Cross-Layer Attack and Defense in Cognitive Radio Networks

The existing research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily restrict themselves within the boundaries of network layers. In this paper, we design cross-layer attack strategies that can largely increase the attackers' power or reducing their risk of being detected. As a case study, we investigate the coordinated report-false-sensing data attack (PHY layer) and small-back-off-window attack (MAC layer). Furthermore, we propose a trust-based cross-layer defense framework that relies on abnormal detection in individual layers and cross-layer trust fusion. Simulation results demonstrate that the proposed defense framework can significantly reduce the maximum damage caused by attackers.

[1]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[2]  William A. Arbaugh,et al.  Dynamic spectrum access in cognitive radio networks , 2006 .

[3]  Ekram Hossain,et al.  Dynamic Spectrum Access and Management in Cognitive Radio Networks: Introduction , 2009 .

[4]  Xiaodong Wang,et al.  Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[5]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[6]  Geethapriya Thamilarasu,et al.  Exploring Cross-layer techniques for Security: Challenges and Opportunities in Wireless Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[7]  Xia Wang,et al.  Cross-Layer Based Anomaly Detection in Wireless Mesh Networks , 2009, 2009 Ninth Annual International Symposium on Applications and the Internet.

[8]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[9]  Ananthram Swami,et al.  Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework , 2007, IEEE Journal on Selected Areas in Communications.

[10]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[11]  T. W. Anderson On the Distribution of the Two-Sample Cramer-von Mises Criterion , 1962 .

[12]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[13]  Zhu Han,et al.  CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[14]  Kaigui Bian,et al.  MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .

[15]  Amir Ghasemi,et al.  Opportunistic Spectrum Access in Fading Channels Through Collaborative Sensing , 2007, J. Commun..