DocumentCode
580425
Title
Managing sensing and cooperation to analyze PUE attacks in Cognitive Radio Ad Hoc Networks
Author
Soto, Julio ; Queiroz, Saulo ; Nogueira, Michele
Author_Institution
NR2 - Wireless & Adv. Networks Lab., Fed. Univ. of Parana (UFPR), Brazil
fYear
2012
fDate
22-26 Oct. 2012
Firstpage
219
Lastpage
223
Abstract
In Cognitive Radio Ad Hoc Networks (CRAHNs), malicious Secondary Users can exploit CR (Cognitive Radio) capabilities to perform Primary User Emulation Attacks (PUEA). These attacks pretend the transmission of a Primary User (PU), giving to malicious users the priority of using licensed frequencies over well-behaved unlicensed Secondary Users (SU). Since CRAHNs are envisioned as a solution for the frequency spectrum underutilization, PUEA is a threat, compromising these networks operation and easily resulting in Denial of Services (DoS). While the state of the art has focused on evolving architectural design issues (i.e. centralized non-cooperative to decentralized cooperative schemes) another key design aspect was left behind: the decision criterion, which is typically assumed as unique metric (e.g. the received signal power). To fill this gap, we propose INCA, a novel multIple criteria scheme for the deceNtralized and Cooperative Analysis of the PUEA presence in CRAHNs. INCA follows two phases. On the first, each SU employs multiple criteria to define a hypothesis about the potential existence of attacks; whereas on the second, these hypotheses are exchanged among neighbors, and each SU employs the Bayes theorem to calculate the final probability of a PUEA. Simulation results show the improvement and effectiveness of the multi-criteria approach.
Keywords
ad hoc networks; cognitive radio; cooperative communication; probability; radio networks; CRAHN; DoS; PUE attacks; PUEA; cognitive radio ad hoc networks; cooperative analysis; decentralized analysis; denial of services; final probability; licensed frequency; malicious secondary users; managing sensing; multicriteria approach; primary user emulation attacks; well-behaved unlicensed secondary users; Ad hoc networks; Cognitive radio; Emulation; Probability; Sensors; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Network and service management (cnsm), 2012 8th international conference and 2012 workshop on systems virtualiztion management (svm)
Conference_Location
Las Vegas, NV
Print_ISBN
978-1-4673-3134-0
Electronic_ISBN
978-3-901882-48-7
Type
conf
Filename
6380018
Link To Document