Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense

被引:0
|
作者
Tan, Yi [1 ]
Hong, Kai [1 ]
Sengupta, Shamik
Subbalakshmi, K. P. [1 ]
机构
[1] Stevens Inst Technol, Dept ECE, Hoboken, NJ 07030 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate Sybil attacks on spectrum allocation in distributed dynamic spectrum access (DSA) networks. Using IEEE 802.11 devices as secondary nodes, we demonstrate the feasibility of mounting Sybil attacks in the cognitive radio testbed, in which the malicious node poses as multiple good secondary nodes with different identities in order to steal more spectrum bands. We also show the impact of the attack through an example and simulation results. A defense strategy using the statistics of beacon intervals is also proposed. Through experimental results, we show the effectiveness of the defense mechanism when there is no interference from external sources as well as in the presence of interference.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Defense Against Sybil Attacks in Directed Social Networks
    Liu, Pengfei
    Wang, Xiaohan
    Che, Xiangqian
    Chen, Zhaoqun
    Gu, Yuantao
    [J]. 2014 19TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2014, : 239 - 243
  • [2] SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks
    Wei, Wei
    Xu, Fengyuan
    Tan, Chiu C.
    Li, Qun
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (12) : 2492 - 2502
  • [3] Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks
    Tan, Yi
    Hong, Kai
    Sengupta, Shamik
    Subbalakshmi, K. P.
    [J]. 2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [4] SoK: The Evolution of Sybil Defense via Social Networks
    Alvisi, Lorenzo
    Clement, Allen
    Epasto, Alessandro
    Lattanzi, Silvio
    Panconesi, Alessandro
    [J]. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 382 - 396
  • [5] SybilGuard: Defending against sybil attacks via social networks
    Yu, Haifeng
    Kaminsky, Michael
    Gibbons, Phillip B.
    Flaxman, Abraham D.
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (03) : 576 - 589
  • [6] SybilGuard: Defending against sybil attacks via social networks
    Yu, Haifeng
    Kaminsky, Michael
    Gibbons, Phillip B.
    Flaxman, Abraham
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) : 267 - 278
  • [7] Safeguarding against sybil attacks via social networks and multipath routing
    Hota, Chittaranjan
    Lindqvist, Janne
    Karvonen, Kristiina
    Yla-Jaaski, Antti
    Mohan, C. K. J.
    [J]. INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 122 - +
  • [8] The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities
    Liu, Yue
    Bild, David R.
    Dick, Robert P.
    Mao, Z. Morley
    Wallach, Dan S.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (11) : 2376 - 2391
  • [9] Safeguarding against Sybil attacks via social networks and multipath routing
    Hota, Chittaranjan
    Srikanth, M. S., V
    Ylae-Jaeaeski, Antti
    Lindqvist, Janne
    Kristiina, K.
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 1039 - +
  • [10] Game Theoretic Defense Framework Against Sybil Attacks
    Bhupender Kumar
    Bubu Bhuyan
    [J]. SN Computer Science, 5 (7)