D EFENSE A GAINST S PECTRUM S ENSING D ATA F ALSIFICATION A TTACKS I N C OGNITIVE R ADIO N ETWORKS Li Xiao Department of Computer Science & Engineering.

Slides:



Advertisements
Similar presentations
Multistage Spectrum Sensing for Cognitive Radios UCLA CORES.
Advertisements

Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
1 Cognitive Radio Networks Zhu Jieming Group Presentaion Aug. 29, 2011.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Location Privacy Preservation in Collaborative Spectrum Sensing Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Shanghai Jiao Tong University Kai Xing.
Cognitive Engine Development for IEEE Lizdabel Morales April 16 th, 2007
Cloud Applications in Cognitive Radio Shameek Bhattacharjee COP 5611 Project Presentation.
Fault-Tolerant Target Detection in Sensor Networks Min Ding +, Dechang Chen *, Andrew Thaeler +, and Xiuzhen Cheng + + Department of Computer Science,
DBLA: D ISTRIBUTED B LOCK L EARNING A LGORITHM F OR C HANNEL S ELECTION I N C OGNITIVE R ADIO N ETWORKS Chowdhury Sayeed Hyder Department of Computer Science.
A Revenue Enhancing Stackelberg Game for Owners in Opportunistic Spectrum Access Ali O. Ercan 1,2, Jiwoong Lee 2, Sofie Pollin 2 and Jan M. Rabaey 1,2.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Downlink Channel Assignment and Power Control in Cognitive Radio Networks Using Game Theory Ghazale Hosseinabadi Tutor: Hossein Manshaei January, 29 th,
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Performance Analysis of Energy Detector in Relay Based Cognitive Radio Networks Saman Atapattu Chintha Tellambura Hai Jiang.
The National Centres of Competence in Research are managed by the Swiss National Science Foundation on behalf of the Federal Authorities NCCR MICS review.
Opportunistic Routing Based Scheme with Multi-layer Relay Sets in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences.
A FREQUENCY HOPPING SPREAD SPECTRUM TRANSMISSION SCHEME FOR UNCOORDINATED COGNITIVE RADIOS Xiaohua (Edward) Li and Juite Hwu Department of Electrical and.
Multiantenna-Assisted Spectrum Sensing for Cognitive Radio
Cooperative spectrum sensing in cognitive radio Aminmohammad Roozgard.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
MAXIMIZING SPECTRUM UTILIZATION OF COGNITIVE RADIO NETWORKS USING CHANNEL ALLOCATION AND POWER CONTROL Anh Tuan Hoang and Ying-Chang Liang Vehicular Technology.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Spectrum Sensing in Emergency Cognitive Radio Ad Hoc Networks (CRAHNs) : A Multi-Layer Approach Sasirekha GVK,,Supervisor: Prof. Jyotsna Bapat, IIIT Bangalore.
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
Utility Based Scheduling in Cognitive Radio Networks Term Project CmpE-300 Analysis of Algorithms Spring 2009 Computer Engineering, Boğaziçi University,
Asynchronous Channel Hopping for Establishing Rendezvous in Cognitive Radio Networks Kaigui Bian and Jung-Min “Jerry” Park Department of Electrical and.
Cognitive Radio Networks
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Highway Risk Mitigation through Systems Engineering.
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
Copyright © 2010 National Institute of Information and Communications Technology. All Rights Reserved 1 R&D and Standardization Activities on Distributed.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
Tarun Bansal, Bo Chen and Prasun Sinha
Co-Grid: an Efficient Coverage Maintenance Protocol for Distributed Sensor Networks Guoliang Xing; Chenyang Lu; Robert Pless; Joseph A. O ’ Sullivan Department.
Advanced Spectrum Management in Multicell OFDMA Networks enabling Cognitive Radio Usage F. Bernardo, J. Pérez-Romero, O. Sallent, R. Agustí Radio Communications.
Detection, Classification and Tracking in a Distributed Wireless Sensor Network Presenter: Hui Cao.
Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective Shouling Ji and Raheem Beyah Georgia.
CHANNEL AWARE MEDIUM ACCESS CONTROL IN COGNITIVE RADIO NETWORKS
A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec ICU 2005:
Cooperative MIMO Paradigms for Cognitive Radio Networks
Spectrum Sensing In Cognitive Radio Networks
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
STATE OF THE ART IN OPPORTUNISTIC SPECTRUM ACCESS MEDIUM ACCESS CONTROL DESIGN Pawelczak, P.; Pollin, S.; So, H.-S.W.; Motamedi, A.; Bahai, A.; Prasad,
CHANNEL ALLOCATION FOR SMOOTH VIDEO DELIVERY OVER COGNITIVE RADIO NETWORKS Globecom 2010, FL, USA 1 Sanying Li, Tom H. Luan, Xuemin (Sherman) Shen Department.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Highway Risk Mitigation through Systems Engineering.
Cooperative Resource Management in Cognitive WiMAX with Femto Cells Jin Jin, Baochun Li Department of Electrical and Computer Engineering University of.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Overcoming the Sensing-Throughput Tradeoff in Cognitive Radio Networks ICC 2010.
Ashish Rauniyar, Soo Young Shin IT Convergence Engineering
Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends Prepared by: Ameer Sameer Hamood University of Babylon - Iraq Information.
On Detecting Termination in Cognitive Radio Networks Shantanu Sharma 1 and Awadhesh Kumar Singh 2 1 Ben-Gurion University of the Negev, Israel 2 National.
A discussion on channel sensing techniques By James Xu.
Mohsen Riahi Manesh and Dr. Naima Kaabouch
Younes Abdi, PhD Faculty of Information Technology
Presented by Edith Ngai MPhil Term 3 Presentation
Cognitive Radio Networks
Phd Proposal Investigation of Primary User Emulation Attack in Cognitive Radio Networks Chao Chen Department of Electrical & Computer Engineering Stevens.
Near-Optimal Spectrum Allocation for Cognitive Radios: A Frequency-Time Auction Perspective Xinyu Wang Department of Electronic Engineering Shanghai.
Swathi Chandrashekar - Loukas Lazos
SPECTRUM SHARING IN COGNITIVE RADIO NETWORK
Information Technology - Information Networks
PERFORMANCE ANALYSIS OF SPECTRUM SENSING USING COGNITIVE RADIO
Cognitive Radio Networks
Spectrum Sharing in Cognitive Radio Networks
Suman Bhunia, Shamik Sengupta, Felisa Vazquez-Abad
Video Streaming over Cognitive radio networks
Presentation transcript:

