Misbehavior Scenarios in Cognitive Radio Networks

Recent advances in the fields of Cognitive Radio and the proliferation of open spectrum access promise that spectrum-agile wireless communication will be widespread in the near future, and will bring significant flexibility and potential utility improvements for end users. With spectrum efficiency being a key objective, most relevant research focuses on smart coexistence mechanisms. However, wireless nodes may behave selfishly and should be considered as rational autonomous entities. Selfishness, pure malice or even faulty equipment can lead to behavior that does not conform to sharing protocols and etiquette. Thus, there is a need to secure spectrum sharing mechanisms against attacks in the various phases of the sharing process. Identifying these attacks and possible countermeasures is the focus of this work.

[1]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[2]  Salil S. Kanhere,et al.  NIS07-5: Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks , 2006, IEEE Globecom 2006.

[3]  Haitao Zheng,et al.  Distributed spectrum allocation via local bargaining , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[4]  Özgür B. Akan,et al.  Cognitive radio sensor networks , 2009, IEEE Network.

[5]  Anant Sahai,et al.  Fundamental design tradeoffs in cognitive radio systems , 2006, TAPAS '06.

[6]  Markus Fiedler,et al.  A Fuzzy Set Theory Based Method to Discover Transmissions in Wireless Personal Area Networks , 2006, 2006 International Conference on Wireless and Mobile Communications (ICWMC'06).

[7]  Chien-Chung Shen,et al.  Single-Radio Adaptive Channel Algorithm for Spectrum Agile Wireless Ad Hoc Networks , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[8]  Amitabha Das,et al.  A survey on MAC protocols in OSA networks , 2009, Comput. Networks.

[9]  K. J. Ray Liu,et al.  Collusion-Resistant Multi-Winner Spectrum Auction for Cognitive Radio Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[10]  F. Jondral,et al.  Dynamic and local combined pricing, allocation and billing system with cognitive radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[11]  Fernando Paganini,et al.  Mechanism-based resource allocation for multimedia transmission over spectrum agile wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[12]  George C. Polyzos,et al.  The EIFFEL approach towards Visions for a Future Networked Society , 2009 .

[13]  Ben Y. Zhao,et al.  Utilization and fairness in spectrum assignment for opportunistic spectrum access , 2006, Mob. Networks Appl..

[14]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[15]  P. Cramton,et al.  Introduction to Combinatorial Auctions , 2006 .

[16]  K. J. Ray Liu,et al.  Multi-Stage Pricing Game for Collusion-Resistant Dynamic Spectrum Allocation , 2008, IEEE Journal on Selected Areas in Communications.

[17]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[18]  Sisi Liu,et al.  Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.

[19]  Oriol Sallent,et al.  A novel on-demand cognitive pilot channel enabling dynamic spectrum allocation , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[20]  John Domingue,et al.  The future of the internet , 1997, ACM '97.

[21]  Morad Benyoucef,et al.  A Rule-Driven Approach for Defining the Behaviour of Negotiating Software Agents , 2002, DCW.

[22]  George C. Polyzos,et al.  Secure interference reporting for dense Wi-Fi deployments , 2009, Co-Next Student Workshop '09.

[23]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[24]  Jung-Min Park,et al.  Tamper Resistance for Software Defined Radio Software , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.

[25]  Wade Trappe,et al.  TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[26]  Timothy X. Brown,et al.  Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.

[27]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[28]  Alan Kai-Hau Yeung,et al.  Challenges in the migration to 4G mobile systems , 2003, IEEE Commun. Mag..

[29]  S. Arkoulis,et al.  Cognitive Spectrum and Its Security Issues , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.

[30]  Nitin H. Vaidya,et al.  Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a single transceiver , 2004, MobiHoc '04.

[31]  Ying-Chang Liang,et al.  Exploiting Hidden Power-Feedback Loops for Cognitive Radio , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[32]  A. Sahai,et al.  Spectrum Enforcement and Liability Assignment in Cognitive Radio Systems , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[33]  C. Cordeiro,et al.  C-MAC: A Cognitive MAC Protocol for Multi-Channel Wireless Networks , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[34]  Ravi Prakash,et al.  MAC-layer scheduling in cognitive radio based multi-hop wireless networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[35]  J.H. Reed,et al.  Performance of Distributed Dynamic Frequency Selection Schemes for Interference Reducing Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[36]  Dirk Grunwald,et al.  A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[37]  Elias C. Efstathiou,et al.  A Peer-to-Peer Approach to Sharing Wireless Local Area Networks , 2006 .

[38]  M.E. Steenstrup,et al.  Opportunistic use of radio-frequency spectrum: a network perspective , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[39]  L. Ma,et al.  Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[40]  Xuemin Shen,et al.  HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management , 2008, IEEE Journal on Selected Areas in Communications.

[41]  Jean-Pierre Hubaux,et al.  Security and Cooperation in Wireless Networks , 2007, ESAS.

[42]  Lata Narayanan,et al.  Channel assignment and graph multicoloring , 2002 .

[43]  Cristina Comaniciu,et al.  Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[44]  Charles W. Bostian,et al.  COGNITIVE RADIOS WITH GENETIC ALGORITHMS: INTELLIGENT CONTROL OF SOFTWARE DEFINED RADIOS , 2004 .

[45]  Yoav Shoham,et al.  Combinatorial Auctions , 2005, Encyclopedia of Wireless Networks.

[46]  A. Sahai,et al.  Codes to unmask spectrum violators in cognitive radio systems , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[47]  P. Bahl,et al.  DSAP: a protocol for coordinated spectrum access , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[48]  Markus Fiedler,et al.  A Multi-Dimensional CAN Approach to CRN Routing , 2010 .

[49]  Bernhard Walke,et al.  Strategies for distributed QoS support in radio spectrum sharing , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[50]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[51]  Kaigui Bian,et al.  MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .

[52]  William Stallings Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .

[53]  Geoffrey Ye Li,et al.  Proactive Detection of Spectrum Holes in Cognitive Radio , 2009, 2009 IEEE International Conference on Communications.

[54]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[55]  Frank H. P. Fitzek,et al.  Defining 4G technology from the users perspective , 2006, IEEE Network.

[56]  Haitao Zheng,et al.  Distributed Rule-Regulated Spectrum Sharing , 2008, IEEE Journal on Selected Areas in Communications.

[57]  Ian F. Akyildiz,et al.  A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.

[58]  R.W. Brodersen,et al.  Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[59]  E. Maasland,et al.  Auction Theory , 2021, Springer Texts in Business and Economics.

[60]  John M. Chapin,et al.  COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - The Path to Market Success for Dynamic Spectrum Access Technology , 2007, IEEE Communications Magazine.

[61]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.