Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach

Cognitive radio (CR) enabled dynamic spectrum access (DSA) networks are designed to detect and opportunistically utilise the unused or under-utilised spectrum bands. However, due to the open paradigm of CR networks and lack of proactive security protocols, the DSA networks are vulnerable to various denial-of-service threats. The authors propose a game-theoretic framework to study the primary user emulation attack (PUEA) on CR nodes. A non-cooperative dynamic multistage game between the secondary nodes and the adversaries generating the PUEA is formulated. The pure-strategy and mixed-strategy Nash equilibria for the secondary user and malicious attacker are investigated. Moreover, a novel belief updating system is proposed for the secondary user to learn the state of the primary user as the game evolves. Simulation results demonstrate that the proposed belief updating system achieves better performance than other models for the secondary user in terms of greater payoff, lower probability of missing primary user and better robustness to the inaccurate estimation of the primary user's state.

[1]  Geoffrey Ye Li,et al.  Cooperative Spectrum Sensing in Cognitive Radio, Part II: Multiuser Networks , 2007, IEEE Transactions on Wireless Communications.

[2]  H. Vincent Poor,et al.  Optimal Multiband Joint Detection for Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE Transactions on Signal Processing.

[3]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[4]  Jonathan S. Adelstein Statement of commissioner Jonathan S. Adelstein, Re: Unlicensed operation in the TV broadcast bands; second report and order and memorandum opinion and order, ET Docket no. 04-186 , 2010 .

[5]  Zhou Xianwei,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008 .

[6]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[7]  Carlos A. Pomalaza-Raez,et al.  Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[8]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[9]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .

[10]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[11]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[12]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[13]  Ying-Chang Liang,et al.  Blind Spectrum Sensing Algorithms for Cognitive Radio Networks , 2008, IEEE Transactions on Vehicular Technology.

[14]  Ryan W. Thomas,et al.  A Bayesian Game Analysis of Emulation Attacks in Dynamic Spectrum Access Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[15]  Shamik Sengupta,et al.  Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2010, 2010 IEEE International Conference on Communications.

[16]  Yonghong Zeng,et al.  Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..

[17]  Jie Wu,et al.  Hit and Run: A Bayesian Game Between Malicious and Regular Nodes in MANETs , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[18]  Prabir Bhattacharya,et al.  A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[19]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[20]  Zhu Han,et al.  Dogfight in Spectrum: Jamming and Anti-Jamming in Multichannel Cognitive Radio Systems , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[21]  G. Jakimoski,et al.  Denial-of-Service Attacks on Dynamic Spectrum Access Networks , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.

[22]  Qusay H. Mahmoud,et al.  Cognitive Networks: Towards Self-Aware Networks , 2007 .

[23]  Thomas Schonhoff Detection and Estimation Theory , 2006 .

[24]  Drew Fudenberg,et al.  Game theory (3. pr.) , 1991 .

[25]  Amir Ghasemi,et al.  Interference Aggregation in Spectrum-Sensing Cognitive Wireless Networks , 2008, IEEE Journal of Selected Topics in Signal Processing.

[26]  Jean-Pierre Hubaux,et al.  Game Theory in Wireless Networks: A Tutorial , 2006 .