Game Theory-Based Analysis on Interactions Among Secondary and Malicious Users in Coordinated Jamming Attack in Cognitive Radio Systems

IEEE 802.22 Standard utilizes cognitive radio (CR) techniques to allow sharing unused spectrum band. CR is vulnerable to various attacks such as jamming attacks. This paper has focused on coordinated jamming attacks. A simple strategy for secondary users is to change their bands and switch to other appropriate bands when the jamming attack has occurred. Also, the malicious users should switch to other bands in order to jam the secondary users. To address this problem, a game theoretical method is proposed to analyze coordinated jamming attacks in CR. Then, using Nash equilibrium on the proposed game, the most appropriate bands have been found to switch as well as the optimal switching probabilities for both secondary and malicious users. Meanwhile, effects of different parameters like the number of malicious users are investigated in changing the optimal switching probabilities by analysis of the model.

[1]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[2]  Huifang Chen,et al.  Cooperative Primary User Emulation Attack and Defense in Cognitive Radio Networks , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[3]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[4]  Shamik Sengupta,et al.  Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2011, IEEE Journal on Selected Areas in Communications.

[5]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[6]  Zhu Han,et al.  CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[7]  Xiaohua Li,et al.  Anti-jamming performance of cognitive radio networks , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[8]  Ananthram Swami,et al.  Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework , 2007, IEEE Journal on Selected Areas in Communications.

[9]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[10]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[11]  Ryan W. Thomas,et al.  A Bayesian Game Analysis of Emulation Attacks in Dynamic Spectrum Access Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[12]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[13]  K. J. Ray Liu,et al.  Cognitive Radio Networking and Security: Preface , 2010 .

[14]  Kaigui Bian,et al.  Security vulnerabilities in IEEE 802.22 , 2008, WICON 2008.

[15]  K. J. Ray Liu,et al.  Optimal Defense against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[17]  Hai Jiang,et al.  Energy Detection Based Cooperative Spectrum Sensing in Cognitive Radio Networks , 2011, IEEE Transactions on Wireless Communications.

[18]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[19]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..

[20]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[21]  Peter C. Mason,et al.  Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.