Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach

Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Cognitive radio (CR) enabled dynamic spectrum access (DSA) networks are designed to detect and opportunistically utilise the unused or under-utilised spectrum bands. However, due to the open paradigm of CR networks and lack of proactive security protocols, the DSA networks are vulnerable to various denial-of-service threats. The authors propose a game-theoretic framework to study the primary user emulation attack (PUEA) on CR nodes. A non-cooperative dynamic multistage game between the secondary nodes and the adversaries generating the PUEA is formulated. The pure-strategy and mixed-strategy Nash equilibria for the secondary user and malicious attacker are investigated. Moreover, a novel belief updating system is proposed for the secondary user to learn the state of the primary user as the game evolves. Simulation results demonstrate that the proposed belief updating system achieves better performance than other models for the secondary user in terms of greater payoff, lower probability of missing primary user and better robustness to the inaccurate estimation of the primary user's state.

References

    1. 1)
    2. 2)
    3. 3)
      • Q.H. Mahamound . (2007) Cognitive networks: towards self-aware networks.
    4. 4)
      • F.C.C.: ‘Spectrum policy task force’. Rep. ET Docket no. 02-135, November 2002.
    5. 5)
    6. 6)
      • Felegyhazi, M., Hubaux, J.-P.: `Game theory in wireless networks: a tutorial', Technical Report, 2006.
    7. 7)
      • Jakimoski, G., Subbalakshmi, K.P.: `Denial-of-service attacks on dynamic spectrum access networks', IEEE Int. Conf. on Communications Workshops, 2008. ICC Workshops’08, 2008, p. 524–528.
    8. 8)
    9. 9)
      • Chen, Z., Cooklev, T., Chen, C., Pomalaza-Raez, C.: `Modeling primary user emulation attacks and defenses in cognitive radio networks', IEEE 28th Int. Performance Computing and Communications Conf. (IPCCC), 2009, December 2009, p. 208–215.
    10. 10)
      • Tan, Y., Sengupta, S., Subbalakshmi, K.P.: `Coordinated denial-of-service attacks in IEEE 802.22 networks', IEEE Int. Conf. on Communications, ICC 2010, May 2010.
    11. 11)
      • R.B. Myerson . (1997) Game theory: analysis of conflict.
    12. 12)
      • Thomas, R., Komali, R., Borghetti, B., Mahonen, P.: `A Bayesian game analysis of emulation attacks in dynamic spectrum access networks', IEEE Symp. on New Frontiers in Dynamic Spectrum, 2010, April 2010, p. 1–11.
    13. 13)
      • Chen, R., Park, J.-M.: `Ensuring trustworthy spectrum sensing in cognitive radio networks', First IEEE Workshop on Networking Technologies for Software Defined Radio Networks, 2006, SDR’06, September 2006, p. 110–119.
    14. 14)
      • Liu, Y., Comaniciu, C., Man, H.: `A Bayesian game approach for intrusion detection in wireless ad hoc networks', GameNets’06: Proc. 2006 Workshop on Game Theory for Communications and Networks, 2006, p. 4.
    15. 15)
    16. 16)
      • J. Burl . (2007) Detection and estimation theory.
    17. 17)
      • Li, F., Wu, J.: `Hit and run: a Bayesian game between malicious and regular nodes in MANETS', Fifth Annual IEEE Communications Society Conf. on SECON’08, June 2008, p. 432–440.
    18. 18)
    19. 19)
      • Clancy, T., Goergen, N.: `Security in cognitive radio networks: threats and mitigation', Third Int. Conf. on Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008, May 2008, p. 1–8.
    20. 20)
      • Anand, S., Jin, Z., Subbalakshmi, K.P.: `An analytical model for primary user emulation attacks in cognitive radio networks', Proc. IEEE DySPAN 2008, October 2008.
    21. 21)
      • , : `In the matter of unlicensed operation in the TV broadcast bands', Second Report and Order and Memorandum Opinion and Order, no. FCC-08-260A1, 2008.
    22. 22)
      • Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: `A moderate to robust game theoretical model for intrusion detection in MANETS', Networking and Communications, 2008, WIMOB’08, October 2008, p. 608–612.
    23. 23)
    24. 24)
      • Jin, Z., Anand, S., Subbalakshmi, K.P.: `Detecting primary user emulation attacks in dynamic spectrum access networks', IEEE Int. Conf. on Communications, ICC 2009, June 2009, p. 1–5.
    25. 25)
      • D. Fudenberg , J. Tirole . (1991) Game theory.
    26. 26)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2010.0573
Loading

Related content

content/journals/10.1049/iet-com.2010.0573
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address