Ecology-Based DoS Attack in Cognitive Radio Networks

被引:1
|
作者
Cheng, Shin-Ming [1 ]
Chen, Pin-Yu [2 ]
机构
[1] Natl Taiwan Univ Sciecne & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
关键词
cognitive radio; denial-of-service (DoS) attack; ecosystems; evolutionary game; selfish behavior; GAME;
D O I
10.1109/SPW.2016.10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cognitive radio technology, which is designed to enhance spectrum utilization, depends on the success of opportunistic access, where secondary users (SUs) exploit spectrum void unoccupied by primary users (PUs) for transmissions. We note that the system behaviors are very similar to the interactions among different species coexisting in an ecosystem. However, SUs of a selfish nature or of misleading information may make concurrent transmissions with PUs for additional incentives, and thus disrupt the entire ecosystem. By exploiting this vulnerability, this paper proposes a novel distributed denial-of-service (DoS) attack where invasive species, i.e., malicious users (MUs), induce originally normal-behaved SUs to execute concurrent transmissions with PUs and thus collapse the cognitive radio network. We adopt stochastic geometry to model the spatial distributions of PUs, SUs, and MUs for the analysis of the mutual interference among them. The access strategy of each SU in the spectrum sharing ecosystem, which evolves with the experienced payoffs and interference, is modeled by an evolutionary game. Based on the evolutionary stable strategy concept, we could efficiently identify the fragile operating region at which normal-behaved SUs are eventually evolved to conduct concurrent transmissions and thus to cause the ruin of the network.
引用
收藏
页码:104 / 110
页数:7
相关论文
共 50 条
  • [21] Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks
    Duan, Lingjie
    Min, Alexander W.
    Huang, Jianwei
    Shin, Kang G.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (09) : 1658 - 1665
  • [22] Error Detection of Malicious User Attack in Cognitive Radio Networks
    Armi, N.
    Gharibi, W.
    Khan, W. Z.
    Zangoti, H.
    Rizvi, S.
    Wael, C.
    2017 INTERNATIONAL CONFERENCE ON RADAR, ANTENNA, MICROWAVE, ELECTRONICS, AND TELECOMMUNICATIONS (ICRAMET), 2017, : 89 - 92
  • [23] An Overview of Primary User Emulation Attack in Cognitive Radio Networks
    Gupta, Ishu
    Sahu, O. P.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 27 - 31
  • [24] Cross-Layer Attack and Defense in Cognitive Radio Networks
    Wang, Wenkai
    Sun, Yan
    Li, Husheng
    Han, Zhu
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [25] An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks
    Tephillah, S.
    Manickam, J. Martin Leo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):
  • [26] Research of ecology-based perspective on regional industrial ecosystem
    Zhang, Rui
    Qian, Xingsan
    An, Junying
    PROCEEDINGS OF THE 2007 CONFERENCE ON SYSTEMS SCIENCE, MANAGEMENT SCIENCE AND SYSTEM DYNAMICS: SUSTAINABLE DEVELOPMENT AND COMPLEX SYSTEMS, VOLS 1-10, 2007, : 3269 - 3274
  • [27] Detection of Network Congestion and Denial of Service (DoS) Attacks in Cognitive Radio Networks
    Ejike, Chuku
    Kouvatsos, Demetres
    2019 7TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2019), 2019, : 377 - 384
  • [28] Attack-Proof Cooperative Spectrum Sensing Based on Consensus Algorithm in Cognitive Radio Networks
    Liu, Quan
    Gao, Jun
    Guo, Yunwei
    Liu, Siyang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (06): : 1042 - 1062
  • [29] Energy Efficiency of Ambient Backscattering-Based Cognitive Radio Networks Under Jamming Attack
    Vaishnavi, K. N.
    Kishore, Rajalekshmi
    Gurugopinath, Sanjeev
    2021 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER TECHNOLOGIES AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2021, : 491 - 496
  • [30] Mitigating SSDF attack using distance-based outlier approach in cognitive radio networks
    Singh, Wangjam Niranjan
    Marchang, Ningrinla
    Taggu, Amar
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 32 (02) : 119 - 132