Skip to main content
Log in

Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Cognitive Radio (CR) is an emerging and promising communication technology geared towards improving vacant licensed band utilization, intended for unlicensed users. Security of Cognitive Radio Networks (CRN) is a highly challenging domain. At present, plenty of efforts are in place for defining new paradigms, techniques and technologies to secure radio spectrum. In a distributed cognitive radio ad-hoc network, despite dynamically changing topologies, lack of central administration, bandwidth-constraints and shared wireless connections, the nodes are capable of sensing the spectrum and selecting the appropriate channels for communication. These unique characteristics unlock new paths for attackers. Standard security techniques are not an effective shield against attacks on these networks e.g. Primary User Emulation (PUE) attacks. The paper presents a novel PUE attack detection technique based on energy detection and location verification. Next, a game model and a mean field game approach are introduced for the legitimate nodes of CRN to reach strategic defence decisions in the presence of multiple attackers. Simulation of the proposed technique shows a detection accuracy of \({89\%}\) when the probability of false alarm is 0.09. This makes it 1.32 times more accurate than compared work. Furthermore, the proposed framework for defence is state considerate in making decisions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Federal Communications Commission (FCC), FCC online table of frequency allocations, August 31, (2016) [Online] https://transition.fcc.gov/oet/spectrum/table/fcctable.pdf.

  2. Zhao, Q., & Sadler, B. M. (2007). A survey of dynamic spectrum access. IEEE Signal Processing Magazine, 24(3), 7989.

    Article  Google Scholar 

  3. Lien, S.-Y., Chen, K.-C., & Liang, Y.-C. (2014). Lin Y Cognitive radio resource management for future cellular networks. IEEE Wireless Communication, 21(1), 7079.

    Article  Google Scholar 

  4. Marinho, J., Granjal, J., & Monteiro, E. (2015). A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP Journal on Information Security, 114.

  5. Spectrum Bridge. White space overview. [Online]: http://spectrumbridge.com/tv-white-space/.

  6. WRAN WG on Broadband Wireless Access Standards, IEEE 802.22 [Online]. www.ieee802.org/22.

  7. Jana, S., Zeng, K., & Cheng, W. (2013). Trusted collaborative spectrum sensing for mobile cognitive radio networks. IEEE Transactions on Information Forensics and Security, 8(9), 1497–1507.

    Article  Google Scholar 

  8. Wengui, S., & Yang, L. (2015). A jury-based trust management mechanism in distributed cognitive radio networks. China Communications IEEE, 12(7), 119–126.

    Article  Google Scholar 

  9. Pu, D. (2012). Detecting primary user emulation attack in cognitive radio networks. In Proc. IEEE global telecommunications conf, Dec.

  10. Jin, Z., Anand, S., & Subbalakshmi, K. P. (2009). Detecting primary user emulation attacks in dynamic spectrum access networks. In Proc. IEEE Intl Conf. Commun. (ICC).

  11. Akhunzada, A., Ahmed, E., Gani, A., Khan, M. K., Imran, M., & Guizani, S. (2015). Securing software defined networks: Taxonomy, requirements, and open issues. IEEE Communications Magazine, 53(4), 3644.

    Article  Google Scholar 

  12. Kumari, S., Khan, M. K., & Atiquzzaman, M. (2015). User authentication schemes for wireless sensor networks: A review. Ad Hoc Networks, 27, 159–194.

    Article  Google Scholar 

  13. Tai, W.-L., Chang, Y.-F., & Chen, Y.-C. (2016). A fast-handover-supported authentication protocol for vehicular ad hoc networks. Journal of Information Hiding and Multimedia Signal Processing, 7(5), 960–969.

    Google Scholar 

  14. Ngo, N. M., Unoki, M., Miyauchi, R., & Suzuki, Y. (2014). Data hiding scheme for amplitude modulation radio broadcasting systems. Journal of Information Hiding and Multimedia Signal Processing, 5(3), 324–341.

    Google Scholar 

  15. Nadeem, A., & Howarth, M. P. (2013). A survey of MANET intrusion detection and prevention approaches for network layer attacks. IEEE Communications Surveys and Tutorials, 15, 2027–2045.

    Article  Google Scholar 

  16. Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE Transactions on Wireless Communications, 11, 3847.

    Google Scholar 

  17. Albers, P., Camp, O. Percher, J. M., Jouga, B., Me, L., & Puttini, R. Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches. In Proceedings of the 1st international workshop on wireless information systems.

  18. Snort Team. (2014). SNORT User Manual, 2.9.7 ed, Available online at: https://www.snort.org/documents.

  19. Bro Team. Bro documentation and manual. Available online at: https://www.bro.org/documentation.

  20. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2010). Mitigating routing misbehaviour in mobile ad hoc networks. In Proceedings of the 6th international conference on mobile computing and networking, Boston, MA, pp. 255–265.

  21. Zhang, Y., & Lee, W. (2013). Intrusion detection in wireless ad hoc networks. In ACM MOBICOM, pp. 275–283.

  22. Albers, P., Camp, O., Percher, J. M., Jouga, B., Me, L., & Puttini, R. (2012). Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches. In Proceedings of the 1st international workshop on wireless information systems (WIS-2002) (pp. 1–12).

