Title :
Spectrum scanning when the intruder might have knowledge about the scanner´s capabilities
Author :
Garnaev, Andrey ; Trappe, Wade ; Stojadinovic, Dragoslav ; Seskar, Ivan
Author_Institution :
WINLAB, Rutgers Univ., North Brunswick, NJ, USA
Abstract :
Detecting malicious users in dynamic spectrum access scenarios is a crucial problem that requires an intrusion detection system (IDS) that scans spectrum for malicious activities. In this paper we design a spectrum scanning protocol that incorporates knowledge about the scanning effectiveness across different bands, which can increase scanning efficiency. The adversary, however, can also exploit such knowledge to its advantage. To understand the interplay underlying this problem, we formulate a Bayesian model, where the IDS faces a scanning allocation dilemma: if the intruder has no knowledge, then all the bands are under equal threat, while if the intruder has complete knowledge, then less-protected bands are more likely to be threatened. We solve this dilemma and show the optimal IDS strategy switches between the optimal response to these threats. Finally, we show that the strategy might be sensitive to prior knowledge, which can be corrected by adapted learning.
Keywords :
Bayes methods; access protocols; radio spectrum management; security of data; Bayesian model; dynamic spectrum access scenarios; equal threat; intrusion detection system; less-protected bands; malicious activity spectrum; malicious user detection; scanner capability; scanning allocation dilemma; scanning effectiveness; spectrum scanning protocol; Bandwidth; Bayes methods; Games; Interference; Intrusion detection; Signal to noise ratio; Switches; Bayesian game; Spectrum scanning; intrusion detection system;
Conference_Titel :
Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on
Conference_Location :
South Brisbane, QLD
DOI :
10.1109/ICASSP.2015.7178269