Anti-jamming Performance of Hybrid FEC code in the Presence of CRN Random Jammers

The survivability of Cognitive Radio Networks (CRNs) operating in the presence of malicious attackers, especially jammers is a crucial security issue. Cognitive Radio (CR) jammers are capable of taking advantage of the reconfigurable features of CRN so as to cause faults of different severity including value faults. The performance of CRNs under jamming attacks using the hybrid fault-model approach which considers different fault scenarios have been investigated. A hybrid Forward Error Correction (HFEC) code was proposed so as to mitigate the observed high jamming impact of CR jammers. The proposed HFEC code was defined as a concatenation of the Raptor code and the Secure Hash Algorithm-2 (SHA-2). The Raptor part is used to recover data loss due to jamming, while SHA-2 is used to verify the integrity of data received at the destination since CR jammers are capable of manipulating transmitted data leading to value faults. The HFEC code was designed in this manner so as to make it capable of handling all jamming scenarios identified under the hybrid fault model classification. In a previous paper, the performance of the HFEC code in a CRN operating in the presence of CR constant jammers was quantified. It was found that the HFEC code was robust against all instances of constant jammers, especially scenarios where value faults are introduced as a result of manipulated data. The need to investigate the performance of the HFEC in the presence of other jamming types like random jammers is imperative. This is because the random jammers behave significantly different from the constant jammers in their mode of operation. In this paper, we present the performance of the HFEC code in NS-2 extended for CRN. We essentially evaluate and analyze its performance against CR random jammers which are different from the constant jammers using relevant performance metrics. The observed high Packet Delivery Ratio (PDR) and recovery rate of the algorithm for all simulated scenarios show that the encoding and decoding algorithm of the proposed HFEC code is very efficient and resilient against the different rate of jamming of random jammers.

[1]  Xiaohua Li,et al.  Anti-jamming performance of cognitive radio networks under multiple uncoordinated jammers in fading environment , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).

[2]  K. J. Ray Liu,et al.  Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[3]  Donggang Liu,et al.  Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[4]  Udo R. Krieger,et al.  Raptor Codes for P2P Streaming , 2012, 2012 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing.

[5]  Michele Zorzi,et al.  JENNA: a jamming evasive network-coding neighbor-discovery algorithm for cognitive radio networks [Dynamic Spectrum Management] , 2010, IEEE Wireless Communications.

[6]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[7]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[8]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[9]  Amin Shokrollahi,et al.  Raptor codes , 2011, IEEE Transactions on Information Theory.

[10]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[11]  Michael Luby,et al.  LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[12]  A.R. Hammons,et al.  A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[13]  Patrick Tague,et al.  Improving anti-jamming capability and increasing jamming impact with mobility control , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[14]  Axel W. Krings,et al.  On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networks , 2013, CSIIRW '13.

[15]  Ian F. Akyildiz,et al.  Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..

[16]  Odysseas G. Koufopavlou,et al.  Implementation of the SHA-2 Hash Family Standard Using FPGAs , 2005, The Journal of Supercomputing.