DocumentCode :
1976712
Title :
Finding out the liars: Fighting against false channel information exchange attacks in cognitive radio ad hoc networks
Author :
Yi Song ; Jiang Xie
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of North Carolina at Charlotte, Charlotte, NC, USA
fYear :
2012
fDate :
3-7 Dec. 2012
Firstpage :
2095
Lastpage :
2100
Abstract :
Cognitive radio (CR) technology has emerged as a promising solution to alleviate the spectrum scarcity problem. With the capability of sensing the frequency bands in a time and location-varying spectrum environment, CR technology allows an unlicensed user to exploit those frequency bands unused by licensed users in an opportunistic manner. Since different unlicensed users may acquire different channel availability information, they often need to exchange their channel information with each other for the realization of many networking protocols. However, if malicious unlicensed users exchange false channel information among other nodes, the networking protocols may fail, which leads to significant performance degradation. We name this type of attack as the false channel information exchange attack. In this paper, a distributed algorithm is proposed to identify the malicious nodes and fight against the false channel information exchange attack in CR ad hoc networks. The spatial correlation of the channel information is used to analyze the authenticity of the received channel information. Simulation results show that our proposed algorithm achieves very high detection rate to find out the malicious nodes, while the false alarm rate is relatively low. To the best of our knowledge, this is the first paper that investigates the false channel information exchange attacks in CR ad hoc networks.
Keywords :
ad hoc networks; authorisation; cognitive radio; protocols; telecommunication security; time-varying channels; authenticity; channel availability information; cognitive radio ad hoc networks; cognitive radio technology; false channel information exchange attacks; location-varying spectrum environment; malicious nodes; malicious unlicensed users; networking protocols; received channel information; spatial correlation; spectrum scarcity problem; time-varying spectrum environment;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Communications Conference (GLOBECOM), 2012 IEEE
Conference_Location :
Anaheim, CA
ISSN :
1930-529X
Print_ISBN :
978-1-4673-0920-2
Electronic_ISBN :
1930-529X
Type :
conf
DOI :
10.1109/GLOCOM.2012.6503425
Filename :
6503425
Link To Document :
بازگشت