  23. Ferraz, L., et al. (2014). An accurate and precise malicious node exclusion mechanism for ad hoc networks. Ad Hoc Networks, Elsevier, pp. l–14

  24. Chen, R., & Park, J.-M. (2006). Ensuring trustworthy spectrum sensing in cognitive radio networks. In First IEEE workshop on networking technologies for software defined radio networks (SDR) (pp. 110–119). VA, September: Reston.

  25. Chen, R., Park, J.-M., & Reed, J. H. (2008). Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 26(1), 25–37.

    Article  Google Scholar 

  26. Huang, L., Xie, L., Yu, H., Wang, W., & Yao, Y. (2010) Anti-PUE attack based on joint position verification in cognitive radio networks. In International conference on communications and mobile computing (CMC), Vol. 2, Shenzhen, China, pp. 169–173.

  27. Zhao, C., Wang, W., Huang, L., & Yao, Y. (2009). Anti-PUE attack base on the transmitter fingerprint identification in cognitive radio. In 5th International conference on wireless communications, networking and mobile computing (WiCom 09), Beijing, China, pp. 1–5.

  28. Afolabi, O. R., Kim, K., & Ahmad, A. (2009). Secure spectrum sensing in cognitive radio networks using emitters electromagnetic signature. In Proceedings of 18th international conference on computer communications and networks (ICCCN 2009), San Francisco, CA, pp. 1–5.

  29. Otrok, H., et al. (2008). A game-theoretic intrusion detection model for mobile ad hoc networks. Elsevier Computer Communications, 31, 708–721.

    Article  Google Scholar 

  30. Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communication. Surveys Tutorials, 15(1), 472486.

    Article  Google Scholar 

  31. Meriaux, F., Varma, V., & Lasaulce, S. Mean field energy games in wireless networks. In Proc. 2012 Asilomar conf. signals, systems., computers.

  32. Tembine, H., Vilanova, P., Assaad, M., & Debbah, M. Mean field stochastic games for SINR-based medium access control. In Proc. 2011 intl ICST conf. performance evaluation methodologies tools.

  33. Huang, M. Y. Mean field stochastic games with discrete states and mixed players. In Proc. 2012 GameNets.

  34. Wang, Y., Yu, F., Tang, H., & Huang, M. (2014). A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Transactions on Wireless Communications, 13(3), 16161627.

    Google Scholar 

  35. Trees, H. L. V. (2001). Detection, estimation, and modulation theory: Part I. New Jersey, USA: Wiley-Inter science.

    Book  Google Scholar 

  36. Tandra, R., & Sahai, A. (2008). SNR walls for signal detection. IEEE Journal of Selected Topics in Signal Processing, 2(1), 417.

    Article  Google Scholar 

  37. Le, T. N., Chin, W.-L., & Lin, Y.-H. Non-cooperative and cooperative PUEA detection using physical layer in mobile OFDM-based cognitive radio networks. In International conference on computing, networking and communications, 24 March 2016.

  38. Urkowitz, H. (1967). Energy detection of unknown deterministic signals. Proceedings of the IEEE, 55(4), 523–531.

    Article  Google Scholar 

  39. Ayyasamy, A., & Venkatachalapathy, K. (2015). Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs. Wireless Networks, 21(2), 421–30.

    Article  Google Scholar 

  40. Ahmadi, M., Shojafar, M., Khademzadeh, A., Badie, K., & Tavoli, R. (2015). A hybrid algorithm for preserving energy and delay routing in mobile ad-hoc networks. Wireless Personal Communications, 85(4), 2485–505.

    Article  Google Scholar 

  41. Cordeschi, N., Amendola, D., & Baccarelli, E. (2015). Distributed and adaptive resource management in cloud-assisted cognitive radio vehicular networks with hard reliability guarantees. Vehicular Communications, 2(1), 1–12.

    Article  Google Scholar 

  42. Zhu, J., Song, Y., Jiang, D., & Song, H. (2016). Multi-armed bandit channel access scheme with cognitive radio technology in wireless sensor networks for the internet of things. IEEE Access, 4, 4609–4617.

    Article  Google Scholar 

  43. Pei, Y., Liang, Y.-C., Zhang, L., The, K. C., & Li, K. H. (2010). Secure communication over MISO cognitive radio channels. IEEE Transactions on Wireless Communications, 9, 1494502.

    Article  Google Scholar 

  44. Amjad, M. F., Aslam, B. & Zou, C. C. (2013). Reputation aware collaborative spectrum sensing for mobile cognitive radio networks. In MILCOM 2013 (pp. 951–956). San Diego, CA, 18-20.

  45. Mneimneh, S., & Bhunia, S. (2017). A game-theoretic and stochastic survivability mechanism against induced attacks in Cognitive Radio Networks. Pervasive and Mobile Computing Archive, 40(C), 577–592.

    Article  Google Scholar 

  46. Hosseini, A., Abolhassani, B., & Hosseini, A. (2017). Secure cognitive radio communication for internet-of-things: Anti-PUE attack based on graph theory. Journal of Computer and Communications, 5, 27–39.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Faisal Amjad.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khaliq, S.B.A., Amjad, M.F., Abbas, H. et al. Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach. Telecommun Syst 70, 123–140 (2019). https://doi.org/10.1007/s11235-018-0472-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-018-0472-y

Keywords

Navigation