Performance Analysis of Wireless Energy Harvesting Cognitive Radio Networks Under Smart Jamming Attacks

In cognitive radio networks with wireless energy harvesting, secondary users are able to harvest energy from a wireless power source and then use the harvested energy to transmit data opportunistically on an idle channel allocated to primary users. Such networks have become more common due to pervasiveness of wireless charging, improving the performance of the secondary users. However, in such networks, the secondary users can be vulnerable to jamming attacks by malicious users who can also harvest wireless energy to launch the attacks. In this paper, we first formulate the throughput optimization problem for a secondary user under the attacks by jammers as a Markov decision process (MDP). We then introduce a new solution based on the deception tactic to deal with smart jamming attacks. Furthermore, we propose a learning algorithm for the secondary user to find an optimal transmission policy and extend to the case with multiple secondary users in the same environment. Through the simulations, we demonstrate that the proposed learning algorithms can effectively reduce adverse effects from smart jammers even when they use different attack strategies.

[1]  B. Roberson The Colonel Blotto game , 2006 .

[2]  K. J. Ray Liu,et al.  Optimal power allocation strategy against jamming attacks using the Colonel Blotto game , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[3]  Mainak Chatterjee,et al.  Collaborative jamming and collaborative defense in cognitive radio networks , 2013, Pervasive Mob. Comput..

[4]  Ekram Hossain,et al.  Dynamic Spectrum Access and Management in Cognitive Radio Networks: Introduction , 2009 .

[5]  Ekram Hossain,et al.  Dynamic Spectrum Access and Management in Cognitive Radio Networks , 2009 .

[6]  Abhijit Gosavi,et al.  Simulation-Based Optimization: Parametric Optimization Techniques and Reinforcement Learning , 2003 .

[7]  Shabnam Sodagari,et al.  An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks , 2011, GameSec.

[8]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[9]  Abhijit Gosavi,et al.  Simulation-Based Optimization: Parametric Optimization Techniques and Reinforcement Learning , 2003 .

[10]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.

[11]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[12]  Mehryar Mohri,et al.  Multi-armed Bandit Algorithms and Empirical Evaluation , 2005, ECML.

[13]  Xiaodong Lin,et al.  On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking , 2013, IEEE Wireless Communications.

[14]  D. Curtis Schleher,et al.  Electronic Warfare in the Information Age , 1999 .

[15]  Luiz A. DaSilva,et al.  IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING Editorial Board , 2015 .

[16]  Dinh Thai Hoang,et al.  Performance analysis of cognitive machine-to-machine communications , 2012, 2012 IEEE International Conference on Communication Systems (ICCS).

[17]  Peter L. Bartlett,et al.  Experiments with Infinite-Horizon, Policy-Gradient Estimation , 2001, J. Artif. Intell. Res..

[18]  Peter Auer,et al.  The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..

[19]  Dong In Kim,et al.  Performance Optimization for Cooperative Multiuser Cognitive Radio Networks with RF Energy Harvesting Capability , 2015, IEEE Transactions on Wireless Communications.

[20]  Prusayon Nintanavongsa,et al.  Design Optimization and Implementation for RF Energy Harvesting Circuits , 2012, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[21]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[22]  K. Schittkowski,et al.  NONLINEAR PROGRAMMING , 2022 .

[23]  Sungsoo Park,et al.  Cognitive Radio Networks with Energy Harvesting , 2013, IEEE Transactions on Wireless Communications.

[24]  K. J. Ray Liu,et al.  Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[25]  Sungsoo Park,et al.  Optimal mode selection for cognitive radio sensor networks with RF energy harvesting , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[26]  M. Soljačić,et al.  Wireless Power Transfer via Strongly Coupled Magnetic Resonances , 2007, Science.

[27]  John N. Tsitsiklis,et al.  Gradient Convergence in Gradient methods with Errors , 1999, SIAM J. Optim..

[28]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[29]  John N. Tsitsiklis,et al.  Simulation-based optimization of Markov reward processes , 2001, IEEE Trans. Autom. Control..

[30]  Jiaru Lin,et al.  An online energy allocation strategy for energy harvesting cognitive radio systems , 2013, 2013 International Conference on Wireless Communications and Signal Processing.

[31]  Dong In Kim,et al.  Opportunistic Channel Access and RF Energy Harvesting in Cognitive Radio Networks , 2014, IEEE Journal on Selected Areas in Communications.

[32]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[33]  Shamik Sengupta,et al.  Stochastic Model for Cognitive Radio Networks under Jamming Attacks and Honeypot-Based Prevention , 2014, ICDCN.

[34]  Ahmed Sultan Sensing and Transmit Energy Optimization for an Energy Harvesting Cognitive Radio , 2012, IEEE Wireless Communications Letters.

[35]  Di Pu Primary User Emulation Detection in Cognitive Radio Networks , 2013 .

[36]  Olivier Buffet,et al.  Shaping multi-agent systems with gradient reinforcement learning , 2007, Autonomous Agents and Multi-Agent Systems.

[37]  Sungsoo Park,et al.  Optimal Spectrum Access for Energy Harvesting Cognitive Radio Networks , 2013, IEEE Transactions on Wireless Communications.