CR-Honeynet: A learning & decoy based Sustenance Mechanism Against Jamming Attack in CRN
نویسندگان
چکیده
Cognitive Radio Network (CRN) enables secondary users to borrow unused spectrum from the proprietary users in a dynamic and opportunistic manner. However, dynamic and open access nature of available spectrum brings a serious challenge of sustenance amongst CRNs which makes them vulnerable to various spectrum etiquette attacks. Jamming-based denial of service (DoS) attack poses serious threats to legitimate communications and packet delivery. A rational attacker targets certain transmission characteristics to find the highest impacting communication of CRN and causes maximum disruption. In this paper, inspired by the honeypot concept in cybercrime, we propose a honeynet based defense mechanism, which aims to deter the attacker from jamming legitimate communications. The honeynet passively learns the attacker’s strategy from the past history of attacks and actively adapts preemptive decoy mechanisms to prevent attacks on legitimate communications. Simulation results show that the with help of honeynet mechanism, CRN successfully avoids jamming attacks and thereby improves system performance in terms of packet delivery ratio. Keywords—Cognitive Radio, Jamming, Honeynet, Stochastic Learning
منابع مشابه
Performance analysis of CR-honeynet to prevent jamming attack through stochastic modeling
Cognitive Radio Network (CRN) has to stall its packet transmission periodically to sense the spectrum for Primary User’s (PU’s) transmission. The limited and dynamically available spectrum and fixed periodic schedule of transmission interruption makes it harder to model the performance of a CRNs. Again, an open and dynamic spectrum access model brings forth a serious challenge of sustenance amo...
متن کاملAn Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks
While cognitive radio networks (CRNs) present a promising solution to solve the scarcity of the radio spectrum, they are still susceptible to security threats. Until now, only a few researchers considered the use of intrusion detection systems (IDSs) to combat these threats against CRNs. In this article, we describe a CRN based on IEEE wireless regional area network (WRAN) and describe some of ...
متن کاملDetection of Jamming Attack in Cognitive Radio Networks
Cognitive Radio is becoming a hot research topic in wireless communication field now, which can be used to alleviate the spectrum shortage problem and improve the spectrum utilization. While Cognitive Radio Networks (CRNs) present a promising solution to solve the scarcity of the radio spectrum, they are still susceptible to jamming attacks. The CRN is based on IEEE Wireless Regional Area Netwo...
متن کاملMarkov Model Based Jamming and Anti-Jamming Performance Analysis for Cognitive Radio Networks
In this paper, we conduct a cross-layer analysis of both the jamming capability of the cognitiveradio-based jammers and the anti-jamming capability of the cognitive radio networks (CRN). We use a Markov chain to model the CRN operations in spectrum sensing, channel access and channel switching under jamming. With various jamming models, the jamming probabilities and the throughputs of the CRN a...
متن کاملCognitive Radio Based Jamming Resilient Multi-channel MAC Protocol for Wireless Network
Radio jamming attack is the most effective and easiest Denial-of –Service (DOS) attack in wireless network. In this paper, we proposed a multi-channel MAC protocol to mitigate the jamming attacks by using cognitive radio. The Cognitive Radio (CR) technology supports real-time spectrum sensing and fast channel switching. By using CR technologies, the legitimate nodes can perform periodic spectru...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014