SDA-COG – Sistema de Detecção de Ataques para Rede de Rádios Cognitivos
Abstract
This paper deals with the development of an Attack Detection System (ADS) for Cognitive Radio Networks (CRN) formed by combining two classic intrusion detection mechanisms: location and reputation. The proposal was evaluated by means of simulations of specific CRNs attacks: Primary User Emulation (PUE) and Sense Spectrum False Feedback (SSFF).
References
Akyildiz, Ian F.; VURAN, Mehmet C.; LEE, Won-Yeol; MOHANTY, Shantidev, (2006a). “NeXt generation/dynamic spectrum access/cognitive radio wireless networks:A survey”. Computer Networks, n. 50.
Akyildiz Ian F, J. Laskar, and Y. Li, (2006b), “OCRA: OFDM-based cognitive radio networks,” Broadband Wireless Networking Laboratory Technical Report, March.
Akyildiz, Ian, F., LEE, WON-YEOL, VURAN, M. C., & MOHANTY S, (2008). “A Survey on Spectrum Management in Cognitive Radio Networks”. IEEE Communications Magazine,
Clancy,T, Goergen N, (2008). “Security in cognitive radio networks: threats and mitigation”. Third International (CrownCom),; 1–8. DOI: 10.1109/CROWNCOM.2008.4562534.
Clancy, T, A. Khawar, (2009)."Security Threats to Signal Classifiers Using Self-Organizing Maps", Fourth International CrownCom)
Clemen, R. T.; REILLY, T. (2001) Making Hard Decisions: An Introduction to Decision Analisys. Pacific Grove: Duxbury, 2001.
Fcc (2003), Federal Communication Commission Home Page. http://www.fcc.gov -
Garmeman D. e Migon, H.S., (1993). Inferência estatística: uma abordagem integrada. Textos de Métodos Matemáticos do Instituto de Matematica, UFRJ
Hata, M. Empirical formula for propagation loss in land mobile radio services. IEEETrans. On Vehicular Technology, v. VT-29, n. 3, p. 317-325, aug. 1980.
Inatel (2009) Instituto Nacional de Telecomunicações – “Projeto Sendora”, Curso de Mestrado em Telecomunicações - http://www.inatel.br/
Lacerda, E.G.M e Carvalho, A.C.P.L. (1999) “Introdução aos algoritmos genéticos”, In: Sistemas inteligentes: aplicações a recursos hídricos e ciências ambientais. Editado por Galvão, C.O., Valença, M.J.S. Ed. Universidade/UFRGS: Ass Bras de Recursos Hídricos.
Leon, Olga, Juan Hernandez-Serrano, Miguel Soriano (2010). "Securing cognitive radio networks".International Journal of Communication Systems, vol 23,. ISSN/ISBN 1074-
Lopes C. L. (2008) A escolha de um custodiante para uma administradora financeira: Análise multiatributo por medições conjuntas e trocas justas. Mestrado em adm, Ibmec – RJ,
McHenry, M. (2003). Frequency agile spectrum access technologies, FCC Workshop CR.
Mitola, J (2000). “Cognitive radio: An integrated agent architecture for software defined radio”. Ph.D. Dissertation, KTH Royal Institute of Technology, Stockholm, Sweden.
Mitola III and G. Q. Maguire, Jr. (2009), “Cognitive Radio: Making Software Radios More Personal,” IEEE Personal Communications, Vol. 6, No. 4, pp. 13-18, Aug.
Misha,S., M Sahai, A., Brodersen, R.W., (2006). Cooperative Sensing among Cognitive Radios. In: IEEE International Conference on Communications, ICC 2006, 1658–1663
Park, J., M. R. Chen,, and J. H. Reed, (2008). "Defense against primary user emulation attacks in cognitive radio networks," IEEE Journal on Selected Areas in CSICRTA Vol. 26, No. 1,
Ross T., P. Myllymaki, and H. Tirri, (2002). “A statistical modeling approach to location estimation,” IEEE Trans. Mobile Computing, Vol. 1, Jan.-March, p 59–69.
Ruiliang, C., Jung-Min, P., Hou, Y.T., Reed, J.H. (2008a): Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks. IEEE Communications Magazine 46,50–
Ruiliang, C, Jung-Min, P., Kaigui, B. (2008b).: Robust Distributed Spectrum Sensing inCognitive Radio Networks. In: IEEE The 27th, INFOCOM 2008, pp. 1876–1884
Shrestha, J., Sunkara, A., Thirunavukkarasu, B., (2010). Security in Cognitive Radio. San Jose: San Jose State University.
Thomas R. W., L. A. Da Silva, and A. B. MacKenzie, (2005) “Cognitive Networks,” IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2005.,
Zhu, Feng and Seung-Woo Seo, (2009). "'Enhanced Robust Cooperative Spectrum Sensing in Cognitive Radio", JCN, Special Issue on Cognitive Radio: A Path in the Evol of Public
Akyildiz Ian F, J. Laskar, and Y. Li, (2006b), “OCRA: OFDM-based cognitive radio networks,” Broadband Wireless Networking Laboratory Technical Report, March.
