Mitigating the Effect of Malicious Users in Cognitive Networks

Open medium access is an inherent feature of wireless networks that makes them vulnerable to security threats and unauthorized access by foreign entities and malicious users. In cognitive radio networks, effect of these malicious users on network performance becomes more threatening, where they impersonate primary users by emitting similar signals, causing secondary users to vacate the occupied channel needlessly. As a result, network resources are unfairly monopolized by malicious users denying other secondary users their fair share. In this paper, we introduce a cross-layered approach to provide secondary users the ability to differentiate between a primary user and a malicious user, using Hidden Markov Model at MAC layer. Hence, our proposed framework allows the transport layer protocol to respond appropriately in a way that the effect of the presence of malicious user on the network is mitigated. The effectiveness of our proposed approach is shown by calculating the throughput of the network and number of channel switches with respect to varying number of secondary and malicious nodes and by comparing it to an earlier proposed TCP protocol.

[1]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[2]  Santhanakrishnan Anand,et al.  Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.

[3]  Ian F. Akyildiz,et al.  TP-CRAHN: a Transport Protocol for Cognitive Radio Ad-Hoc Networks , 2009, IEEE INFOCOM 2009.

[4]  Sung-Bae Cho,et al.  An Effective HMM-Based Intrusion Detection System with Privilege Change Event Modeling , 2002, PRICAI.

[5]  Syed Ali Khayam,et al.  A Comparative Evaluation of Anomaly Detectors under Portscan Attacks , 2008, RAID.

[6]  Sung-Bae Cho,et al.  Intrusion Detection by Combining Multiple Hidden Markov Models , 2000, PRICAI.

[7]  A. Lo,et al.  Performance of Transport Control Protocol Over Dynamic Spectrum Access Links , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[8]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[9]  Olga León Abarca,et al.  A new cross-layer attack to TCP in cognitive radio networks , 2009 .

[10]  Vir V. Phoha,et al.  Investigating hidden Markov models capabilities in anomaly detection , 2005, ACM-SE 43.

[11]  Rahul Khanna,et al.  System approach to intrusion detection using hidden Markov model , 2006, IWCMC '06.

[12]  Transport Layer Protocols for Cognitive Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[13]  Quanyan Zhu,et al.  A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems , 2010, 2010 IEEE International Conference on Communications.

[14]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[15]  Peter C. Mason,et al.  Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[16]  T.X. Brown,et al.  Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[17]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[18]  Sung-Bae Cho,et al.  Efficient anomaly detection by modeling privilege flows using hidden Markov model , 2003, Comput. Secur..

[19]  Fred Daneshgaran,et al.  Unsaturated Throughput Analysis of IEEE 802.11 in Presence of Non Ideal Transmission Channel and Capture Effects , 2008, IEEE Transactions on Wireless Communications.

[20]  Srinivasan Seshan,et al.  A comparison of mechanisms for improving TCP performance over wireless links , 1996, SIGCOMM 1996.

[21]  Ruoyu Wu,et al.  Risk-Aware Response for Mitigating MANET Routing Attacks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[22]  Jeonghoon Mo,et al.  Performance Modeling of Communication Networks with Markov Chains , 2010, Performance Modeling of Communication Networks with Markov Chains.