The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.09 - Sept. (2013 vol.12)
pp: 1750-1760
Zhou Yuan , University of Houston, Houston
Zhu Han , University of Houston, Houston and Kyung Hee University, Yongin
Yan Lindsay Sun , University of Rhode Island, Kingston
Husheng Li , University of Tennessee, Knoxville
Ju Bin Song , Kyung Hee University, Yongin
ABSTRACT
Cognitive radio (CR) networks have attracted many attentions recently, while the security issues are not fully studied yet. In this paper, we propose a new and powerful network layer attack, routing-toward-primary-user (RPU) attack in CR networks. In this attack, malicious nodes intentionally route a large amount of packets toward the primary users (PUs), aiming to cause interference to the PUs and to increase delay in the data transmission among the secondary users. In the RPU attack, it is difficult to detect the malicious nodes since the malicious nodes may claim that those nodes, to which they forward the packets, behave dishonestly and cause problems in the data transmission. To defend against this attack without introducing high complexity, we develop a defense strategy using belief propagation. First, an initial route is found from the source to the destination. Each node keeps a table recording the feedbacks from the other nodes on the route, exchanges feedback information and computes beliefs. Finally, the source node can detect the malicious nodes based on the final belief values. Simulation results show that the proposed defense strategy against the RPU attack is effective and efficient in terms of significant reduction in the delay and interference caused by the RPU attack.
INDEX TERMS
Cognitive radio, Routing, Interference, Sensors, Mobile computing, Belief propagation, belief propagation, Cognitive radio, security, routing toward primary user attack
CITATION
Zhou Yuan, Zhu Han, Yan Lindsay Sun, Husheng Li, Ju Bin Song, "Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks", IEEE Transactions on Mobile Computing, vol.12, no. 9, pp. 1750-1760, Sept. 2013, doi:10.1109/TMC.2012.137
REFERENCES
[1] J. MitolaIII, "Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio," PhD thesis, KTH Royal Inst. of Tech nology, 2000.
[2] S. Haykin, "Cognitive Radio: Brain-Empowered Wireless Communications," IEEE J. Selected Areas in Comm., vol. 23, no. 2, pp. 201-220, Feb. 2005.
[3] E. Hossain, D. Niyato, and Z. Han, Dynamic Spectrum Access in Cognitive Radio Networks. Cambridge Univ., 2009.
[4] L. Akter and B. Natarajan, "Distributed Approach for Power and Rate Allocation to Secondary Users in Cognitive Radio Networks," IEEE Trans. Vehicular Technology, vol. 60, no. 4, pp. 1526-1538, May 2011.
[5] L. Akter and B. Natarajan, "A Two-Stage Power and Rate Allocation Strategy for Secondary Users in Cognitive Radio Networks," J. Comm., Special Issue on Cognitive Radio Enabled Communication and Networking, vol. 4, no. 10, pp. 781-789, Nov. 2009.
[6] R.D. Taranto, H. Yomo, P. Popovski, K. Nishimori, and R. Prasad, "Cognitive Mesh Network under Interference from Primary User," Wireless Personal Comm., vol. 45, no. 3, pp. 385-401, May 2008.
[7] A. Goldsmith, Wireless Communications. Cambridge Univ., 2005.
[8] Y. Yuan, P. Bahl, R. Chandra, T. Moscibroda, and Y. Wu, "Allocating Dynamic Time-Spectrum Blocks in Cognitive Radio Networks," Proc. Eighth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, pp. 130-139, Sept. 2007.
[9] R.C. Pereira, R.D. Souza, and M.E. Pellenz, "Using Cognitive Radio for Improving the Capacity of Wireless Mesh Networks," Proc. IEEE Vehicular Technology Conf., Sept. 2008.
[10] N. Nie and C. Comaniciu, "Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks," Proc. IEEE Symp. New Frontiers in Dynamic Spectrum Access Networks, pp. 269-278, Nov. 2005.
[11] O. Ileri, D. Samardzija, T. Sizer, and N.B. Mandayam, "Demand Responsive Pricing and Competitive Spectrum Allocation via a Spectrum Server," Proc. IEEE Symp. New Frontiers in Dynamic Spectrum Access Networks, pp. 194-202, Nov. 2005.
[12] R. Etkin, A. Parekh, and D. Tse, "Spectrum Sharing for Unlicensed Bands," Proc. IEEE Symp. New Frontiers in Dynamic Spectrum Access Networks, pp. 251-258, Nov. 2005.
