Sustenance against RL-Based Sybil Attacks in Cognitive Radio Networks Using Dynamic Reputation System

In this paper, we formulate novel threat and defense mechanisms for the Sybil attack problem in Cognitive Radio Networks (CRN). We present potential identity sampling strategies that a malicious Sybil attacker can use to enhance its attack capability and impact without being detected. We investigate how a Sybil attacker can leverage reinforced learning technique to improve its performance. We also formulate a novel dynamic reputation mechanism to defend against such threat that relies on the nodes' reporting in an intelligent and adaptive manner. Results obtained shows that a Sybil attacker can improve its performance using RL technique. It also demonstrates that the use of the dynamic reputation mechanism can considerably reduce the effectiveness of Sybil attacks and improve the accuracy of spectrum decisions.

[1]  Kaushik R. Chowdhury,et al.  Common control channel design for cognitive radio wireless ad hoc networks using adaptive frequency hopping , 2010, Ad Hoc Networks.

[2]  Kai Hong,et al.  Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense , 2011, 2011 IEEE International Conference on Communications (ICC).

[3]  Brian M. Sadler,et al.  COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - Dynamic Spectrum Access in the Time Domain: Modeling and Exploiting White Space , 2007, IEEE Communications Magazine.

[4]  Kai Hong,et al.  Is Channel Fragmentation/bonding in IEEE 802.22 Networks Secure? , 2011, 2011 IEEE International Conference on Communications (ICC).

[5]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[6]  Shamik Sengupta,et al.  Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2010, 2010 IEEE International Conference on Communications.

[7]  Kai Hong,et al.  Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[8]  A. C. Sumathi,et al.  Security in cognitive radio networks - a survey , 2012, 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA).

[9]  T. Ulversoy,et al.  Software Defined Radio: Challenges and Opportunities , 2010, IEEE Communications Surveys & Tutorials.

[10]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[11]  Cheng Li,et al.  The security in cognitive radio networks: a survey , 2009, IWCMC.