Efficient attack strategy for legitimate energy-powered eavesdropping in tactical cognitive radio networks

被引:5
作者
Pham Duy Thanh [1 ]
Tran Nhut Khai Hoan [2 ]
Hiep Vu-Van [1 ]
Koo, Insoo [1 ]
机构
[1] Univ Ulsan UOU, Sch Elect Engn, Ulsan, South Korea
[2] Can Tho Univ, Can Tho, Vietnam
基金
新加坡国家研究基金会;
关键词
Cognitive radio networks; Physical layer; Proactive eavesdropper; Energy harvesting; Jamming attack; POMDP; PHYSICAL LAYER SECURITY; WIRELESS NETWORKS; RELAY NETWORKS; DESIGN;
D O I
10.1007/s11276-019-01956-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cognitive radio network (CRN) is not only considered a useful medium for users, but it is also an environment vulnerable to proactive attackers. This paper studies an attack strategy for a legitimate energy-constrained eavesdropper (e.g., a government agency) to efficiently capture the suspicious wireless communications (i.e., an adversary communications link) in the physical layer of a CRN in tactical wireless networks. Since it is powered by an energy harvesting device, a full-duplex active eavesdropper constrained by a limited energy budget can simultaneously capture data and interfere with the suspicious cognitive transmissions to maximize the achievable wiretap rate while minimizing the suspicious transmission rate over a Rayleigh fading channel. The cognitive user operation is modeled in a time-slotted fashion. In this paper, we formulate the problem of maximizing a legitimate attack performance by adopting the framework of a partially observable Markov decision process. The decision is determined based on the remaining energy and a belief regarding the licensed channel activity in each time slot. Particularly, in each time slot, the eavesdropper can perform an optimal action based on two functional modes: (1) passive eavesdropping (overhearing data without jamming) or (2) active eavesdropping (overhearing data with the optimal amount of jamming energy) to maximize the long-term benefit. We illustrate the optimal policy and compare the performance of the proposed scheme with that of conventional schemes where the decision for the current time slot is only considered to maximize its immediate reward.
引用
收藏
页码:3605 / 3622
页数:18
相关论文
共 43 条
[1]  
Allam S, 2001, IEEE T AUTOMAT CONTR, V46, P903, DOI 10.1109/9.928593
[2]   Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme [J].
Amariucai, George T. ;
Wei, Shuangqing .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (07) :4660-4677
[3]  
[Anonymous], 2015, PERFORMANCE SECONDAR
[4]  
[Anonymous], 2011, IEEE Std 802.22-2011, P1
[5]   Energy Detection Based Cooperative Spectrum Sensing in Cognitive Radio Networks [J].
Atapattu, Saman ;
Tellambura, Chintha ;
Jiang, Hai .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (04) :1232-1241
[6]   On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary [J].
Basciftci, Yuksel Ozan ;
Gungor, Onur ;
Koksal, Can Emre ;
Ozguner, Fusun .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (03) :1325-1343
[7]  
Bertsekas Dimitri P., 2001, Dynamic Programming and Optimal Control, Two Volume Set
[8]   Throughput of an Energy Harvesting Cognitive Radio Network Based on Prediction of Primary User [J].
Bhowmick, Abhijit ;
Yadav, Kuldeep ;
Roy, Sanjay Dhar ;
Kundu, Sumit .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (09) :8119-8128
[9]   APPLICATION OF WIRELESS SENSOR NETWORKS IN CRITICAL INFRASTRUCTURE PROTECTION: CHALLENGES AND DESIGN OPTIONS [J].
Buttyan, Levente ;
Gessner, Dennis ;
Hessler, Alban ;
Langendoerfer, Peter .
IEEE WIRELESS COMMUNICATIONS, 2010, 17 (05) :44-49
[10]   Optimization or Alignment: Secure Primary Transmission Assisted by Secondary Networks [J].
Cao, Yang ;
Zhao, Nan ;
Yu, F. Richard ;
Jin, Minglu ;
Chen, Yunfei ;
Tang, Jie ;
Leung, Victor C. M. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) :905-917