[1]   Optimality of Myopic Sensing in Multichannel Opportunistic Access [J].
Ahmad, Sahand Haji Ali ;
Liu, Mingyan ;
Javidi, Tara ;
Zhao, Qing ;
Krishnamachari, Bhaskar .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (09) :4040-4050
[2]  
An Liu, 2010, 2010 IEEE 7th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2010), P41, DOI 10.1109/MASS.2010.5663968
[3]  
Auer P, 2003, SIAM J COMPUT, V32, P48, DOI 10.1137/S0097539701398375
[4]  
Awerbuch B., 2004, P 36 ANN ACM S THEOR, P45, DOI 10.1145/1007352.1007367
[5]  
Gao S, 2010, The Photosynthetic Mechanisms of Membranous Algae during Asexual Propagation and Stressful Conditions, P1
[6]  
György A, 2007, J MACH LEARN RES, V8, P2369
[7]  
Hsu CL, 2011, INT CONF ACOUST SPEE, P393
[8]   Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems-Part II: Unknown Channel Statistics [J].
Li, Husheng ;
Han, Zhu .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (01) :274-283
[9]   Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics [J].
Li, Husheng ;
Han, Zhu .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (11) :3566-3577
[10]  
Liu A, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P367