[13] D.I. Kim, L.B. Le, and E. Hossain, "Joint Rate and Power Allocation for Cognitive Radios in Dynamic Spectrum Access Environment," IEEE Trans. Wireless Comm., vol. 7, no. 12, pp. 5517-5527, Dec. 2008.
[14] K.R. Chowdhury and I.F. Akyildiz, "Cognitive Wireless Mesh Networks with Dynamic Spectrum Access," IEEE J. Selected Areas in Comm., vol. 26, no. 1, pp. 168-181, Jan. 2008.
[15] X. Chen, K. Makki, K. Yen, and N. Pissinou, "Sensor Network Security: A Survey," IEEE Comm. Surveys and Tutorials, vol. 11, no. 2, pp. 52-73, June 2009.
[16] R. Chen, J.M. Park, and J. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE J. Selected Areas in Comm., vol. 26, no. 1, pp. 25-37, Jan. 2008.
[17] W. Wang, H. Li, Y. Sun, and Z. Han, "Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Systems," Proc. Conf. Information Sciences and Systems (CISS '09), Mar. 2009.
[18] K. Bian and J.M. Park, "MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks," Proc. US - Korea Conf. Science, Technology, and Entrepreneurship (UKC '06), Aug. 2006.
[19] G. Jakimoski and K.P. Subbalakshmi, "Denial-of-Service Attacks on Dynamic Spectrum Access Networks," Proc. IEEE Int'l Conf. Comm. Workshops (ICC Workshops '08), May 2008.
[20] Z. Jin, S. Anand, and K.P. Subbalakshmi, "Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks," Proc. IEEE Int'l Conf. Comm. (ICC '09), June 2009.
[21] A. Sampath, H. Dai, H. Zheng, and B.Y. Zhao, "Multi-Channel Jamming Attacks Using Cognitive Radios," Proc. 16th Int'l Conf. Computer Comm. and Networks, Aug. 2007.
[22] S. Kurosawa1, H. Nakayama1, N. Kato1, A. Jamalipour2, and Y. Nemoto1, "Detecting Blackhole Attack on AODV-Based Mobile Ad hoc Networks by Dynamic Learning Method," Int'l J. Network Security, vol. 5, no. 3, pp. 338-346, Nov. 2007.
[23] R. Maheshwari, J. Gao, and S.R. Das, "Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information," Proc. IEEE INFOCOM, May 2007.
[24] T. Zhou, R.R. Choudhury, P. Ning, and K. Chakrabarty, "P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks," IEEE J. Selected Areas in Comm., vol. 29, no. 3, pp. 582-594, Mar. 2011.
[25] A.K. Sadek, Z. Han, and K.J.R. Liu, "Distributed Relay-Assignment Protocols for Coverage Expansion in Cooperative Wireless Networks," IEEE Trans. Mobile Computing, vol. 9, no. 4, pp. 505-515, Apr. 2010.
[26] Z. Yuan, J.B. Song, and Z. Han, "Interference Minimization Routing and Scheduling in Cognitive Radio Wireless Mesh Networks," Proc. IEEE Wireless Comm. and Networking Conf., Apr. 2010.
[27] Z. Han and Y. Sun, "Securing Cooperative Transmission in Wireless Communications," Proc. First Workshop the Security and Privacy of Emerging Ubiquitous Comm. Systems, Aug. 2007.
[28] A.T. Ihler, J.W. Fisher, R.L. Moses, and A.S. Willsky, "Nonparametric Belief Propagation for Self-Localization of Sensor Networks," IEEE J. Selected Areas in Comm., vol. 23, no. 4, pp. 809-819, Apr. 2005.
[29] H. Li and D.K. Irick, "Collaborative Spectrum Sensing in Cognitive Radio Vehicular Ad Hoc Networks: Belief Propagation on Highway," Proc. IEEE Vehicle Technology Conf. (VTC), May 2010.
[30] B. Frey, Graphical Models for Machine Learning and Digital Communications. MIT, 1998.
[31] J.S. Yedidia, W.T. Freeman, and Y. Weiss, "Understanding Belief Propagation and Its Generalizations," Exploring Artificial Intelligence in the New Millennium, pp. 2282-2312, Morgan Kaufmann, 2003.
[32] J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, 1998.
[33] C. Dellarocas, "Mechanisms for Coping with Unfair Ratings and Discriminatory Behavior in Online Reputation Reporting Systems," Proc. 21st Int'l Conf. Information Systems, Dec. 2000.
52 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool