Optimal Defense against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach

Cognitive radio technology has become a promising approach to increase the efficiency of spectrum utilization. Since cognitive radio users are vulnerable to malicious attacks, security countermeasures are crucial to the successful deployment of cognitive radio networks in the future. In this paper, we focus on defending against the jamming attack, one of the major threats to cognitive radio networks, where several malicious attackers intend to jam the secondary user's communication link by injecting interference. We model this scenario into a jamming game, and derive the optimal strategy through the Markov decision process approach. Furthermore, a learning scheme is proposed for the secondary user to observe the wireless environment and estimate parameters such as primary users' access pattern and the number of attackers. Finally, simulation results are presented to verify the performance.

[1]  Rami G. Melhem,et al.  Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive? , 2008, SecureComm.

[2]  K. J. Ray Liu,et al.  Optimal power allocation strategy against jamming attacks using the Colonel Blotto game , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[3]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[4]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[5]  T.X. Brown,et al.  Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[6]  K. J. Ray Liu,et al.  Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.

[7]  Eitan Altman,et al.  A Jamming Game in Wireless Networks with Transmission Cost , 2007, NET-COOP.

[8]  Zhu Han,et al.  CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[9]  Martin L. Puterman,et al.  Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .

[10]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[11]  Zhu Han,et al.  Dogfight in Spectrum: Jamming and Anti-Jamming in Multichannel Cognitive Radio Systems , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[12]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[13]  Hang Su,et al.  Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings Over Cognitive Radio Wireless Networks , 2008, IEEE Journal on Selected Areas in Communications.