Premium
Combating channel eviction triggering denial‐of‐service attacks in cognitive radio networks
Author(s) -
Sodagari Shabnam,
Attar Alireza,
Leung Victor C.M.,
Bilén Sven G.
Publication year - 2012
Publication title -
transactions on emerging telecommunications technologies
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.366
H-Index - 47
ISSN - 2161-3915
DOI - 10.1002/ett.2502
Subject(s) - denial of service attack , cognitive radio , computer security , adversary , computer science , eviction , computer network , incentive , class (philosophy) , channel (broadcasting) , focus (optics) , service (business) , telecommunications , business , the internet , wireless , economics , physics , optics , marketing , artificial intelligence , world wide web , political science , law , microeconomics
We focus on a specific class of denial‐of‐service (DoS) attacks that is executed through Channel Eviction Triggering (CET), whereby adversary nodes unduly invoke mechanisms inherent in a cognitive radio (CR) network (CRN) operation to protect the licensed users and thus disrupt secondary access to the otherwise idle licensed bands. Skewing the spectrum sensing decision of CRN through sensing misreports is a manifestation of CET attacks. Whereas most studies in the literature focus on making the cooperative sensing more robust against such sensing misreports, we tackle the problem from the novel perspective of incentive alleviation. We distinguish two classes of such DoS attacks, which we refer to as CET and CET‐jamming attacks. In the former case, the incentive of adversary CRs is to remove the competition of truthful CRs in accessing the licensed spectral ranges. The latter class of DoS attack deals with scenarios in which the adversary nodes are mainly interested in denying the chances of communication of CRN over primary bands and as such their incentive cannot be modelled by the same utility maximisation model as truthful CRs. We propose a solution for each class of attacks, and our numerical results verify the effectiveness of the proposed CET defence scheme in both cases. Copyright © 2012 John Wiley & Sons, Ltd.