scholarly journals Cognitive Radio Jamming Attack Detection Using an Autoencoder for CRIoT Network 

Author(s):  
Nallarasan v ◽  
Kottilingam Kottursamy

Abstract IoT network-connected devices will be kept on increasing and will cross million, but it is impossible to allocate spectrum for those million and million of the devices. This spectrum scarcity can be handled by incorporating cognitive radio-based dynamic spectrum sharing, which is referred to as Cognitive Radio Internet of Things (CRIoT). But CRIoT sufferers from the Physical layer attack in cognitive radio, which affects the spectrum sensing accuracy and reduces the spectrum utilization. There are various attacks at the physical layer of cognitive radio among jamming attacks resulting in a denial of cognitive radio services and make spectrum underutilization. Continuous jamming can be detected quickly based on time delay on spectrum access, but discrete random jamming detection is challenging. This article proposes an autoencoder deep learning architecture-based jamming attack detection in cognitive radio. The jamming detection problem is modeled as anomaly detection. The autoencoder architecture is used to detect the jammer anomaly of the jammer. The proposed system involves the simulation of a random jamming attack and detecting it at a particular time instant information that may help mitigate the jammer attack .the proposed mechanism able to detect the jammer with 89% of accuracy.

Author(s):  
Chungang Yang ◽  
Jiandong Li

The growing demands of radio spectrum urgently require more efficient and effective spectrum exploitation and management technologies. Cognitive radio technology and its networking not only explores the potential white spectrum resources temporally and geographically, but also enables an extensive efficient utilization and optimization of the current allocated spectrum resources. Therefore, rapid progress has been made in the research on cognitive radio and its networking technologies to facilitate more flexibilities in spectrum utilization and management. In this chapter, the authors first summarize the current various advanced and flexible spectrum management schemes, including spectrum trading, leasing, pricing, and harvesting, and analyze their advantages and disadvantages. Then, they take the viewpoints of both the spectrum marketing perspective and spectrum technical perspective, and they propose the centralized and distributed dynamic spectrum sharing schemes, respectively. In particular, the authors introduce many novel advanced spectrum sharing scheme and summarize the open and possible research problems.


Author(s):  
Usama Mir ◽  
Leila Merghem-Boulahia ◽  
Dominique Gaïti

In modern day wireless networks, spectrum utilization and allocation are static. Generally, static spectrum allocation is not a feasible solution considering the distributed nature of wireless devices, thus some alternatives must be ensured in order to allocate spectrum dynamically and to mitigate the current spectrum scarcity. An effective solution to this problem is cognitive radio (CR), which seeks the empty spectrum portions and shares them with the neighboring devices. The CR devices can utilize the available spectrum more efficiently if they try to work together. Therefore, in this work, we review a number of dynamic spectrum allocation techniques, especially those using multiagent systems and game-theoretical approaches, and investigate their applicability to CR networks. The distributed nature of these two domains makes them suitable for CR networks. In fact, the idea of dynamic spectrum sharing using these techniques is not entirely new and several interesting approaches already exist in literature. Thus, in our study we try to focus on existing spectrum sharing literature and cooperative multiagent system for CR networks. We are particularly interested in showing how the distributed nature of multiagent system can be combined with cognitive radios in order to alleviate the current static spectrum usage as well as maintaining cooperation amongst the CR nodes. Moreover, our work includes the description of various scenarios in which spectrum sharing is an essential factor and hence must be performed in a dynamic and opportunistic manner. We also explain the working of our proposed spectrum allocation approach using multiagent system cooperation in one of these scenarios and verify its formal behavior using Petri net modeling.


2016 ◽  
Vol 13 (6) ◽  
pp. 236-248 ◽  
Author(s):  
Guodong Zhang ◽  
Wei Heng ◽  
Tian Liang ◽  
Chao Meng ◽  
Jinming Hu

2016 ◽  
Vol 25 (08) ◽  
pp. 1650097 ◽  
Author(s):  
Ehsan Meamari ◽  
Khadijeh Afhamisisi ◽  
Hadi Shahriar Shahhoseini

IEEE 802.22 Standard utilizes cognitive radio (CR) techniques to allow sharing unused spectrum band. CR is vulnerable to various attacks such as jamming attacks. This paper has focused on coordinated jamming attacks. A simple strategy for secondary users is to change their bands and switch to other appropriate bands when the jamming attack has occurred. Also, the malicious users should switch to other bands in order to jam the secondary users. To address this problem, a game theoretical method is proposed to analyze coordinated jamming attacks in CR. Then, using Nash equilibrium on the proposed game, the most appropriate bands have been found to switch as well as the optimal switching probabilities for both secondary and malicious users. Meanwhile, effects of different parameters like the number of malicious users are investigated in changing the optimal switching probabilities by analysis of the model.


Sign in / Sign up

Export Citation Format

Share Document