An adaptive energy aware strategy based on game theory to add privacy in the physical layer for cognitive WSNs

Abstract The expansion of big data and the evolution of Internet of Things (IoT) technologies will play an important role in the feasibility of Smart City initiatives. In this IoT network infrastructure Cognitive Wireless Sensor Networks (WSNs), as a network of nodes that work in a cooperative way to sense the spectrum and control the environment surrounding them, are one of the main technologies. Security and privacy appear as key aspects for the development of new applications and services. In this work we propose a novel artificial noise generation strategy based on game theory in order to improve the security against privacy attacks in CWSNs. Artificial noise generation consists in introducing interferences in the spectrum in order to mask the real information. The decision whether or not to introduce artificial noise is modeled through a light non-cooperative game designed for low-resources networks that balance security enhancement and energy consumption. We show, using several simulations, that even with a cognitive attacker our strategy has reduced the information obtained by the attacker (Secrecy Outage Probability) to a value under 10%. The overhead (energy consumption and spectrum occupancy) of the strategy has also been deeply analyzed. All possible cases our approach provides better results, in the ratio energy consumption - security, than not using the strategy or using a random noise generation strategy. Also, although the saturation of the radio spectrum is strongly affected, the reliability of the network is maintained in 95% of application packages received. Therefore, we can conclude that an improvement of the privacy in the physical layer is obtained, taking into account energy consumption and maintaining levels of spectrum saturation suitable for the application proposes.

[1]  Mikael Skoglund,et al.  Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints , 2015, IEEE Wireless Communications Letters.

[2]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[3]  Badr Alsamani,et al.  A taxonomy of IoT: Security and privacy threats , 2018, 2018 International Conference on Information and Computer Technologies (ICICT).

[4]  Peter Langendörfer,et al.  Shortening the security parameters in lightweight WSN applications for IoT - lessons learned , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[5]  Zhi Xue,et al.  Security in MIMO wireless hybrid channel with artificial noise , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).

[6]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[7]  Martha Johanna Sepúlveda,et al.  Sensing as a Service: Secure Wireless Sensor Network Infrastructure Sharing for the Internet of Things , 2017, Open J. Internet Things.

[8]  Mustafa Kocakulak,et al.  An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[9]  Arumugam Nallanathan,et al.  Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game , 2016, IEEE Communications Letters.

[10]  Javier Blesa,et al.  PUE Attack Detection in CWSN Using Collaboration and Learning Behavior , 2013, Int. J. Distributed Sens. Networks.

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  Xavier Fernando,et al.  Cognitive Wireless Sensor Networks: Emerging topics and recent challenges , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[13]  Ivana Tomić,et al.  A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.

[14]  S. Alrabaee,et al.  Game Theory for Security in Cognitive Radio Networks , 2012, 2012 International Conference on Advances in Mobile Network, Communication and Its Applications.

[15]  Tamer Başar,et al.  A game-theoretic view on the physical layer security of cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[16]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[17]  K. Antonopoulos,et al.  Security necessity and its impact on smart cities' wireless sensor networks , 2017, 2017 South Eastern European Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM).

[18]  Yueming Cai,et al.  Energy-efficient optimization for physical layer security in large-scale random CRNs , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[19]  Doaa Alrababah,et al.  A Survey: Authentication Protocols for Wireless Sensor Network in the Internet of Things; Keys and Attacks , 2017, 2017 International Conference on New Trends in Computing Sciences (ICTCS).

[20]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[21]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.