NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEA

In this paper, we propose a distributed spectrum decision protocol resilient to primary user emulation attacks (PUEA) in dynamic spectrum access (DSA) networks. PUEA is a type of denial-of-service attack where malicious users can deprive legitimate secondary users (SUs) of spectrum access by mimicking the primary transmitter. Most studies in the literature discuss how each individual SU can develop mechanisms to detect PUEA. We developed the first centralized protocol to help SUs fuse their individual detection results with the help of a centralized controller, to better mitigate PUEA. Here, we develop a distributed spectrum decision protocol in which SUs make individual spectrum decisions and then exchange individual sensing results with their one-hop neighbors to increase resilience to PUEA. We call this protocol, NEAT: NEighbor AssisTed spectrum decision protocol. We also present a detailed analysis of the protocol in terms of the probability of successful PUEA under Byzantine attacks, where the malicious users can lie about their individual sensing results. We show that with negligible communication overhead, the proposed protocol reduces the probability of successful PUEA by up to three orders of magnitude in the presence of Byzantine attacks. To the best of our knowledge, this is the first distributed protocol proposed to mitigate PUEA.

[1]  William A. Gardner,et al.  Signal interception: performance advantages of cyclic-feature detectors , 1992, IEEE Trans. Commun..

[2]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[3]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[4]  Maziar Nekovee,et al.  Quantifying the Availability of TV White Spaces for Cognitive Radio Operation in the UK , 2009, 2009 IEEE International Conference on Communications Workshops.

[5]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[6]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[7]  Yuan Shi,et al.  Detecting Primary User Emulation Attack in Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[8]  Zhi Ding,et al.  ESCAPE: A Channel Evacuation Protocol for Spectrum-Agile Networks , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[9]  Tongtong Li,et al.  Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Santhanakrishnan Anand,et al.  Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.

[11]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[12]  Prasant Mohapatra,et al.  Hearing is believing: Detecting mobile primary user emulation attack in white space , 2011, 2011 Proceedings IEEE INFOCOM.

[13]  Santhanakrishnan Anand,et al.  Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[14]  E. Visotsky,et al.  On collaborative detection of TV transmissions in support of dynamic spectrum sharing , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[15]  Y. Thomas Hou,et al.  Cognitive radio communications and networks: principles and practice , 2012 .

[16]  Santhanakrishnan Anand,et al.  Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[17]  C. Cordeiro,et al.  IEEE 802.22: the first worldwide wireless standard based on cognitive radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[18]  Kai Hong,et al.  SpiderRadio: An Incumbent Sensing Implementation for Cognitive Radio Networking Using IEEE 802.11 Devices , 2010, 2010 IEEE International Conference on Communications.

[19]  S. Marano,et al.  Distributed Detection in the Presence of Byzantine Attack in Large Wireless Sensor Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[20]  Wenliang Du,et al.  A physical layer authentication scheme for countering primary user emulation attack , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[21]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[22]  Dave Cavalcanti,et al.  Spectrum Sensing for Dynamic Spectrum Access of TV Bands , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[23]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[24]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[25]  Yonghong Zeng,et al.  Eigenvalue-based spectrum sensing algorithms for cognitive radio , 2008, IEEE Transactions on Communications.

[26]  Santhanakrishnan Anand,et al.  Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks , 2012, IEEE Transactions on Communications.