Stochastic Model for Cognitive Radio Networks under Jamming Attacks and Honeypot-Based Prevention
نویسندگان
چکیده
Limited and dynamically available resources and “no right to protection from interference” in the open access dynamic spectrum access model bring forth a serious challenge of sustenance among the secondary networks and make them more susceptible to various spectrum etiquette attacks. Among these, the most common are jamming-based denial of service (DoS) attacks, which result in packet loss. The concept of a honeypot node or honeynode has been explored for wireless networks and has shown to be effective in attracting attacks, thus deterring the jammers from productive nodes. Yet a single dedicated honeynode, on account of its permanent idleness, is wasteful of an entire node as resource. In this paper, we seek to resolve this dilemma by dynamically selecting the honeynode for each transmission period, and we explore various methods of doing so. To begin with, we develop the first comprehensive queuing model for CRNs, which pose unique modeling challenges due to their periodic sensing and transmission cycles. We then build a simulation of CRNs under attack from jammers, introduce a series of strategies for honeynode assignment to combat these attacks, and assess the performance of each strategy. We find that the predictions of our mathematical model track closely with the results of our simulation experiments.
منابع مشابه
CR-Honeynet: A learning & decoy based Sustenance Mechanism Against Jamming Attack in CRN
Cognitive Radio Network (CRN) enables secondary users to borrow unused spectrum from the proprietary users in a dynamic and opportunistic manner. However, dynamic and open access nature of available spectrum brings a serious challenge of sustenance amongst CRNs which makes them vulnerable to various spectrum etiquette attacks. Jamming-based denial of service (DoS) attack poses serious threats t...
متن کاملPerformance analysis of CR-honeynet to prevent jamming attack through stochastic modeling
Cognitive Radio Network (CRN) has to stall its packet transmission periodically to sense the spectrum for Primary User’s (PU’s) transmission. The limited and dynamically available spectrum and fixed periodic schedule of transmission interruption makes it harder to model the performance of a CRNs. Again, an open and dynamic spectrum access model brings forth a serious challenge of sustenance amo...
متن کاملSecurity Threats and Jamming Attacks of Multi Channel Wireless Sensor Networks
Built upon a shared wireless medium, wireless sensor network is particularly vulnerable to jamming attacks. These attacks can easily be accomplished by an adversary by either bypassing MAC-layer protocols or emitting a radio signal targeted at jamming a particular channel. This paper considers a scenario where a sophisticated jammer jams an area in a multichannel wireless sensor network. The ja...
متن کاملMarkov Model Based Jamming and Anti-Jamming Performance Analysis for Cognitive Radio Networks
In this paper, we conduct a cross-layer analysis of both the jamming capability of the cognitiveradio-based jammers and the anti-jamming capability of the cognitive radio networks (CRN). We use a Markov chain to model the CRN operations in spectrum sensing, channel access and channel switching under jamming. With various jamming models, the jamming probabilities and the throughputs of the CRN a...
متن کاملMitigating jamming attacks in mobile cognitive networks through time hopping
5G wireless networks will support massive connectivity mainly due to device-to-device communications. An enabling technology for device-to-device links is the dynamical spectrum access. The devices, which are equipped with cognitive radios, are to be allowed to reuse spectrum occupied by cellular links. The dynamical spectrum availability makes cognitive users switch between channels. Switching...
متن کامل