Transfer learning for device fingerprinting with application to cognitive radio networks

Primary user emulation (PUE) attacks are an emerging threat to cognitive radio (CR) networks in which malicious users imitate the primary users (PUs) signals to limit the access of secondary users (SUs). Ascertaining the identity of the devices is a key technical challenge that must be overcome to thwart the threat of PUE attacks. Typically, detection of PUE attacks is done by inspecting the signals coming from all the devices in the system, and then using these signals to form unique fingerprints for each device. Current detection and fingerprinting approaches require certain conditions to hold in order to effectively detect attackers. Such conditions include the need for a sufficient amount of fingerprint data for users or the existence of both the attacker and the victim PU within the same time frame. These conditions are necessary because current methods lack the ability to learn the behavior of both SUs and PUs with time. In this paper, a novel transfer learning (TL) approach is proposed, in which abstract knowledge about PUs and SUs is transferred from past time frames to improve the detection process at future time frames. The proposed approach extracts a high level representation for the environment at every time frame. This high level information is accumulated to form an abstract knowledge database. The CR system then utilizes this database to accurately detect PUE attacks even if an insufficient amount of fingerprint data is available at the current time frame. The dynamic structure of the proposed approach uses the final detection decisions to update the abstract knowledge database for future runs. Simulation results show that the proposed method can improve the performance with an average of 3.5% for only 10% relevant information between the past knowledge and the current environment signals.

[1]  Loukas Lazos,et al.  A Primary User authentication system for mobile cognitive radio networks , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).

[2]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[3]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[4]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[5]  Rong Zheng,et al.  On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification , 2012, IEEE Transactions on Signal Processing.

[6]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[7]  Alexander M. Wyglinski,et al.  Primary user emulation detection using frequency domain action recognition , 2011, Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.

[8]  Qiang Yang,et al.  A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.

[9]  Desmond Loh Chin Choong,et al.  Identifying unique devices through wireless fingerprinting , 2008, WiSec '08.

[10]  Zhu Han,et al.  Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[11]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[12]  Michael J. Black,et al.  A nonparametric Bayesian alternative to spike sorting , 2008, Journal of Neuroscience Methods.