Anomaly Spectrum Usage Detection in Multihop Cognitive Radio Networks: A Cross-Layer Approach
نویسندگان
چکیده
awareness of their environment and internal state, fulfills the need of dynamic spectrum access for higher spectrum utilization. However, at the same time, the use of cognitive radios further complicates the security problems in wireless networks and introduces additional challenges for a counter measure. Due to the intelligence of the attackers, many of the attacks may be stealthy by nature, such as the anomalous spectrum usage attacks, which usually cannot be detected only using information from one layer of the protocol stack. In this paper, we propose a crosslayer model for anomalous spectrum usage attacks detection with stealthy jammer as a prime example. Quickest detection technique is adopted and embedded in the proposed framework since the attacks usually happen at unknown time and are unpredictable due to the lack of prior knowledge of the attackers. A case study is performed by combining physical layer spectrum sensing with multipath routing at the network layer. The results demonstrate the effectiveness of the proposed approach.
منابع مشابه
Pathway Collection below Resource Constraints in Multihop Cognitive Radio Networks
Cognitive Radio (CR) is an emerging technology to solve the spectrum underutilization problems by opens the licensed spectrum bands for opportunistic usage and initiates spectrum trading to improve the spectrum utilization. The path selection problem in multihop cognitive radio networks (CRNs) are investigated below constraints on flow routing, link scheduling and CR source’s budget. Cognitive ...
متن کاملSpectrum Assignment in Cognitive Radio Networks Using Fuzzy Logic Empowered Ants
The prevalent communications networks suffer from lack of spectrum and spectrum inefficiency. This has motivated researchers to develop cognitive radio (CR) as a smart and dynamic radio access promised solution. A major challenge to this new technology is how to make fair assignment of available spectrum to unlicensed users, particularly for smart grids communication. This paper introduces an i...
متن کاملAnomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis
Cognitive radio networks (CRNs) is a promising technology that allows secondary users (SUs) extensively explore spectrum resource usage efficiency, while not introducing interference to licensed users. Due to the unregulated wireless network environment, CRNs are susceptible to various malicious entities. Thus, it is critical to detect anomalies in the first place. However, from the perspective...
متن کاملSecure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks
Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...
متن کاملSpectrum Trading: An Abstracted Bibliography
This document contains a bibliographic list of major papers on spectrum trading and their abstracts. The aim of the list is to offer researchers entering this field a fast panorama of the current literature. The list is continually updated on the webpage http://www.disp.uniroma2.it/users/ naldi/Ricspt.html. Omissions and papers suggested for inclusion may be pointed out to the authors through e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JCM
دوره 8 شماره
صفحات -
تاریخ انتشار 2013