Ecology-Based DoS Attack in Cognitive Radio Networks

被引:1
|
作者
Cheng, Shin-Ming [1 ]
Chen, Pin-Yu [2 ]
机构
[1] Natl Taiwan Univ Sciecne & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
关键词
cognitive radio; denial-of-service (DoS) attack; ecosystems; evolutionary game; selfish behavior; GAME;
D O I
10.1109/SPW.2016.10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cognitive radio technology, which is designed to enhance spectrum utilization, depends on the success of opportunistic access, where secondary users (SUs) exploit spectrum void unoccupied by primary users (PUs) for transmissions. We note that the system behaviors are very similar to the interactions among different species coexisting in an ecosystem. However, SUs of a selfish nature or of misleading information may make concurrent transmissions with PUs for additional incentives, and thus disrupt the entire ecosystem. By exploiting this vulnerability, this paper proposes a novel distributed denial-of-service (DoS) attack where invasive species, i.e., malicious users (MUs), induce originally normal-behaved SUs to execute concurrent transmissions with PUs and thus collapse the cognitive radio network. We adopt stochastic geometry to model the spatial distributions of PUs, SUs, and MUs for the analysis of the mutual interference among them. The access strategy of each SU in the spectrum sharing ecosystem, which evolves with the experienced payoffs and interference, is modeled by an evolutionary game. Based on the evolutionary stable strategy concept, we could efficiently identify the fragile operating region at which normal-behaved SUs are eventually evolved to conduct concurrent transmissions and thus to cause the ruin of the network.
引用
收藏
页码:104 / 110
页数:7
相关论文
共 50 条
  • [41] Detecting Byzantine attack in cognitive radio networks using machine learning
    Sarmah, Rupam
    Taggu, Amar
    Marchang, Ningrinla
    WIRELESS NETWORKS, 2020, 26 (08) : 5939 - 5950
  • [42] Cooperative Primary User Emulation Attack and Defense in Cognitive Radio Networks
    Yang, Tianhong
    Chen, Huifang
    Xie, Lei
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [43] Performance Analysis of Primary User Emulation Attack in Cognitive Radio Networks
    Zhang, Chaorui
    Yu, Rong
    Zhang, Yan
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 371 - 376
  • [44] Improving Performance of CSS Cognitive Radio Networks under Jamming Attack
    Kadu, Rajesh D.
    Karde, Pravin P.
    2017 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, COMPUTING AND IT APPLICATIONS (CSCITA), 2017, : 213 - 217
  • [45] Identification of Selfish Attack in Cognitive Radio Ad-Hoc Networks
    Wagh, Sharad
    More, Avinash
    Khavnekar, Aditya
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 666 - 669
  • [46] Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks
    Biswas, Rajorshi
    Wu, Jie
    Du, Xiaojiang
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [47] Mitigation of the spectrum sensing data falsifying attack in cognitive radio networks
    Biswas R.
    Wu J.
    Du X.
    Yang Y.
    Cyber-Physical Systems, 2021, 7 (03) : 159 - 178
  • [48] Mitigation strategy against SSDF attack for healthcare in cognitive radio networks
    Duggineni, Chaitanya
    Chari, K. Manjunatha
    INTERNATIONAL JOURNAL OF BIOMEDICAL ENGINEERING AND TECHNOLOGY, 2018, 27 (1-2) : 33 - 49
  • [49] Detecting Byzantine attack in cognitive radio networks using machine learning
    Rupam Sarmah
    Amar Taggu
    Ningrinla Marchang
    Wireless Networks, 2020, 26 : 5939 - 5950
  • [50] A new cross-layer attack to TCP in cognitive radio networks
    Leon, Olga
    Hernandez-Serrano, Juan
    Soriano, Miguel
    IWCLD: 2009 SECOND INTERNATIONAL WORKSHOP ON CROSS LAYER DESIGN, 2009, : 97 - 101