Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective

Cognitive Radio CR enables Secondary Users SUs to observe, learn and take the right action on its operating environment at any time instant. This feature has inevitably exposed the SUs to artificial intelligence attacks from adversaries. This paper provides a survey on various kinds of attacks, as well as reviews and proposes mitigation approaches to tackle them from a multi-agent perspective. Additionally, this paper shows the impact and criticality of artificial intelligence attacks on network-wide performance. We aim to establish a foundation, and to spark new research interests in this new and critical area.

[1]  N.R. Prasad Secure Cognitive Networks , 2008, 2008 European Conference on Wireless Technology.

[2]  Caidan Zhao,et al.  Anti-PUE Attack Base on the Transmitter Fingerprint Identification in Cognitive Radio , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[3]  Sanjeev Sharma,et al.  Distributed Shared Spectrum Techniques for Cognitive Wireless Radio Networks , 2010, 2010 International Conference on Computational Intelligence and Communication Networks.

[4]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[5]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[6]  Li Zhang,et al.  Adaptive QoS-aware channel access scheme for Cognitive Radio networks , 2010, Int. J. Ad Hoc Ubiquitous Comput..

[7]  Nikos A. Vlassis,et al.  Collaborative Multiagent Reinforcement Learning by Payoff Propagation , 2006, J. Mach. Learn. Res..

[8]  Keith M. Martin,et al.  An Application-Oriented Framework for Wireless Sensor Network Key Establishment , 2008, Electron. Notes Theor. Comput. Sci..

[9]  Gang Zhao,et al.  An Efficient Multi-Agent Q-learning Method Based on Observing the Adversary Agent State Change , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.

[10]  Song Han,et al.  Trust-Based Authentication for Secure Communication in Cognitive Radio Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[11]  Sarit Kraus,et al.  Security in multiagent systems by policy randomization , 2006, AAMAS '06.

[12]  Máire O'Neill,et al.  Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[13]  Wenliang Du,et al.  Cryptographic link signatures for spectrum usage authentication in cognitive radio , 2011, WiSec '11.

[14]  Marcelo Bagnulo,et al.  Security for multipath TCP: a constructive approach , 2011, Int. J. Internet Protoc. Technol..

[15]  Jim Dowling,et al.  Using feedback in collaborative reinforcement learning to adaptively optimize MANET routing , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[16]  Jin Wei,et al.  Two-Tier Optimal-Cooperation Based Secure Distributed Spectrum Sensing for Wireless Cognitive Radio Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[17]  T.X. Brown,et al.  Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[18]  Farrukh Aslam Khan,et al.  A survey of Intrusion Detection Systems for Wireless Sensor Networks , 2012, Int. J. Ad Hoc Ubiquitous Comput..

[19]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[20]  Pawel A. Dmochowski,et al.  Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform , 2010, 2010 Proceedings of the Fifth International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[21]  Xianfu Chen,et al.  Inter-cluster connection in cognitive wireless mesh networks based on intelligent network coding , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[22]  Kaigui Bian,et al.  Security vulnerabilities in IEEE 802.22 , 2008, WICON 2008.

[23]  Zhu Han,et al.  Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[24]  K. J. Ray Liu,et al.  Optimal power allocation strategy against jamming attacks using the Colonel Blotto game , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[25]  Tongtong Li,et al.  On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[26]  Wang Weifang Denial of service attacks in cognitive radio networks , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.

[27]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[28]  Shamik Sengupta,et al.  Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2011, IEEE Journal on Selected Areas in Communications.

[29]  Leslie Pack Kaelbling,et al.  Learning Policies for Partially Observable Environments: Scaling Up , 1997, ICML.

[30]  Ren-Junn Hwang,et al.  Privacy protection on Vehicular Ad hoc NETworks , 2011, Int. J. Ad Hoc Ubiquitous Comput..

[31]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[32]  David Grace,et al.  Two-stage reinforcement-learning-based cognitive radio with exploration control , 2011, IET Commun..

