Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems-Part II: Unknown Channel Statistics

被引:52
|
作者
Li, Husheng [1 ]
Han, Zhu [2 ]
机构
[1] Univ Tennessee, Dept Elect Engn & Comp Sci, Knoxville, TN 37996 USA
[2] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
基金
美国国家科学基金会;
关键词
Cognitive radio; primary user emulation attack; adversarial bandit algorithm;
D O I
10.1109/TWC.2010.112310.100630
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The defense against the Primary User Emulation Attack (PUE) is studied in the scenario of unknown channel statistics (coined blind dogfight in spectrum). The algorithm of the adversarial bandit problem is adapted to the context of blind dogfight. Both cases of complete and partial information about the rewards of different channels are analyzed. Performance bounds are obtained subject to arbitrary channel statistics and attack policy. Several attack strategies, namely uniformly random, selectively random and maximal interception attacks, are discussed. The validity of the defense strategy is then demonstrated by numerical simulation results.
引用
收藏
页码:274 / 283
页数:10
相关论文
共 50 条
  • [1] Blind Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems with Unknown Channel Statistics
    Li, Husheng
    Han, Zhu
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [2] Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics
    Li, Husheng
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (11) : 3566 - 3577
  • [3] A Game Approach to Combat Primary User Emulation Attacks in Multi-channel Cognitive Radio Systems
    Wang Naichao
    Xu Yitao
    Zhang, Deng
    Lin, Zhang
    [J]. PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1639 - 1642
  • [4] Cooperative Spectrum Sensing in Cognitive Radio Networks under Primary User Emulation Attacks
    Haghighat, Maryam
    Sadough, Seyed Mohammad-Sajad
    [J]. 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 148 - 151
  • [5] Improved cooperative spectrum sensing under primary user emulation attacks in cognitive radio networks
    Orumwense, Efe
    Oyerinde, Olutayo
    Mneney, Stanley
    [J]. JOURNAL OF ENGINEERING RESEARCH, 2017, 5 (03): : 73 - 90
  • [6] Defense against primary user emulation attacks in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Reed, Jeffrey H.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) : 25 - 37
  • [7] Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks
    Chen, Zesheng
    Cooklev, Todor
    Chen, Chao
    Pomalaza-Raez, Carlos
    [J]. 2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009), 2009, : 208 - 215
  • [8] Securing Cognitive Radio Networks against Primary User Emulation Attacks
    Yu, Rong
    Zhang, Yan
    Liu, Yi
    Gjessing, Stein
    Guizani, Mohsen
    [J]. IEEE NETWORK, 2015, 29 (04): : 68 - 74
  • [9] Securing Cognitive Radio Networks against Primary User Emulation Attacks
    Yu, Rong
    Zhang, Yan
    Liu, Yi
    Gjessing, Stein
    Guizani, Mohsen
    [J]. IEEE NETWORK, 2016, 30 (06): : 62 - 69
  • [10] Improved Detection of Primary User Emulation Attacks in Cognitive Radio Networks
    Jin, Fan
    Varadharajan, Vijay
    Tupakula, Udaya
    [J]. 25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 274 - 279