Learning a Switching Bayesian Model for Jammer Detection in the Cognitive-Radio-Based Internet of Things

The proliferation of interconnected objects in the Internet of Things (IoT) can be benefit from integration of cognitive radio (CR) technologies at the network level. IoT networks equipped with cognitive capabilities can help to effectively alleviate the problem of spectrum scarcity. However, the IoT network can suffer from jammer attacks that interfere with user transmissions and disrupt communications. In this paper, we consider a CR-IoT network based on Orthogonal Frequency Division Multiplexing (OFDM) modulation scheme and a reactive jammer is hypothesized to be present in the network. A jammer detection method is proposed that is based on learning a switching Dynamic Bayesian Network (DBN) from normal OFDM data transmissions that is capable to detect abnormal situations. The proposed model is shown to be capable to detect and locate multiple jammers. The comparison with a conventional energy detection shows the validity of the proposed approach.

[1]  Marwan Krunz,et al.  Rolling preambles: Mitigating stealthy FO estimation attacks in OFDM-based 802.11 systems , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[2]  Xiao Ma,et al.  Sensing Statistical Primary Network Patterns via Bayesian Network Structure Learning , 2017, IEEE Transactions on Vehicular Technology.

[3]  Yue Gao,et al.  Scalable and Reliable IoT Enabled by Dynamic Spectrum Management for M2M in LTE-A , 2016, IEEE Internet of Things Journal.

[4]  Srikanth V. Krishnamurthy,et al.  Exploiting Subcarrier Agility to Alleviate Active Jamming Attacks in Wireless Networks , 2015, IEEE Transactions on Mobile Computing.

[5]  Yaser Jararweh,et al.  Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks , 2018, Telecommun. Syst..

[6]  M. H. Rehmani,et al.  White space : De fi nitional perspectives and their role in exploiting spectrum opportunities , 2016 .

[7]  Larry J. Greenstein,et al.  ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks , 2009, IEEE INFOCOM 2009.

[8]  Moussa Ayyash,et al.  Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks , 2018, IEEE Internet of Things Journal.

[9]  M. Nitti,et al.  Exploiting Social Internet of Things Features in Cognitive Radio , 2016, IEEE Access.

[10]  Elena López-Aguilera,et al.  Throughput and Range Characterization of IEEE 802.11ah , 2017, IEEE Latin America Transactions.

[11]  Mubashir Husain Rehmani,et al.  Cognitive-Radio-Based Internet of Things: Applications, Architectures, Spectrum Related Functionalities, and Future Research Directions , 2017, IEEE Wireless Communications.

[12]  Martin Reisslein,et al.  White space , 2016 .

[13]  Carlo S. Regazzoni,et al.  Stealthy jammer detection algorithm for wide-band radios: A physical layer approach , 2017, 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[14]  Hüseyin Arslan,et al.  OFDM for cognitive radio: merits and challenges , 2009, IEEE Wireless Communications.

[15]  Liang Xiao,et al.  DQN-Based Power Control for IoT Transmission against Jamming , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[16]  Feten Slimeni,et al.  Jamming mitigation in cognitive radio networks using a modified Q-learning algorithm , 2015, 2015 International Conference on Military Communications and Information Systems (ICMCIS).

[17]  Carlo S. Regazzoni,et al.  Learning Switching Models for Abnormality Detection for Autonomous Driving , 2018, 2018 21st International Conference on Information Fusion (FUSION).

[18]  Eylem Ekici,et al.  Optimal Power Allocation and Scheduling Under Jamming Attacks , 2017, IEEE/ACM Transactions on Networking.

[19]  Yang Gao,et al.  An Effective Multi-Objective Optimization Algorithm for Spectrum Allocations in the Cognitive-Radio-Based Internet of Things , 2018, IEEE Access.

[20]  Zhu Han,et al.  Jamming Mitigation via Hierarchical Security Game for IoT Communications , 2018, IEEE Access.

[21]  Nei Kato,et al.  Intrusion detection system (IDS) for combating attacks against cognitive radio networks , 2013, IEEE Network.

[22]  Eric Pierre Simon,et al.  Mitigation Technique to Reduce the Wi-Fi Susceptibility to Jamming Signals , 2018, 2018 2nd URSI Atlantic Radio Science Meeting (AT-RASC).

[23]  Salim Hariri,et al.  Anomaly-based Protection Approach against Wireless Network Attacks , 2007, IEEE International Conference on Pervasive Services.