Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks

Selfish primary user emulation (PUE) is a serious security problem in cognitive radio networks. By emitting emulated incumbent signals, a PUE attacker can selfishly occupy more channels. Consequently, a PUE attacker can prevent other secondary users from accessing radio resources and interfere with nearby primary users. To mitigate the selfish PUE, a surveillance process on occupied channels could be performed. Determining surveillance strategies, particularly in multi-channel context, is necessary for ensuring network operation fairness. Since a rational attacker can learn to adapt to the surveillance strategy, the question is how to formulate an appropriate modeling of the strategic interaction between a defender and an attacker. In this paper, we study the commitment model in which the network manager takes the leadership role by committing to its surveillance strategy and forces the attacker to follow the committed strategy. The relevant strategy is analyzed through the strong Stackelberg equilibrium (SSE). Analytical and numerical results suggest that, by playing the SSE strategy, the network manager significantly improves its utility with respect to playing a Nash equilibrium (NE) strategy, hence obtains a better protection against selfish PUEs. Moreover, the computational effort to compute the SSE strategy is lower than to find an NE strategy.

[1]  Prasant Mohapatra,et al.  Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space , 2013, IEEE Transactions on Mobile Computing.

[2]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[3]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[4]  John C. Harsanyi,et al.  Общая теория выбора равновесия в играх / A General Theory of Equilibrium Selection in Games , 1989 .

[5]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.

[6]  Wenliang Du,et al.  Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation , 2015, IEEE Transactions on Information Forensics and Security.

[7]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[8]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[9]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[10]  Mohsen Guizani,et al.  Securing cognitive radio networks against primary user emulation attacks , 2015, IEEE Network.

[11]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[12]  Heinrich von Stackelberg Market Structure and Equilibrium , 2010 .

[13]  Kaigui Bian,et al.  Security vulnerabilities in IEEE 802.22 , 2008, WICON.

[14]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[15]  Vincent Conitzer,et al.  Commitment to Correlated Strategies , 2011, AAAI.

[16]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[17]  Patrick Maillé,et al.  Mitigating selfish primary user emulation attacks in multi-channel cognitive radio networks: A surveillance game , 2016, ArXiv.

[18]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[19]  Ekram Hossain,et al.  Dynamic Spectrum Access and Management in Cognitive Radio Networks , 2009 .

[20]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[21]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[22]  Kaigui Bian,et al.  Security vulnerabilities in IEEE 802.22 , 2008, WICON 2008.

[23]  Philippe Ciblat,et al.  Mitigating Primary Emulation Attacks in Multi-Channel Cognitive Radio Networks: A Surveillance Game , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[24]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[25]  Amir Alipour-Fanid,et al.  Online learning-based optimal primary user emulation attacks in cognitive radio networks , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[26]  Shamik Sengupta,et al.  Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach , 2012, IET Commun..

[27]  Carlos A. Pomalaza-Raez,et al.  Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[28]  Mauro Barni,et al.  A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines , 2015, IEEE Transactions on Information Forensics and Security.

[29]  Philippe Ciblat,et al.  Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks , 2015, IEEE Transactions on Wireless Communications.

[30]  Sarit Kraus,et al.  The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.