Um Esquema Cooperativo para Análise da Presença de Ataques EUP em Redes Ad Hoc de Rádio Cognitivo

  • Julio Soto UFPR
  • Saulo Queiroz UFPR
  • Michele Nogueira UFPR

Abstract


In Cognitive Radio Ad Hoc Networks, malicious Secondary Users can exploit CR capabilities to perform Primary User Emulation Attacks (PUEA). These attacks pretend the characteristics of a Primary User, giving to malicious users the priority of using licensed frequencies over well-behaved unlicensed Secondary Users. To address this problem, studies in the literature have proposed the use of specific criteria to detect PUE attacks. Such solutions, however, do not consider the use of multiple different criteria to infer the presence of PUEA on the network. To fill this gap, we propose INCA, a novel multIple criteria scheme for the deceNtralized and Cooperative Analysis of the PUEA presence in CRAHNs. INCA follows two phases. On the first, each SU employs multiple criteria to define a hypothesis about the potential existence of attacks; whereas on the second, these hypotheses are exchanged among neighbors, and each SU employs the Bayes theorem to calculate the final probability of the PUEA presence. Simulation results show the improvement and effectiveness of the multi-criteria approach.

References

Akyildiz, I., Lee, W.-Y., Vuran, M., and Mohanty, S. (2008). A survey on spectrum management in cognitive radio networks. IEEE Comm. Mag., 46(4):40–48.

Akyildiz, I. F., Lee, W.-Y., and Chowdhury, K. R. (2009). Crahns: Cognitive radio ad hoc networks. Ad Hoc Networks, 7(5):810–836.

Anand, S., Jin, Z., and Subbalakshmi, K. (2008). An analytical model for primary user emulation attacks in cognitive radio networks. In IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN, pages 1–6.

Ariananda, D., Lakshmanan, M., and Nikoo, H. (2009). A survey on spectrum sensing techniques for cognitive radio. In Cognitive Radio and Advanced Spectrum Management, CogART. Second International Workshop on, pages 74–79.

Benayoun, R., Roy, B., and Sussman, N. (1966). Manual de reference du programme electre. Note De Synthese et Formaton, 25.

Chen, C., Cheng, H., and Yao, Y.-D. (2011). Cooperative spectrum sensing in cognitive radio networks in the presence of the primary user emulation attack. IEEE Trans. on Wireless Comm., 10(7):2135 –2141.

Chen, R. and Park, J.-M. (2006). Ensuring trustworthy spectrum sensing in cognitive radio networks. In IEEE SDR, pages 110–119.

Chen, R., Park, J.-M., and Reed, J. (2008). Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Comm., 26(1):25–37.

Felice, M. D., Chowdhury, K., Kim, W., Kassler, A., and Bononi, L. (2011). End-to-end protocols for cognitive radio ad hoc networks: An evaluation study. Performance Evaluation, 68(9):859 – 875.

Fragkiadakis, A., Tragos, E., and Askoxylakis, I. (2012). A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys Tutorials, PP(99):1 – 18.

Jin, Z., Anand, S., and Subbalakshmi, K. (2010). Robust spectrum decision protocol against primary user emulation attacks in dynamic spectrum access networks. In IEEE GLOBECOM, pages 1–5.

Jin, Z., Anand, S., and Subbalakshmi, K. P. (2009). Detecting primary user emulation attacks in dynamic spectrum access networks. In IEEE ICC, pages 2749–2753.

Lee, W.-Y. and Akyldiz, I. F. (2011). A spectrum decision framework for cognitive radio networks. IEEE Trans. on Mobile Computing, 10(2):161–174.

Li, H. and Han, Z. (2010). Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, part i: Known channel statistics. IEEE Trans. on Wireless Comm., 9(11):3566–3577.

Malakooti, B., Thomas, I., Tanguturi, S., Gajurel, S., and Kim, H. (2006). Multiple criteria network routing with simulation results. Industrial Engineering Research Conference (IERC).

Min, A., Kim, K.-H., and Shin, K. (2011). Robust cooperative sensing via state estimation in cognitive radio networks. In IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN, pages 185 –196.

Mitola, J. and Maguire, G. Q. (1999). Cognitive radio: making software radios more personal. IEEE Pers. Comm., 6(4):13–18.

Saaty, T. L. (1980). The analytic hierarchy process. McGraw Hill.

Stevenson, C., Chouinard, G., Lei, Z., Hu, W., Shellhammer, S., and Caldwell, W. (2009). Ieee 802.22: The first cognitive radio wireless regional area network standard. IEEE Communications Magazine, 47(1):130–138.

Subhedar, M. and Birajdar, G. (2011). Spectrum sensing techniques in cognitive radio networks: A survey. International Journal of NextGeneration Networks, 3(2):37–51.

Tan, Y., Hong, K., Sengupta, S., and Subbalakshmi, K. P. (2011). Using sybil identities for primary user emulation and byzantine attacks in DSA networks. In IEEE GLOBECOM, pages 1–5.

Wang, X. and Triantaphyllou, E. (2008). Ranking irregularities when evaluating alternatives by using some electre methods. Omega, 36(1):45 – 63.

Wild, B. and Ramchandran, K. (2005). Detecting primary receivers for cognitive radio applications. In IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN, pages 124–130.

Yuan, Z., Niyato, D., Li, H., and Han, Z. (2011). Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks. In IEEE Wireless Communications and Networking Conference (WCNC), pages 599 – 604.

Z. Jin, S. A. and Subbalakshmi, K. P. (2010). Neat: A neighbor assisted spectrum decision protocol for resilience against primary user emulation attacks. Technical report, Department of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, NJ.

Zhang, W., Mallik, R., and Letaief, K. (2009). Optimization of cooperative spectrum sensing with energy detection in cognitive radio networks. IEEE Transactions on Wireless Communications, 8(12):5761–5766.
Published
2012-11-19
SOTO, Julio; QUEIROZ, Saulo; NOGUEIRA, Michele. Um Esquema Cooperativo para Análise da Presença de Ataques EUP em Redes Ad Hoc de Rádio Cognitivo. In: BRAZILIAN SYMPOSIUM ON INFORMATION AND COMPUTATIONAL SYSTEMS SECURITY (SBSEG), 12. , 2012, Curitiba. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2012 . p. 168-181. DOI: https://doi.org/10.5753/sbseg.2012.20544.