D EFENSE A GAINST S PECTRUM S ENSING D ATA F ALSIFICATION A TTACKS I N C OGNITIVE R ADIO N ETWORKS Li Xiao Department of Computer Science & Engineering Michigan State University - Chowdhury Sayeed Hyder, Brendan Grebur and Li Xiao

Outline Background ◦ Cognitive Radio Network ◦ The IEEE Standard SSDF Attacks Problem Statement ◦ Attack Model Existing solutions ARC scheme Simulation Results ◦ Error rate ◦ True/ false detection rate Securecomm

Background Figure: Current Spectrum Allocation in US Figure: Underutilized Spectrum Ref: Akyildiz, I., W. Lee, M. Vuran, and S. Mohanty, “NeXt Generation/ Dynamic Spectrum Access/ Cognitive Radio Wireless Networks: A Survey”, Computer Networks 2006 Securecomm

Background Current Status ◦ Spectrum Scarcity ◦ Underutilized spectrum Cognitive radio (CR) ◦ Adapt its transmission and reception parameters (frequency, modulation rate, power etc.) Securecomm

Background Cognitive Radio Network ◦ Two types of user  Primary user or licensed user (PU)  Secondary user or opportunistic user (SU) ◦ Requirements  SU cannot affect ongoing transmission of PUs  Must vacant the spectrum if PU arrives ◦ Spectrum Sensing Securecomm

Background IEEE standard ◦ Centralized, single hop, point to multipoint ◦ Collaborative spectrum sensing  Quiet Periods (QP)  Sensing period and frequency  Must vacant at the arrival of PU  False alarm and misdetection rate ◦ Inter cell synchronization Securecomm

Background SU BS PU Figure: CRN Architecture Vulnerable against security threats!! Securecomm 2011 Ref: K. Bian and J. Park, “Security vulnerabilities in IEEE ”, Proceedings of the 4th Annual International Conference on Wireless Internet WICON '08 7

SSDF Attacks SU BS PU Figure: CRN Architecture How can BS defend against the SSDF attack ? Securecomm Independent Attack - Collaborative Attack 8

Problem Statement Network Model ◦ Attack Model ◦ Independent Attack  Attack randomly ◦ Collaborative Attack  Going Against Majority Attack  Subgroup Attack Our goal is to minimize the error in deciding about the spectrum availability by BS in addition to detecting the attackers and reducing the false detection rate. Securecomm

