Skip to main content
Log in

Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Several new attacks have been identified in CRNs such as primary user emulation, dynamic spectrum access (DSA), and jamming attacks. Such types of attacks can severely impact network performance, specially in terms of the over all achieved network throughput. In response to that, intrusion detection system (IDS) based on anomaly and signature detection is recognized as an effective candidate solution to handle and mitigate these types of attacks. In this paper, we present an intrusion detection system for CRNs (CR-IDS) using the anomaly-based detection (ABD) approach. The proposed ABD algorithm provides the ability to effectively detect the different types of CRNs security attacks. CR-IDS contains different cooperative components to accomplish its desired functionalities which are monitoring, feature generation and selection, rule generation, rule based system, detection module, action module, impact analysis and learning module. Our simulation results show that CR-IDS can detect DSA attacks with high detection rate and very low false negative and false positive probabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Bany Salameh, H., Kasasbeh, H., & Harb, B. (2016). A batch-based MAC design with simultaneous assignment decisions for improved throughput in guard-band-constrained cognitive networks. IEEE Transactions on Communications, 64(3), 1143–1152.

    Article  Google Scholar 

  2. Bany Salameh, H. (2016). Efficient resource allocation for multi-cell heterogeneous cognitive networks with varying spectrum availability. IEEE Transactions on Vehicular Technology, 65(8), 6628–6635.

    Article  Google Scholar 

  3. Parvin, S., Hussain, F., Hussain, O., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691–1708.

    Article  Google Scholar 

  4. Zargar, S. T., Weiss, M. B. H., Caicedo, C. E., & Joshi, J. B. D. (2009). Security in dynamic spectrum access systems: A Survey. In Telecommunications policy research conference Arlington.

  5. Newman, T., Clancy, T., McHenry, M., & Reed, J. (2010). Case study: Security analysis of a dynamic spectrum access radio system. In IEEE global communications conference.

  6. Zhang, X., & Li, C. (2009). The security in cognitive radio networks: A survey. IWCMC’09, Leipzig.

  7. Holcomb, S., & Rawat, D. B. (2016). Recent security issues on cognitive radio networks: A survey. SoutheastCon 2016 (pp. 1–6). Norfolk.

  8. Liu, S., Chen, Y., Trappe, W., & Greenstein, L. (2009). ALDO: An anomaly detection framework for dynamic spectrum access networks. In The IEEE Infocom conference.

  9. Clancy, T., & Goergen, N. (2008). Security in cognitive radio networks: Threats and mitigation. In Conference on cognitive radio oriented wireless networks and communications.

  10. Al-Nashif, Y., Kumar, A., Hariri, S., Luo, Y., Szidarovsky, F., & Qu, G. (2008). Multi-level intrusion detection system (ML-IDS). In The 5th IEEE international conference on autonomic computing (ICAC’08).

  11. Chen, R., Park, J.-M., & Reed, J. (2007). Defense against primary user emulation attacks in cognitive radio networks. In National science foundation under grants CNS-0627436 and CNS-0716208.

  12. Federal Communications Commission. (2004). Unlicensed operation in the TV broadcast bands and additional spectrum for unlicensed devices. In Below 900 MHz in the 3GHz band, ET Docket.

  13. Wu, Y., Wang, B., & Liu, K. (2010). Optimal defense against jamming attacks in cognitive radio networks using the Markov decision process approach. In IEEE globecom conference.

  14. Hlavacek, D., & Chang, J. M. (2014). A layered approach to cognitive radio network security: A survey. Computer Networks, 75, 414–436.

    Article  Google Scholar 

  15. Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and Countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 17 (2), 1023–1043. Second quarter 2015.

  16. Marinho, J., Granjal, J., & Monteiro, E. (2015). A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP Journal on Information Security, 2015(1), 1–14.

    Article  Google Scholar 

  17. Khasawneh, M., & Agarwal, A. (2014). A survey on security in cognitive radio networks. In Proceedings of the 6th international conference on computer science and information technology (CSIT), 2014 (pp. 64–70). IEEE.

  18. Jianwu, L., Zebing, F., Zhiyong, F., & Ping, Z. (2015). A survey of security issues in cognitive radio networks. China Communications, 12(3), 132–150.

    Article  Google Scholar 

  19. Ling, M. H., Yau, K.-L. A., & Poh, G. S. (2014). Trust and reputation management in cognitive radio networks: A survey. Security and Communication Networks, 7(11), 2160–2179.

    Article  Google Scholar 

  20. Reddy, Y. (2013). Security issues and threats in cognitive radio networks. In The ninth advanced international conference on telecommunications (AICT 2013) (pp. 84–89). Bangkok.

  21. Bhattacharjee, S., Sengupta, S., & Chatterjee, M. (2013). Vulnerabilities in cognitive radio networks: A survey. Computer Communications, 36(13), 1387–1398.

    Article  Google Scholar 

  22. Wengui, S., & Yang, L. (2015). A jury-based trust management mechanism in distributed cognitive radio networks. China Communications, 12(7), 119–126.