Akyildiz, Ian, F., LEE, WON-YEOL, VURAN, M. C., & MOHANTY S, (2008). “A Survey on Spectrum Management in Cognitive Radio Networks”. IEEE Communications Magazine,
Clancy,T, Goergen N, (2008). “Security in cognitive radio networks: threats and mitigation”. Third International (CrownCom),; 1–8. DOI: 10.1109/CROWNCOM.2008.4562534.
Clancy, T, A. Khawar, (2009)."Security Threats to Signal Classifiers Using Self-Organizing Maps", Fourth International CrownCom)
Clemen, R. T.; REILLY, T. (2001) Making Hard Decisions: An Introduction to Decision Analisys. Pacific Grove: Duxbury, 2001.
Fcc (2003), Federal Communication Commission Home Page. http://www.fcc.gov -
Garmeman D. e Migon, H.S., (1993). Inferência estatística: uma abordagem integrada. Textos de Métodos Matemáticos do Instituto de Matematica, UFRJ
Hata, M. Empirical formula for propagation loss in land mobile radio services. IEEETrans. On Vehicular Technology, v. VT-29, n. 3, p. 317-325, aug. 1980.
Inatel (2009) Instituto Nacional de Telecomunicações – “Projeto Sendora”, Curso de Mestrado em Telecomunicações - http://www.inatel.br/
Lacerda, E.G.M e Carvalho, A.C.P.L. (1999) “Introdução aos algoritmos genéticos”, In: Sistemas inteligentes: aplicações a recursos hídricos e ciências ambientais. Editado por Galvão, C.O., Valença, M.J.S. Ed. Universidade/UFRGS: Ass Bras de Recursos Hídricos.
Leon, Olga, Juan Hernandez-Serrano, Miguel Soriano (2010). "Securing cognitive radio networks".International Journal of Communication Systems, vol 23,. ISSN/ISBN 1074-
Lopes C. L. (2008) A escolha de um custodiante para uma administradora financeira: Análise multiatributo por medições conjuntas e trocas justas. Mestrado em adm, Ibmec – RJ,
McHenry, M. (2003). Frequency agile spectrum access technologies, FCC Workshop CR.
Mitola, J (2000). “Cognitive radio: An integrated agent architecture for software defined radio”. Ph.D. Dissertation, KTH Royal Institute of Technology, Stockholm, Sweden.
Mitola III and G. Q. Maguire, Jr. (2009), “Cognitive Radio: Making Software Radios More Personal,” IEEE Personal Communications, Vol. 6, No. 4, pp. 13-18, Aug.
Misha,S., M Sahai, A., Brodersen, R.W., (2006). Cooperative Sensing among Cognitive Radios. In: IEEE International Conference on Communications, ICC 2006, 1658–1663
Park, J., M. R. Chen,, and J. H. Reed, (2008). "Defense against primary user emulation attacks in cognitive radio networks," IEEE Journal on Selected Areas in CSICRTA Vol. 26, No. 1,
Ross T., P. Myllymaki, and H. Tirri, (2002). “A statistical modeling approach to location estimation,” IEEE Trans. Mobile Computing, Vol. 1, Jan.-March, p 59–69.
Ruiliang, C., Jung-Min, P., Hou, Y.T., Reed, J.H. (2008a): Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks. IEEE Communications Magazine 46,50–
Ruiliang, C, Jung-Min, P., Kaigui, B. (2008b).: Robust Distributed Spectrum Sensing inCognitive Radio Networks. In: IEEE The 27th, INFOCOM 2008, pp. 1876–1884
Shrestha, J., Sunkara, A., Thirunavukkarasu, B., (2010). Security in Cognitive Radio. San Jose: San Jose State University.
Thomas R. W., L. A. Da Silva, and A. B. MacKenzie, (2005) “Cognitive Networks,” IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2005.,
Zhu, Feng and Seung-Woo Seo, (2009). "'Enhanced Robust Cooperative Spectrum Sensing in Cognitive Radio", JCN, Special Issue on Cognitive Radio: A Path in the Evol of Public
Published
2012-11-19
How to Cite
GAVINHO FILHO, Joffre; CARMO, Luiz F. R. C.; MACHADO, Raphael C. S.; PIRMEZ, Luci.
SDA-COG – Sistema de Detecção de Ataques para Rede de Rádios Cognitivos. In: BRAZILIAN SYMPOSIUM ON INFORMATION AND COMPUTATIONAL SYSTEMS SECURITY (SBSEG), 12. , 2012, Curitiba.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2012
.
p. 58-71.
DOI: https://doi.org/10.5753/sbseg.2012.20536.