Jamming mitigation in cognitive radio networks

Cognitive Radio Networks (CRNs) are recognized as the enabling technology for improving future bandwidth utilization. CRNs have intrinsic security threats due to their opportunistic exploitation of the bandwidth. In particular, jamming is one of the most challenging security threats for CRNs. In this work we provide several contributions about jamming in CRNs: we classify the various jamming strategies, provide a review of recent anti-jamming countermeasures, and introduce a novel anti-jamming solution for CRNs. Our solution is based on a distributed, probabilistic protocol that, while on the one hand could introduce some (limited) delay in message propagation, on the other hand enjoys several features: it avoids control channels for the coordination of the secondary users; does not need any information related to the node neighborhood; and it does not leverage any knowledge or statistics about the channel usage. Given the novelty of the proposal and its potential to thwart jamming in CRNs, we believe it could pave the way for further research in the field.

[1]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[2]  Roberto Di Pietro,et al.  COKE Crypto-Less Over-the-Air Key Establishment , 2013, IEEE Transactions on Information Forensics and Security.

[3]  K. J. Ray Liu,et al.  Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[4]  Laurence B. Milstein,et al.  Spoofing or Jamming: Performance Analysis of a Tactical Cognitive Radio Adversary , 2011, IEEE Journal on Selected Areas in Communications.

[5]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[6]  Sisi Liu,et al.  Thwarting inside jamming attacks on wireless broadcast communications , 2011, WiSec '11.

[7]  L.C. Baird,et al.  Keyless Jam Resistance , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[8]  Kaigui Bian,et al.  Control Channel Establishment in Cognitive Radio Networks using Channel Hopping , 2011, IEEE Journal on Selected Areas in Communications.

[9]  Claudio Soriente,et al.  United We Stand: Intrusion Resilience in Mobile Unattended WSNs , 2013, IEEE Transactions on Mobile Computing.

[10]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[11]  Srdjan Capkun,et al.  Anti-jamming broadcast communication using uncoordinated spread spectrum techniques , 2010, IEEE Journal on Selected Areas in Communications.

[12]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[13]  Albert Y. Zomaya,et al.  Energy-Efficient Permutation Routing in Radio Networks , 2001, IEEE Trans. Parallel Distributed Syst..

[14]  Michele Zorzi,et al.  JENNA: A Jamming Evasive Network-Coding Neighbor-Discovery Algorithm for Cognitive Radio Networks , 2010, 2010 IEEE International Conference on Communications Workshops.

[15]  Rachid Guerraoui,et al.  The wireless synchronization problem , 2009, PODC '09.

[16]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[17]  Rachid Guerraoui,et al.  Secure communication over radio channels , 2008, PODC '08.