Comparing Adversary Defense Mechanisms in Cognitive Radio Networks

Author(s):  
Doaa Kiwan ◽  
John P. Fonseka ◽  
Rana A. Hassan

BACKGROUND: In a cognitive radio network, the cognitive transmitter senses the medium to detect spectrum opportunities and transmits its own data if the channel is sensed to be idle. A jammer can also sense the medium and identify the slots of successful transmission. The jammer’s main objective is to reduce the throughput of the cognitive transmitter. METHODS: Towards this objective, the jammer builds a deep learning classifier in which the most recent sensing results of acknowledgments (ACKs) sent by the receiver are used to predict the slots of successful transmissions of the cognitive transmitter. This allows the attacker to reliably predict the successful transmissions and can effectively jam these transmissions. The deep learning classification soft decision probabilities are used by the jammer for power control subject to a certain power budget. A receiver-based defense mechanism is developed against the jamming attacks. The receiver purposely takes some wrong actions, i.e., sends ACK when transmission is not successful and vice versa, to poison the training process of the attacker. Results: We show that our receiver’s defense mechanism effectively enhances the throughput of the cognitive transmitter when compared to the transmitter’s defense mechanism, where the transmitter takes some wrong decisions when it accesses the medium. CONCLUSION: A novel defense mechanism against jamming attacks in cognitive radio networks is introduced.

2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Pham-Duy Thanh ◽  
Hiep Vu-Van ◽  
Insoo Koo

We study jamming attacks in the physical layer of multihop cognitive radio networks (MHCRNs) where energy-constrained relays forward information from the source to the destination. Meanwhile, a jammer can transmit interfering signals on a channel such that all ongoing transmissions on this channel will be corrupted. In this paper, all jammers can attack only one of the predefined channels in each time slot. Moreover, they can randomly switch channels to start jamming another channel at the beginning of every time slot. The switching behavior is assumed to follow a Gaussian distribution. Due to limited battery capacity in the relays, energy harvesting is utilized to solve the energy-constrained problem in the cognitive radio network. Subsequently, relays are able to harvest energy from non-radio frequency (non-RF) signals such as solar, wind, or temperature. In this paper, we determine the throughput/delay ratio as a key metric to evaluate the performance in MHCRNs. Owing to the limited battery capacity in the relays and the jamming problem, the source needs to select proper relays and channels for each data transmission frame to optimize overall network performance in terms of end-to-end delay, throughput, and energy efficiency. Therefore, we provide two novel multihop allocation schemes to maximize achievable end-to-end throughput while minimizing delay in the presence of jammers. Through simulation results, we validate the effectiveness of the proposed schemes under multiple jamming attacks in MHCRNs.


Sign in / Sign up

Export Citation Format

Share Document