The Community for Technology Leaders
Green Image
Issue No. 09 - Sept. (2013 vol. 12)
ISSN: 1536-1233
pp: 1750-1760
Zhou Yuan , University of Houston, Houston
Zhu Han , University of Houston, Houston and Kyung Hee University, Yongin
Yan Lindsay Sun , University of Rhode Island, Kingston
Husheng Li , University of Tennessee, Knoxville
Ju Bin Song , Kyung Hee University, Yongin
Cognitive radio (CR) networks have attracted many attentions recently, while the security issues are not fully studied yet. In this paper, we propose a new and powerful network layer attack, routing-toward-primary-user (RPU) attack in CR networks. In this attack, malicious nodes intentionally route a large amount of packets toward the primary users (PUs), aiming to cause interference to the PUs and to increase delay in the data transmission among the secondary users. In the RPU attack, it is difficult to detect the malicious nodes since the malicious nodes may claim that those nodes, to which they forward the packets, behave dishonestly and cause problems in the data transmission. To defend against this attack without introducing high complexity, we develop a defense strategy using belief propagation. First, an initial route is found from the source to the destination. Each node keeps a table recording the feedbacks from the other nodes on the route, exchanges feedback information and computes beliefs. Finally, the source node can detect the malicious nodes based on the final belief values. Simulation results show that the proposed defense strategy against the RPU attack is effective and efficient in terms of significant reduction in the delay and interference caused by the RPU attack.
Cognitive radio, Routing, Interference, Sensors, Mobile computing, Belief propagation, belief propagation, Cognitive radio, security, routing toward primary user attack
Zhou Yuan, Zhu Han, Yan Lindsay Sun, Husheng Li, Ju Bin Song, "Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks", IEEE Transactions on Mobile Computing, vol. 12, no. , pp. 1750-1760, Sept. 2013, doi:10.1109/TMC.2012.137
91 ms
(Ver 3.3 (11022016))