Title :
Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks
Author :
Zhou Yuan ; Zhu Han ; Sun, Yan Lindsay ; Husheng Li ; Ju Bin Song
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Houston, Houston, TX, USA
Abstract :
Cognitive radio (CR) networks have attracted many attentions recently, while the security issues are not fully studied yet. In this paper, we propose a new and powerful network layer attack, routing-toward-primary-user (RPU) attack in CR networks. In this attack, malicious nodes intentionally route a large amount of packets toward the primary users (PUs), aiming to cause interference to the PUs and to increase delay in the data transmission among the secondary users. In the RPU attack, it is difficult to detect the malicious nodes since the malicious nodes may claim that those nodes, to which they forward the packets, behave dishonestly and cause problems in the data transmission. To defend against this attack without introducing high complexity, we develop a defense strategy using belief propagation. First, an initial route is found from the source to the destination. Each node keeps a table recording the feedbacks from the other nodes on the route, exchanges feedback information and computes beliefs. Finally, the source node can detect the malicious nodes based on the final belief values. Simulation results show that the proposed defense strategy against the RPU attack is effective and efficient in terms of significant reduction in the delay and interference caused by the RPU attack.
Keywords :
belief networks; cognitive radio; feedback; radiofrequency interference; telecommunication computing; telecommunication network routing; telecommunication security; CR network; RPU attack; belief propagation-based defense; cognitive radio network; data transmission delay; defense strategy; feedback information; interference; malicious node detection; network layer attack; packet routing; primary user; routing-toward-primary-user attack; secondary user; security issue; source node; Belief propagation; Cognitive radio; Interference; Mobile computing; Routing; Sensors; Cognitive radio; belief propagation; routing toward primary user attack; security;
Journal_Title :
Mobile Computing, IEEE Transactions on
DOI :
10.1109/TMC.2012.137