Ecology-Based DoS Attack in Cognitive Radio Networks

被引:1
|
作者
Cheng, Shin-Ming [1 ]
Chen, Pin-Yu [2 ]
机构
[1] Natl Taiwan Univ Sciecne & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
关键词
cognitive radio; denial-of-service (DoS) attack; ecosystems; evolutionary game; selfish behavior; GAME;
D O I
10.1109/SPW.2016.10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cognitive radio technology, which is designed to enhance spectrum utilization, depends on the success of opportunistic access, where secondary users (SUs) exploit spectrum void unoccupied by primary users (PUs) for transmissions. We note that the system behaviors are very similar to the interactions among different species coexisting in an ecosystem. However, SUs of a selfish nature or of misleading information may make concurrent transmissions with PUs for additional incentives, and thus disrupt the entire ecosystem. By exploiting this vulnerability, this paper proposes a novel distributed denial-of-service (DoS) attack where invasive species, i.e., malicious users (MUs), induce originally normal-behaved SUs to execute concurrent transmissions with PUs and thus collapse the cognitive radio network. We adopt stochastic geometry to model the spatial distributions of PUs, SUs, and MUs for the analysis of the mutual interference among them. The access strategy of each SU in the spectrum sharing ecosystem, which evolves with the experienced payoffs and interference, is modeled by an evolutionary game. Based on the evolutionary stable strategy concept, we could efficiently identify the fragile operating region at which normal-behaved SUs are eventually evolved to conduct concurrent transmissions and thus to cause the ruin of the network.
引用
收藏
页码:104 / 110
页数:7
相关论文
共 50 条
  • [31] Reputation-based Beta Reputation System against SSDF Attack in Cognitive Radio Networks
    Bai, Ping
    Zhang, Xun
    Ye, Fang
    2017 PROGRESS IN ELECTROMAGNETICS RESEARCH SYMPOSIUM - FALL (PIERS - FALL), 2017, : 792 - 799
  • [32] Microbial ecology-based engineering of Microbial Electrochemical Technologies
    Koch, Christin
    Korth, Benjamin
    Harnisch, Falk
    MICROBIAL BIOTECHNOLOGY, 2018, 11 (01): : 22 - 38
  • [33] Ecology-based integrated management of the sweetpotato weevil in India
    Palaniswami, M. S.
    Chattopadhyay, S.
    PROCEEDINGS OF THE IIND INTERNATIONAL SYMPOSIUM ON SWEETPOTATO AND CASSAVA: INNOVATIVE TECHNOLOGIES FOR COMMERCIALIZATION, 2006, (703): : 183 - +
  • [34] An ecology-based analysis of irreversible biofouling in membrane bioreactors
    Zhang, K.
    Choi, H.
    Wu, M.
    Sorial, G. A.
    Dionysiou, D.
    Oerther, D. B.
    WATER SCIENCE AND TECHNOLOGY, 2007, 55 (8-9) : 395 - 402
  • [35] DoS attack detection scheme for sensor networks based on traffic prediction
    National Laboratory of Novel Software Technology, Nanjing University, Nanjing 210093, China
    不详
    不详
    Jisuanji Xuebao, 2007, 10 (1798-1805):
  • [36] Probabilistic spectrum sensing data falsification attack in cognitive radio networks
    Ahmadfard, Arash
    Jamshidi, Ali
    Keshavarz-Haddad, Alireza
    SIGNAL PROCESSING, 2017, 137 : 1 - 9
  • [37] A Byzantine Attack Defender for Censoring-enabled Cognitive Radio Networks
    Du, Jun
    Wen, Xiang
    Shang, Ligang
    Zou, Shan
    Zhang, Bangning
    Guo, Daoxing
    Song, Yihe
    2015 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2015,
  • [38] An MDP Approach for Defending Against Fraud Attack in Cognitive Radio Networks
    Shahhoseini, Hadi Shahriar
    Jafari, Amir Hosein
    Afhamisisi, Khadijeh
    IETE JOURNAL OF RESEARCH, 2015, 61 (05) : 492 - 499
  • [39] Multiple PUE Attack Detection in Cooperative Mobile Cognitive Radio Networks
    Munoz, Ernesto Cadena
    Pedraza, Gustavo Chica
    Moreno, Alexander Aponte
    FUTURE INTERNET, 2024, 16 (12)
  • [40] A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check
    He, Xiaofan
    Dai, Huaiyu
    Ning, Peng
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (05) : 2512 - 2523