Detecting identity-spoof attack based on BP network in cognitive radio network

In the cognitive radio network (CRN), all the cognitive user opportunistic access the spectrum, so it can improve the spectrum utilization. As a smart spectrum sharing technology, cognitive radio can change its transmitter parameter based on interactive the environment where it operates. So the MAC address can be easy spoofed in the open air. An attacker can exploit this character to preempt spectrum resources and bring the negative impact to the network. In this paper, we propose a scheme of detecting identity-spoof attack based on Back Propagation (BP) network. The scheme extracts the fingerprint feature of cognitive user to get the received signal strength (RSS). The extracted Eigen values can be used as the input vectors of the BP neural network which are trained by the honest users' RSS. The honest users and the attackers can be divided into two categories by the trained BP network to detect an identity-spoof attack. Simulation result shows that our scheme can effectively detect identity-spoof attack with a low false alarm rate and miss alarm rate.

[1]  Marco Gruteser,et al.  Detecting Identity Spoofs in IEEE 802.11e Wireless Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[2]  Susan C. Lee,et al.  Training a neural-network based intrusion detector to recognize novel attacks , 2001, IEEE Trans. Syst. Man Cybern. Part A.

[3]  Mohammad Reza Norouzian,et al.  Classifying attacks in a network intrusion detection system based on artificial neural networks , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[4]  Rong Zheng,et al.  Device fingerprinting to enhance wireless security using nonparametric Bayesian method , 2011, 2011 Proceedings IEEE INFOCOM.

[5]  Wade Trappe,et al.  Relationship -based Detection of Spoofing -related Anomalous Traffic in Ad Hoc Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[6]  Khalil El-Khatib,et al.  Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems , 2010, IEEE Transactions on Parallel and Distributed Systems.

[7]  Larry J. Greenstein,et al.  PHY-Authentication Protocol for Spoofing Detection in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[8]  Farinaz Koushanfar,et al.  Robust stable radiometric fingerprinting for wireless devices , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.

[9]  Prasant Mohapatra,et al.  Identity-based attack detection in mobile wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[10]  Wade Trappe,et al.  Light-weight Detection of Spoofing Attacks in Wireless Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[11]  Robert F. Mills,et al.  Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.