Advertisement

Secure Multi-hop Data Transmission in Cognitive Radio Networks Under Attack in the Physical Layer

  • Pham Duy Thanh
  • Hiep Vu-Van
  • Insoo Koo
Article
  • 40 Downloads

Abstract

Cognitive radio networks (CRNs) have a shortcoming in that attackers can increase their ability to disturb secondary users (SUs). This paper focuses on jamming attacks in the physical layer, in which several attackers try to interrupt SUs by injecting the interference into their communications. Once a jammer transmits interfering signals on the channel during the defined time, all ongoing transmissions on this channel will be corrupted. It is quite difficult for SUs to protect a single-hop data transmission from jammers. So, obtaining a solution for secure multi-hop data transmission in the presence of jammers becomes a more challenging task in CRNs. This paper investigates a strategy to find the optimal route and channels for transmission between cognitive transmitters and receivers in the presence of jammers in CRNs. In this scenario, the jammers are located randomly and their jamming behavior is assumed to follow a Gaussian distribution. We provide an optimal link–channel pair allocation scheme in which the secondary transmitter (the source) selects the best relay and a suitable channel for each hop in the source-to-destination route to protect the information intended to the secondary receiver (the destination) from the jammers. Simulation results prove the efficiency of the proposed scheme in a CR network.

Keywords

Cognitive radio Jamming attacks Physical layer Spectrum allocation 

Notes

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2015R1D1A1A09057077) as well as by the MEST (2017R1D1A1B03029448).

References

  1. 1.
    Federal Communications Commission. (2002). FCC spectrum policy task force report, ET Docket, No. 02–135.Google Scholar
  2. 2.
    Wyglinski, A. M., Nekovee, M., & Hou, Y. T. (2009). Cognitive radio communications and networks: principles and practice. New York: Elsevier.Google Scholar
  3. 3.
    Wang, B., & Liu, K. J. R. (2011). Advances in cognitive radio networks: A survey. IEEE Journal of Selected Topics in Signal Processing, 5(1), 5–23.CrossRefGoogle Scholar
  4. 4.
    Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.CrossRefGoogle Scholar
  5. 5.
    Mitola, J., & Maguire, G. (1999). Cognitive radio: Making software radios more personal. IEEE Personal Communications, 6(4), 13–18.CrossRefGoogle Scholar
  6. 6.
    Shu, Z., Qian, Y., & Ci, S. (2013). On physical layer security for cognitive radio networks. IEEE Network, 27(3), 28–33.CrossRefGoogle Scholar
  7. 7.
    Sharma, R., & Rawat, D. (2014). Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 17(2), 1023–1043.CrossRefGoogle Scholar
  8. 8.
    Li, H., & Han, Z. (2010). Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, part I: Known channel statistics. IEEE Transactions on Wireless Communications, 9(11), 3566–3577.CrossRefGoogle Scholar
  9. 9.
    Brown, T. & Sethi, A. (2007). Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment. In Proceedings of IEEE International Conference on Cognitive Radio Oriented Wireless Network Communications (pp. 456–464).Google Scholar
  10. 10.
    Zhang, L., Zhang, R., Liang, Y., Xin, Y., & Cui, S. (2010). On the relationship between the multi-antenna secrecy communications and cognitive radio communications. IEEE Transactions on Communications, 58(6), 1877–1886.CrossRefGoogle Scholar
  11. 11.
    Xu, W. et al. (2004). Channel surfing and spatial retreats: Defenses against wireless denial of service. In Proceedings of the 3rd ACM workshop wireless security, Philadelphia, PA (pp. 80–89).Google Scholar
  12. 12.
    Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. M. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. In Proceedings of the IEEE (pp. 3172–3186).  https://doi.org/10.1109/JPROC.2012.2208211.
  13. 13.
    Sydir, J., & Taori, R. (2009). An evolved cellular system architecture incorporating relay stations. IEEE Communications Magazine, 47(6), 115–121.CrossRefGoogle Scholar
  14. 14.
    Ruan, L. Z., & Lau, V. K. N. (2010). Decentralized dynamic hop selection and power control in cognitive multi-hop relay systems. IEEE Transactions Wireless Communications, 9(10), 3024–3030.CrossRefGoogle Scholar
  15. 15.
    Zhang, Q., Feng, Z., Yang, T., & Li, W. (2016). Optimal power allocation and relay selection in multi-hop cognitive relay networks. Wireless Personal Communications, 86(3), 1673–1692.CrossRefGoogle Scholar
  16. 16.
    Ho-Van, K. & Sofotasios, P. C. (2013). Bit error rate of underlay multi-hop cognitive networks in the presence of multipath fading. In 2013 fifth international conference on ubiquitous and future networks (ICUFN), Da Nang (pp. 620–624).  https://doi.org/10.1109/ICUFN.2013.6614893.
  17. 17.
    Wang, W., Kwasinski, A. & Han, Z. (2014). A routing game in cognitive radio networks against routing-toward-primary-user attacks. In IEEE wireless communications and networking conference (pp. 2510–2515).  https://doi.org/10.1109/WCNC.2014.6952783.
  18. 18.
    Wu, Y., Wang, B., Liu, K., & Clancy, T. (2012). Anti-jamming games in multi-channel cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(1), 4–15.CrossRefGoogle Scholar
  19. 19.
    Wang, Q., Ren, K., Ning, P., & Hu, S. (2016). Jamming-resistant multiradio multichannel opportunistic spectrum access in cognitive radio networks. IEEE Transactions on Vehicular Technology, 65(10), 8331–8344.CrossRefGoogle Scholar
  20. 20.
    Adem, N., Hamdaoui, B. & Yavuz, A. (2015). Pseudorandom time-hopping anti-jamming technique for mobile cognitive users. In 2015 IEEE globecom workshops, (pp. 1–16).  https://doi.org/10.1109/GLOCOMW.2015.7414043.
  21. 21.
    Arunthavanathan, S., Goratti, L., Maggi, L., De Pellegrini, F. & Kandeepan, S. (2014). On the achievable rate in a D2D cognitive secondary network under jamming attacks. In 2014 9th international conference on cognitive radio oriented wireless networks and communications, (pp. 39–44).  https://doi.org/10.4108/icst.crowncom.2014.255665.
  22. 22.
    Wang, P. & Henz, B. (2014). Throughput analysis of channel surfing in jammed single-hop wireless networks. In 2014 wireless telecommunications symposium, (pp. 1–8).  https://doi.org/10.1109/WTS.2014.6834998.
  23. 23.
    Zou, Y. (2017). Physical-layer security for spectrum sharing systems. IEEE Transactions on Wireless Communications, 16(2), 1319–1329.CrossRefGoogle Scholar
  24. 24.
    Mokari, N., Parsaeefard, S., Saeedi, H., & Azmi, P. (2014). Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users. IEEE Transactions on Wireless Communications, 13(2), 1058–1073.CrossRefGoogle Scholar
  25. 25.
    Liu, W., Sarkar, M. Z. I., Ratnarajah, T., & Du, H. (2017). Securing cognitive radio with a combined approach of beamforming and cooperative jamming. IET Communications, 11(1), 1–9.  https://doi.org/10.1049/iet-com.2016.0114.CrossRefGoogle Scholar
  26. 26.
    Zhao, R., Yuan, Y., Fan, L., & He, Y. C. (2017). Secrecy performance analysis of cognitive decode-and-forward relay networks in nakagami- \(m\) fading channels. IEEE Transactions on Communications, 65(2), 549–563.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Electrical Electronic EngineeringUniversity of UlsanUlsanKorea

Personalised recommendations