[33]  Yiyang Pei,et al.  Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.

[34]  Jack L. Burbank,et al.  Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[35]  A.R. Hammons,et al.  A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[36]  Ana Galindo-Serrano,et al.  Distributed Q-Learning for Aggregated Interference Control in Cognitive Radio Networks , 2010, IEEE Transactions on Vehicular Technology.

[37]  Peter C. Mason,et al.  Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[38]  Olga León Abarca,et al.  A new cross-layer attack to TCP in cognitive radio networks , 2009 .

[39]  Ruoying Sun,et al.  Q-ac: multiagent reinforcement learning with perception-conversion action , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[40]  Li Zhu,et al.  A New Random Number Generate Algorithm for Cognitive Radio Networks , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[41]  G. Jakimoski,et al.  Denial-of-Service Attacks on Dynamic Spectrum Access Networks , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.

[42]  David Grace,et al.  Cognitive radio with reinforcement learning applied to heterogeneous multicast terrestrial communication systems , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[43]  Xingming Sun,et al.  Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems , 2011, Int. J. Ad Hoc Ubiquitous Comput..

[44]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[45]  Ming-Yang Su Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks , 2011, Int. J. Ad Hoc Ubiquitous Comput..

[46]  Carl A. Gunter,et al.  Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[47]  Jeffrey H. Reed,et al.  Power fingerprinting in SDR & CR integrity assessment , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[48]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[49]  Mihaela van der Schaar,et al.  Online learning in autonomic multi-hop wireless networks for transmitting mission-critical applications , 2010, IEEE Journal on Selected Areas in Communications.

[50]  Carlos A. Pomalaza-Raez,et al.  Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[51]  Gianmarco Baldini,et al.  Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.

[52]  Shamik Sengupta,et al.  Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2010, 2010 IEEE International Conference on Communications.

[53]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[54]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[55]  Yang Yang,et al.  Reinforcement learning based spectrum-aware routing in multi-hop cognitive radio networks , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[56]  K. J. Ray Liu,et al.  Optimal Defense against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[57]  David Grace,et al.  Cognitive radio spectrum sharing schemes with reduced spectrum sensing requirements , 2008 .

[58]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[59]  Caidan Zhao,et al.  A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.

[60]  Mohsen Guizani,et al.  Survey of Security Issues in Cognitive Radio Networks , 2011 .

[61]  Richard S. Sutton,et al.  Introduction to Reinforcement Learning , 1998 .

[62]  David Grace,et al.  Cognitive Radio with Reinforcement Learning Applied to Multicast Downlink Transmission and Distributed Occupancy Detection , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[63]  Zhu Han,et al.  Dogfight in Spectrum: Jamming and Anti-Jamming in Multichannel Cognitive Radio Systems , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[64]  Haiming Wang,et al.  Eigenvalues based spectrum sensing against untrusted users in cognitive radio networks , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[65]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[66]  Sandip Sen,et al.  Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks , 2011, Comput. J..

[67]  Mihaela van der Schaar,et al.  Learning to Compete for Resources in Wireless Stochastic Games , 2009, IEEE Transactions on Vehicular Technology.

[68]  Kok-Lim Alvin Yau,et al.  Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning , 2010, IEEE Local Computer Network Conference.

[69]  Kok-Lim Alvin Yau,et al.  Achieving Efficient and Optimal Joint Action in Distributed Cognitive Radio Networks Using Payoff Propagation , 2010, 2010 IEEE International Conference on Communications.

[70]  Sarit Kraus,et al.  Coordinating Randomized Policies for Increasing Security in Multiagent Systems , 2009, Safety and Security in Multiagent Systems.

[71]  Vojislav B. Misic,et al.  Improving sensing accuracy in cognitive PANs through modulation of sensing probability , 2009 .

[72]  S. Ford,et al.  Using POMDP-based state estimation to enhance agent system survivability , 2005, IEEE 2nd Symposium on Multi-Agent Security and Survivability, 2005..