    Article  Google Scholar 

  23. Rahman, S. M. M., Kamruzzaman, S. M., Almogren, A., Alelaiwi, A., Alamri, A., & Alghamdi, A. (2014). Anonymous and secure communication protocol for cognitive radio ad hoc networks. In Proceedings of the IEEE international symposium on multimedia (ISM), 2014 (pp. 393–398). IEEE.

  24. Rawat, D. B. (2016). Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements. In Proceedings of the 2016 IEEE conference on communications and network security (CNS) (pp. 465–471). Philadelphia.

  25. Ouyang, J., Zhu, W. P., Massicotte, D., & Lin, M. (2016). Energy efficient optimization for physical layer security in cognitive relay networks. In Proceedings of the 2016 IEEE international conference on communications (ICC) (pp. 1–6). Kuala Lumpur.

  26. Shim, K., Do, N. T., An, B., & Nam, S. Y. (2016). Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information. In Proceedings of the 2016 international conference on electronics, information, and communications (ICEIC) (pp. 1–4). Da Nang.

  27. Zhang, H., Wang, T., Song, L., & Han, Z. (2016). Interference improves PHY security for cognitive radio networks. IEEE Transactions on Information Forensics and Security, 11(3), 609–620.

    Article  Google Scholar 

  28. Sorrells, C., Potier, P., Qian, L., & Li, X. (2011). Anomalous spectrum usage attack detection in cognitive radio wireless networks. In IEEE international conference on technologies for homeland security (HST), 2011 (pp. 384–389). 15–17 Nov.

  29. Blesa, J., Romero, E., Rozas, A., & Araujo, A. (2013). PUE attack detection in CWSNs using anomaly detecttion techniques. EURASIP Journal on Wireless Communications and Networking, 2013(1), 215.

    Article  Google Scholar 

  30. Fragkiadakis, A. G., Siris, V. A., Petroulakis, N. E., & Traganitis, A. P. (2015). Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection. Wireless Communications and Mobile Computing, 15, 276–294.

    Google Scholar 

  31. Fayssal, S., Hariri, S., & Al-Nashif, Y. (2007). Anomaly-based behavior analysis of wireless network security. In Mobile and ubiquitous systems: Networking and services.

  32. Fayssal, S., Al-Nashif, Y., Uk Kim, B., & Hariri, S. (2008). A proactive wireless self-protection system. In The 5th ACM international conference on pervasive services.

  33. Fayssal, S., & Hariri, S. (2007). Anomaly-based protection approach against wireless network attacks. In IEEE international conference on pervasive services.

  34. Doulat, A., Al Abed Al Aziz, A., Al-Ayyoub, M., Jararweh, Y., Bany Salameh, H. A., & Khreishah, A. A. (2014). Software defined framework for multi-cell cognitive radio networks. In 2014 IEEE 10th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 513–518). Larnaca.

  35. Phuong, T., Hung, L. X., Cho, S. J., Lee, Y. K., & gyoung, S. (2006). An anomaly detection algorithm for detecting attacks in wireless sensor networks. Berlin: Springer.

    Book  Google Scholar 

  36. Le’on, O., Hernandez-Serrano, J., & Soriano, M. (2010). Securing cognitive radio networks. International Journal of Communication Systems, 23(5), 633–652.

    Google Scholar 

  37. Abraham, A. (2005). Rule-based expert systems. In P. H. Sydenham & R. Thorn (Eds.), Handbook of measuring system design. Hoboken: Wiley.

    Google Scholar 

  38. Garca-Teodoro, P., Daz-Verdejo, J., Macia-Fernandez, G., & Vazquez, E. (2008). Anomaly-based network intrusion detection: Techniques, systems and challenges. Science Direct, Computer and Security, 28(1), 18–28.

    Google Scholar 

  39. Ghahramani, Z. (2004). Unsupervised learning. New York: Springer.

    Book  Google Scholar 

  40. Eskin, E., Arnold, A., Prerau, M., Portony, L., & Stolfo, S. (2002). A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In Data mining for security applications.

  41. Luo, Y., Szidarovszky, F., Al-Nashif, Y., & Hariri, S. (2009). A game theory based risk and impact analysis method for intrusion defense systems. In IEEE/ACS international conference on computer systems and applications.

  42. Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., & Autrel, F. (2007). Advanced reaction using risk assessment in intrusion detection systems. In Proceedings of the 2nd international workshop on critical information infrastructures security, Malaga.

  43. Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., & Araujo, J. (2008). Automated reaction based on risk analysis and attackers skills in intrusion detection systems. In Third international conference on risks and security of internet and systems, 2008. CRiSIS’08 (pp. 117–124). IEEE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yaser Jararweh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jararweh, Y., Bany Salameh, H.A., Alturani, A. et al. Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks. Telecommun Syst 67, 217–229 (2018). https://doi.org/10.1007/s11235-017-0329-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-017-0329-9

Keywords

Navigation