1 / 27

Defense Against Spectrum Sensing Data Falsification Attacks In Cognitive Radio Networks

Defense Against Spectrum Sensing Data Falsification Attacks In Cognitive Radio Networks. Li Xiao Department of Computer Science & Engineering Michigan State University. - Chowdhury Sayeed Hyder , Brendan Grebur and Li Xiao. Outline. Background Cognitive Radio Network The IEEE Standard

juana
Download Presentation

Defense Against Spectrum Sensing Data Falsification Attacks In Cognitive Radio Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Defense Against Spectrum Sensing Data Falsification Attacks In Cognitive Radio Networks Li Xiao Department of Computer Science & Engineering Michigan State University - ChowdhurySayeedHyder, Brendan Grebur and Li Xiao

  2. Outline • Background • Cognitive Radio Network • The IEEE Standard • SSDF Attacks • Problem Statement • Attack Model • Existing solutions • ARC scheme • Simulation Results • Error rate • True/ false detection rate Securecomm 2011

  3. Background Figure: Underutilized Spectrum Figure: Current Spectrum Allocation in US Ref: Akyildiz, I., W. Lee, M. Vuran, and S. Mohanty, “NeXt Generation/ Dynamic Spectrum Access/ Cognitive Radio Wireless Networks: A Survey”, Computer Networks 2006 Securecomm 2011

  4. Background • Current Status • Spectrum Scarcity • Underutilized spectrum • Cognitive radio (CR) • Adapt its transmission and reception parameters (frequency, modulation rate, power etc.) Securecomm 2011

  5. Background • Cognitive Radio Network • Two types of user • Primary user or licensed user (PU) • Secondary user or opportunistic user (SU) • Requirements • SU cannot affect ongoing transmission of PUs • Must vacant the spectrum if PU arrives • Spectrum Sensing Securecomm 2011

  6. Background • IEEE 802.22 standard • Centralized, single hop, point to multipoint • Collaborative spectrum sensing • Quiet Periods (QP) • Sensing period and frequency • Must vacant at the arrival of PU • False alarm and misdetection rate • Inter cell synchronization Securecomm 2011

  7. Background Vulnerable against security threats!! PU SU SU SU BS SU SU PU Figure: 802.22 CRN Architecture Ref: K. Bian and J. Park, “Security vulnerabilities in IEEE 802.22”, Proceedings of the 4th Annual International Conference on Wireless Internet WICON '08 Securecomm 2011

  8. SSDF Attacks - Independent Attack - Collaborative Attack PU SU SU SU BS SU SU PU Figure: 802.22 CRN Architecture How can BS defend against the SSDF attack ? Securecomm 2011

  9. Problem Statement • Network Model • 802.22 • Attack Model • Independent Attack • Attack randomly • Collaborative Attack • Going Against Majority Attack • Subgroup Attack • Our goal is to minimize the error in deciding about the spectrum availability by BS in addition to detecting the attackers and reducing the false detection rate. Securecomm 2011

  10. Problem Statement Detection probability of an honest user (Pd) Detection probability of an independent attacker (Pdm) Detection probability of collaborative attackers (Qdm) Securecomm 2011

  11. Problem Statement • Attackers’ goal • Increase the error rate and disguise their intention. • Collaboration makes it easier. • BS’s goal • Correct decision making. • Identify attackers and minimize the impact of their collaboration. • Solution • Reduce their strength of collaboration. • Differentiate between honest and dishonest nodes. Securecomm 2011

  12. Existing Solutions Ref: [1] A. Rawat, P. Anand, C. Hao and P. Varshney, “Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks”, IEEE Transactions on Signal Processing 2011 [2] H. Li and Z. Han, “Catching Attackers for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach”, DySPAN 2010. • Reputation based [1] • BS fails to take a correct decision for 35% attackers • High misdetection rate • K-nearest neighbor [2] • Works well for independent SSDF attack • Threshold selection is critical Securecomm 2011

  13. Adaptive Reputation-based Clustering (ARC) Scheme • Collection: BS collects node reports • Clustering: k-medoid clustering using PAM • Voting: • Intra-cluster weighted voting • Inter cluster majority voting • Feedback: • Cluster adjustment • Reputation adjustment Securecomm 2011

  14. Adaptive Reputation-based Clustering (ARC) Scheme • Intra-cluster weighted voting • Further from median, less voting power • Majority cluster voting • Decision of majority clusters becomes the final decision Securecomm 2011

  15. Adaptive Reputation-based Clustering (ARC) Scheme • Clusters with poor reputation removed • Number of clusters is adjusted • Reputation of nodes is adjusted based on • cluster's vote • distance from median and • node’s current vote Securecomm 2011

  16. Results • Simulation tool: MATLAB • Simulation Parameters • Number of attackers 10% - 50% • Probability of attack 0.1 – 1.0 • Number of runs – 10 • Prob. of false alarm 0.1 • Prob. of miss detection 0.1 Securecomm 2011

  17. Results Rawat Reputation Method: Node majority vote for N frames. Remove users with M or more differences. Repeat. • Compared to Rawat et al. reputation-based method (R) • Collaborative and Independent SSDF attacks • Number of attackers • Probability of attack • Probability of detection • Performance metrics • Probability of error (QE) • Attacker Detection Rate (QD) • Attacker Misdetection Rate (QF) Securecomm 2011

  18. Results Collaborative SSDF Attack Figure 1: QD , QE , QFvs # of attackers • Significant improvement in reducing error rate • Moderate true detection rate • Huge improvement in reducing false detection rate Securecomm 2011

  19. Results Collaborative SSDF Attack Figure 2: QD , QE , QFvs prob. of attack • Huge improvement in reducing error rate • Significant true detection rate • Huge improvement in reducing false detection rate Securecomm 2011

  20. Results Collaborative SSDF Attack Figure 3: QD , QE , QFvs prob. of detection • Significant improvement in reducing error rate • Moderate true detection rate • Huge improvement in reducing false detection rate Securecomm 2011

  21. Results Collaborative SSDF Attack (Subgroup attack) Figure 4: QD , QE , QFvs # of attackers • Huge improvement in reducing error rate • Similar true detection rate • Huge improvement in reducing false detection rate Securecomm 2011

  22. Results Collaborative SSDF (GAMA) Attack Figure 5: QD , QE , QFvs # of attackers • Significant improvement in reducing error rate • Moderate true detection rate • Significant improvement in reducing false detection rate Securecomm 2011

  23. Results Independent SSDF Attack Figure 6: QD , QE , QFvs # of attackers • Similar error rate • Moderate true detection rate • Huge improvement in reducing false detection rate Securecomm 2011

  24. Results Independent SSDF Attack Figure 7: QD , QE , QFvs prob. of attack • Slight improvement in reducing error rate • Similar true detection rate • Significant improvement in reducing false detection rate Securecomm 2011

  25. Results Independent SSDF Attack Figure 8: QD , QE , QFvs prob. of detection • Slight improvement in reducing error rate • Huge improvement in reducing false detection rate Securecomm 2011

  26. Conclusion & Future Work • Devised robust decision-making algorithm for CRNs • Displays better performance than current schemes • ARC can minimize error rate consistently • Low attacker misdetection rates • Does not require any prior knowledge • Applicable to both Independent and Collaborative attacks • Future Work • Explore a GA method for determining optimal number of clusters (k values) • Explore different attacking strategies Securecomm 2011

  27. Questions ?

More Related