On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks

In cognitive radio networks, physical layer spectrum sensing plays a key role in helping cognitive radios adapt to changes in spectrum availability. However, it raises significant security issues at the physical layer as well. In this paper, we investigate collaborative sensing of cognitive radio networks under malicious attacks, and analyze the system performance in a generalized framework. The system design goal is to improve efficiency of spectrum access on a non-interfering basis, which is formulated as a constrained parameter optimization problem. A numerical algorithm is provided to resolve the problem. The system performances are evaluated under various conditions, and discussions are provided to help better understand the effectiveness of the attacks and their countermeasures.

[1]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[2]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[3]  Pramod K. Varshney,et al.  Distributed Detection and Data Fusion , 1996 .

[4]  Albert H. Nuttall,et al.  Some integrals involving the QM function (Corresp.) , 1975, IEEE Trans. Inf. Theory.

[5]  A. Ghasemi,et al.  Collaborative spectrum sensing for opportunistic access in fading environments , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[6]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[7]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..

[8]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[9]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[10]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[11]  Anant Sahai,et al.  Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.

[12]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).