Uncoordinated frequency hopping scheme for defense against primary user emulation attack in cognitive radio networks

Abstract Primary User Emulation (PUE) attack is one of the serious attacks in the cognitive radio networks, which could cause the denial of service (DOS) in the secondary networks. In this article, assuming one attacker in the network and in the lack of a central management unit, a distributed scheme based on the uncoordinated frequency hopping technique is proposed to defense against the PUE attack. This scheme consists of two phases. In the synchronization phase, the secondary user (SU) tries to synchronize with its receiver by sending a random pattern in the licensed channels while the attacker tries to prevent the SU from using these channels. In the data-sending phase, the SU sends its data according to the random pattern in the presence of the PUE attacker. In this scheme, the SU can re-sense the selected channel for reducing the effects of the attacker on the overhead of the synchronization phase. The synchronization phase is modeled by a non-zero-sum game between the SU (defender) and attacker. The relevant strategies are then extracted for each player and the Nash equilibrium point of this game is obtained with the game theory analysis. Numerical simulations demonstrated the correctness of the extracted Nash equilibrium point and improvement of the SU throughput in the presence of a PUE attacker.

[1]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[2]  Srdjan Capkun,et al.  Efficient uncoordinated FHSS anti-jamming communication , 2009, MobiHoc '09.

[3]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[4]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[5]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[6]  Paul W. Goldberg,et al.  The Complexity of the Homotopy Method, Equilibrium Selection, and Lemke-Howson Solutions , 2010, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[7]  R. Gibbons Game theory for applied economists , 1992 .

[8]  Ali Jamshidi,et al.  Defence against primary user emulation attack using statistical properties of the cognitive radio received power , 2017, IET Commun..

[9]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[10]  Han Yu,et al.  Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.

[11]  Karim Faez,et al.  A non-cooperative game approach for power-aware MAC in ad hoc wireless networks , 2010, Comput. Commun..

[12]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[13]  C. E. Lemke,et al.  Equilibrium Points of Bimatrix Games , 1964 .

[14]  Radha Poovendran,et al.  A coding-theoretic approach for efficient message verification over insecure channels , 2009, WiSec '09.

[15]  Srdjan Capkun,et al.  Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[16]  Peng Ning,et al.  USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[17]  Philippe Ciblat,et al.  Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks , 2015, IEEE Transactions on Wireless Communications.

[18]  Amir Ghasemi,et al.  Spectrum sensing in cognitive radio networks: requirements, challenges and design trade-offs , 2008, IEEE Communications Magazine.

[19]  Chunsheng Xin,et al.  Detection of PUE Attacks in Cognitive Radio Networks Based on Signal Activity Pattern , 2014, IEEE Transactions on Mobile Computing.

[20]  Walaa Hamouda,et al.  Advances on Spectrum Sensing for Cognitive Radio Networks: Theory and Applications , 2017, IEEE Communications Surveys & Tutorials.

[21]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.