Investigations of Radio Behavior and Security Threats in Cognitive Radio Networks
نویسنده
چکیده
Cognitive radio (CR) has been an active research topic in wireless communications. In this dissertation, radio behavior and potential security threats in cognitive radio networks are investigated in order to successfully deploy CR networks and realize its benefits. We study complex CR misuse issues during its secondary access processes, including misbehavior, cheating, and attack. Different countermeasure methods are also examined and evaluated. A new type of cognitive attack, most active band (MAB) attack, is proposed in this dissertation, where an attacker or a malicious CR node senses/determines the most active band within a multi-band CR network and targets this band through a denial of service (DoS) attack. A countermeasure strategy, coordinated concealment strategy (CCS), is introduced to counter the MAB attack. Our results show that CCS significantly outperforms CR’s inherent capability of signal/interference avoidance under a MAB attack. We also introduce CR’s power control capability in CCS to further improve the countermeasure performance. Further, to mitigate the misuses of CR networks, radio identification or classification is an important research issue. This dissertation presents two innovative radio modeling approaches for cognitive radio monitoring and identification in this dissertation. In radio fingerprinting modeling, we consider radio frequency fingerprinting (RFF) features that due to the radio’s hardware imperfections are more difficult to reproduce for misuse. We implement an RFF based radio modeling approach considering an RF transient waveform. Using machine learning algorithms, we analyze the extracted RFF features to identify radio terminals. A test bed is
منابع مشابه
Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks
Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...
متن کاملSpectrum Assignment in Cognitive Radio Networks Using Fuzzy Logic Empowered Ants
The prevalent communications networks suffer from lack of spectrum and spectrum inefficiency. This has motivated researchers to develop cognitive radio (CR) as a smart and dynamic radio access promised solution. A major challenge to this new technology is how to make fair assignment of available spectrum to unlicensed users, particularly for smart grids communication. This paper introduces an i...
متن کاملSpectrum Sharing Security and Attacks in CRNs: a Review
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive r...
متن کاملSpectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
متن کاملAn Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks
While cognitive radio networks (CRNs) present a promising solution to solve the scarcity of the radio spectrum, they are still susceptible to security threats. Until now, only a few researchers considered the use of intrusion detection systems (IDSs) to combat these threats against CRNs. In this article, we describe a CRN based on IEEE wireless regional area network (WRAN) and describe some of ...
متن کامل