Optimal Sensing Disruption for a Cognitive Radio Adversary

Spectrum sensing vulnerabilities in cognitive radio (CR) networks are being actively investigated, where most research focuses on mechanisms that deal with possible attacks without examining optimal sensing disruption strategies. This paper addresses the optimal design and analysis of a power-limited intelligent adversary to a CR network. The adversary targets unused bands and puts energy into them so that the number of unused bands appears reduced to secondary users. This is called sensing disruption. The optimal disruption strategy is obtained by maximizing the average number of false detections under the adversary's power constraint. It is shown that, for a CR network where energy detection is utilized by secondary users, the optimal sensing disruption strategy for noise spoofing for a CR adversary is equal-power partial-band spoofing. Numerical results and analyses of the optimal sensing disruption are provided.

[1]  N.R. Prasad Secure Cognitive Networks , 2008, 2008 European Conference on Wireless Technology.

[2]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[3]  Anant Sahai,et al.  Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.

[4]  Jack L. Burbank,et al.  Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[5]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[6]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[7]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[8]  William A. Gardner,et al.  Signal interception: a unifying theoretical framework for feature detection , 1988, IEEE Trans. Commun..

[9]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[10]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[11]  Laurence B. Milstein,et al.  Worst-Case Sensing Deception in Cognitive Radio Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[12]  Amir Ghasemi,et al.  Spectrum sensing in cognitive radio networks: requirements, challenges and design trade-offs , 2008, IEEE Communications Magazine.

[13]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[14]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[15]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[16]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[17]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[18]  H. Hancock Theory of Maxima and Minima , 1919 .

[19]  Geoffrey Ye Li,et al.  Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[20]  Shuguang Cui,et al.  Optimal Linear Cooperation for Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE Journal of Selected Topics in Signal Processing.

[21]  Singiresu S. Rao,et al.  Optimization Theory and Applications , 1980, IEEE Transactions on Systems, Man, and Cybernetics.

[22]  R.W. Brodersen,et al.  Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[23]  J. I. Mararm,et al.  Energy Detection of Unknown Deterministic Signals , 2022 .

[24]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..

[25]  S. Arkoulis,et al.  Cognitive Spectrum and Its Security Issues , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.

[26]  Anant Sahai,et al.  SNR Walls for Signal Detection , 2008, IEEE Journal of Selected Topics in Signal Processing.