This Article 
 Bibliographic References 
 Add to: 
Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks
Sept. 2013 (vol. 12 no. 9)
pp. 1750-1760
Zhou Yuan, University of Houston, Houston
Zhu Han, University of Houston, Houston and Kyung Hee University, Yongin
Yan Lindsay Sun, University of Rhode Island, Kingston
Husheng Li, University of Tennessee, Knoxville
Ju Bin Song, Kyung Hee University, Yongin
Cognitive radio (CR) networks have attracted many attentions recently, while the security issues are not fully studied yet. In this paper, we propose a new and powerful network layer attack, routing-toward-primary-user (RPU) attack in CR networks. In this attack, malicious nodes intentionally route a large amount of packets toward the primary users (PUs), aiming to cause interference to the PUs and to increase delay in the data transmission among the secondary users. In the RPU attack, it is difficult to detect the malicious nodes since the malicious nodes may claim that those nodes, to which they forward the packets, behave dishonestly and cause problems in the data transmission. To defend against this attack without introducing high complexity, we develop a defense strategy using belief propagation. First, an initial route is found from the source to the destination. Each node keeps a table recording the feedbacks from the other nodes on the route, exchanges feedback information and computes beliefs. Finally, the source node can detect the malicious nodes based on the final belief values. Simulation results show that the proposed defense strategy against the RPU attack is effective and efficient in terms of significant reduction in the delay and interference caused by the RPU attack.
Index Terms:
Cognitive radio,Routing,Interference,Sensors,Mobile computing,Belief propagation,belief propagation,Cognitive radio,security,routing toward primary user attack
Zhou Yuan, Zhu Han, Yan Lindsay Sun, Husheng Li, Ju Bin Song, "Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks," IEEE Transactions on Mobile Computing, vol. 12, no. 9, pp. 1750-1760, Sept. 2013, doi:10.1109/TMC.2012.137
Usage of this product signifies your acceptance of the Terms of Use.