A framework for resilient and secure spectrum sensing on cognitive radio networks

Cognitive radio networks have been envisaged to improve efficiency in accessing the frequency spectrum. However, these networks are prone to different kind of attacks and failures that can compromise the security and performance of licensed and unlicensed users. This work presents a framework for security and resilience in cognitive radio networks. As a showcase, this framework is applied to spectrum sensing functionality in order to assist its operation even in face to failures and attacks, such as primary user emulation ones. Differently from other proposals founded on specific and permanent device features, our framework provides flexibility and adaptation for detection and mitigation mechanisms considering best-efforts or real-time applications. Simulation results based on real traces provide evidences about the improvements achieved by our framework on spectrum sensing, even under primary user emulation attacks.

[1]  Kang G. Shin,et al.  Robust cooperative sensing via state estimation in cognitive radio networks , 2011, 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[2]  Jack L. Burbank,et al.  Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[3]  Jing Cao,et al.  Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks , 2009, PAM.

[4]  K. B. Letaief,et al.  Optimization of cooperative spectrum sensing with energy detection in cognitive radio networks , 2009, IEEE Transactions on Wireless Communications.

[5]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[6]  Prasant Mohapatra,et al.  Hearing is believing: Detecting mobile primary user emulation attack in white space , 2011, 2011 Proceedings IEEE INFOCOM.

[7]  Wen-Long Chin,et al.  Cooperative detection of primary user emulation attacks based on channel-tap power in mobile cognitive radio networks , 2014, Int. J. Ad Hoc Ubiquitous Comput..

[8]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[9]  David Hutchison,et al.  Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines , 2010, Comput. Networks.

[10]  K.P. Subbalakshmi,et al.  NEAT : A NEighbor AssisTed Spectrum Decision Protocol for Resilience against Primary User Emulation Attacks , 2009 .

[11]  Tristan Henderson,et al.  CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth , 2005, IEEE Pervasive Comput..

[12]  K ÇetinkayaEgemen,et al.  Modelling communication network challenges for Future Internet resilience, survivability, and disruption tolerance , 2013 .

[13]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[14]  Kang G. Shin,et al.  Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.

[15]  Erik G. Larsson,et al.  Spectrum Sensing in Cognitive Radio , 2020 .

[16]  Weichao Wang,et al.  Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding , 2013, J. Ubiquitous Syst. Pervasive Networks.

[17]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[18]  Michael G. Mitchell Taxonomy , 2013, Viruses and the Lung.

[19]  Yu-Dong Yao,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack , 2011, IEEE Transactions on Wireless Communications.

[20]  Yuan Zhang,et al.  Security Threats in Cognitive Radio Networks , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[21]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[22]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[23]  Michele Nogueira Lima,et al.  A flexible multi-criteria scheme to detect primary user emulation attacks in CRAHNs , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[24]  Luciano Bononi,et al.  End-to-end protocols for Cognitive Radio Ad Hoc Networks: An evaluation study , 2011, Perform. Evaluation.

[25]  Shi Qian,et al.  Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation , 2013, Telecommun. Syst..

[26]  Michele Nogueira,et al.  Taxonomy, flexibility, and open issues on pue attack defenses in cognitive radio networks , 2013, IEEE Wireless Communications.

[27]  Anass Benjebbour,et al.  Design considerations for a 5G network architecture , 2014, IEEE Communications Magazine.

[28]  Zhongding Lei,et al.  IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.

[29]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[30]  Ian F. Akyildiz,et al.  CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.

[31]  Santhanakrishnan Anand,et al.  Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[32]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[33]  Ian F. Akyildiz,et al.  OFDM-Based Common Control Channel Design for Cognitive Radio Ad Hoc Networks , 2011, IEEE Transactions on Mobile Computing.

[34]  James P. G. Sterbenz,et al.  Modelling communication network challenges for Future Internet resilience, survivability, and disruption tolerance: a simulation-based approach , 2013, Telecommun. Syst..

[35]  Mohsen Guizani,et al.  Securing cognitive radio networks against primary user emulation attacks , 2015, IEEE Network.

[36]  Tristan Henderson,et al.  CRAWDAD: a community resource for archiving wireless data at Dartmouth , 2005, CCRV.

[37]  Sunghyun Choi,et al.  Wi-Fi could be much more , 2014, IEEE Communications Magazine.

[38]  Ray Jain,et al.  The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.

[39]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[40]  Erik G. Larsson,et al.  Spectrum Sensing for Cognitive Radio : State-of-the-Art and Recent Advances , 2012, IEEE Signal Processing Magazine.

[41]  Ian F. Akyildiz,et al.  Efficient Recovery Control Channel Design in Cognitive Radio Ad Hoc Networks , 2010, IEEE Transactions on Vehicular Technology.

[42]  Rong Zheng,et al.  On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification , 2012, IEEE Transactions on Signal Processing.