Problem Statement Detection probability of an honest user (P d ) Detection probability of an independent attacker (P d m ) Detection probability of collaborative attackers (Q d m ) Securecomm

Problem Statement Attackers’ goal ◦ Increase the error rate and disguise their intention. ◦ Collaboration makes it easier. BS’s goal ◦ Correct decision making. ◦ Identify attackers and minimize the impact of their collaboration. Solution ◦ Reduce their strength of collaboration. ◦ Differentiate between honest and dishonest nodes. 11 Securecomm 2011

Existing Solutions Reputation based [1] ◦ BS fails to take a correct decision for 35% attackers ◦ High misdetection rate K-nearest neighbor [2] ◦ Works well for independent SSDF attack ◦ Threshold selection is critical Securecomm Ref: [1] A. Rawat, P. Anand, C. Hao and P. Varshney, “Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks”, IEEE Transactions on Signal Processing 2011 [2] H. Li and Z. Han, “Catching Attackers for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach”, DySPAN 2010.

Adaptive Reputation-based Clustering (ARC) Scheme 13 Securecomm 2011 Collection: BS collects node reports Clustering: k-medoid clustering using PAM Voting: Intra-cluster weighted voting Inter cluster majority voting Feedback: Cluster adjustment Reputation adjustment

Adaptive Reputation-based Clustering (ARC) Scheme Intra-cluster weighted voting ◦ Further from median, less voting power Majority cluster voting ◦ Decision of majority clusters becomes the final decision Securecomm

Adaptive Reputation-based Clustering (ARC) Scheme Clusters with poor reputation removed Number of clusters is adjusted Reputation of nodes is adjusted based on ◦ cluster's vote ◦ distance from median and ◦ node’s current vote Securecomm

Results Simulation tool: MATLAB Simulation Parameters ◦ Number of attackers 10% - 50% ◦ Probability of attack 0.1 – 1.0 ◦ Number of runs – 10 ◦ Prob. of false alarm 0.1 ◦ Prob. of miss detection 0.1 Securecomm

Results Compared to Rawat et al. reputation-based method (R) Collaborative and Independent SSDF attacks ◦ Number of attackers ◦ Probability of attack ◦ Probability of detection Performance metrics ◦ Probability of error (Q E ) ◦ Attacker Detection Rate (Q D ) ◦ Attacker Misdetection Rate (Q F ) Rawat Reputation Method: 1)Node majority vote for N frames. 2)Remove users with M or more differences. 3)Repeat. Securecomm

Results Securecomm Figure 1: Q D, Q E, Q F vs # of attackers Collaborative SSDF Attack Significant improvement in reducing error rate Moderate true detection rate Huge improvement in reducing false detection rate

Results Securecomm Figure 2: Q D, Q E, Q F vs prob. of attack Collaborative SSDF Attack Huge improvement in reducing error rate Significant true detection rate Huge improvement in reducing false detection rate

Results Securecomm Figure 3: Q D, Q E, Q F vs prob. of detection Collaborative SSDF Attack Significant improvement in reducing error rate Moderate true detection rate Huge improvement in reducing false detection rate

Results 21 Securecomm 2011 Figure 4: Q D, Q E, Q F vs # of attackers Collaborative SSDF Attack (Subgroup attack) Huge improvement in reducing error rate Similar true detection rate Huge improvement in reducing false detection rate

Results 22 Securecomm 2011 Figure 5: Q D, Q E, Q F vs # of attackers Collaborative SSDF (GAMA) Attack Significant improvement in reducing error rate Moderate true detection rate Significant improvement in reducing false detection rate

Results Securecomm Figure 6: Q D, Q E, Q F vs # of attackers Independent SSDF Attack Similar error rate Moderate true detection rate Huge improvement in reducing false detection rate

Results Securecomm Figure 7: Q D, Q E, Q F vs prob. of attack Independent SSDF Attack Slight improvement in reducing error rate Similar true detection rate Significant improvement in reducing false detection rate

Results Securecomm Figure 8: Q D, Q E, Q F vs prob. of detection Independent SSDF Attack Slight improvement in reducing error rate Huge improvement in reducing false detection rate

Conclusion & Future Work Devised robust decision-making algorithm for CRNs Displays better performance than current schemes ARC can minimize error rate consistently ◦ Low attacker misdetection rates ◦ Does not require any prior knowledge ◦ Applicable to both Independent and Collaborative attacks Future Work ◦ Explore a GA method for determining optimal number of clusters (k values) ◦ Explore different attacking strategies Securecomm

Questions ?