A Game-Theoretic View on Objective Function Attack and ITS Defense

The objective function of a cognitive network is the basis for optimizing its operation parameters. However, one kind of attack, named OFA (Objective Function Attack), could exploit some cognitive characters to disrupt the optimizing process, which will result in the operation parameters deviating from the optimal value. Existed defense strategies for OFA mainly focus on verifying the fluctuation ranges of those parameters in a central way, while the long response time caused by central processing is ignored. Moreover, those methods are incapable of coping with attacks with a large scope. By analyzing the interactive process between OFA and its defense, a defense method based on differential game is proposed in this paper. This method constructs a game model for automatic defense, in which an immediate response-defense strategy and a threat factor are used. Simulation results show that the proposed method has a shorter response time and better defense effect compared with other existing methods.

[1]  Carolina Fortuna,et al.  Trends in the development of communication networks: Cognitive networks , 2009, Comput. Networks.

[2]  Miguel Soriano,et al.  Securing cognitive radio networks , 2010 .

[3]  Miguel Soriano,et al.  Securing cognitive radio networks , 2010, Int. J. Commun. Syst..

[4]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[5]  Allen B. MacKenzie,et al.  Cognitive networks: adaptation and learning to achieve end-to-end performance objectives , 2006, IEEE Communications Magazine.

[6]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[7]  Mohsen Guizani,et al.  Survey of Security Issues in Cognitive Radio Networks , 2011 .

[8]  Yenumula B. Reddy,et al.  Security Issues and Threats in Cognitive Radio Networks , 2013 .

[9]  Peter C. Mason,et al.  Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[10]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[11]  Olga León Abarca,et al.  Securing cognitive radio networks , 2010 .

[12]  Song Han,et al.  Cognitive radio network security: A survey , 2012, J. Netw. Comput. Appl..

[13]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[14]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.