Advertisement

Stochastic Model for Cognitive Radio Networks under Jamming Attacks and Honeypot-Based Prevention

  • Suman Bhunia
  • Xing Su
  • Shamik Sengupta
  • Felisa Vázquez-Abad
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8314)

Abstract

Limited and dynamically available resources and “no right to protection from interference” in the open access dynamic spectrum access model bring forth a serious challenge of sustenance among the secondary networks and make them more susceptible to various spectrum etiquette attacks. Among these, the most common are jamming-based denial of service (DoS) attacks, which result in packet loss. The concept of a honeypot node or honeynode has been explored for wireless networks and has shown to be effective in attracting attacks, thus deterring the jammers from productive nodes. Yet a single dedicated honeynode, on account of its permanent idleness, is wasteful of an entire node as resource. In this paper, we seek to resolve this dilemma by dynamically selecting the honeynode for each transmission period, and we explore various methods of doing so. To begin with, we develop the first comprehensive queuing model for CRNs, which pose unique modeling challenges due to their periodic sensing and transmission cycles. We then build a simulation of CRNs under attack from jammers, introduce a series of strategies for honeynode assignment to combat these attacks, and assess the performance of each strategy. We find that the predictions of our mathematical model track closely with the results of our simulation experiments.

Keywords

Cognitive Radio Honeypot Stochastic Model Queuing theory queue with vacation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 23, 201–220 (2005)CrossRefGoogle Scholar
  2. 2.
    IEEE draft standard for information technology -telecommunications and information exchange between systems - wireless regional area networks (WRAN) - specific requirements - part 22: Cognitive wireless ran MAC & PHY specifications: Policies and procedures for operation in the TV bands, IEEE P802.22/D2.0 (2011)Google Scholar
  3. 3.
    Liu, Z., Chen, Y., Yu, W., Fu, X.: Generic network forensic data acquisition from household and small business wireless routers. In: IEEE International Symposium World of Wireless Mobile and Multimedia Networks (WoWMoM), pp. 1–6 (2010)Google Scholar
  4. 4.
    Misra, S., Dhurandher, S.K., Rayankula, A., Agrawal, D.: Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks. Computers and Electrical Engineering 36(2), 367–382 (2010)CrossRefzbMATHGoogle Scholar
  5. 5.
    Yek, S.: Implementing network defence using deception in a wireless honeypot. In: 2nd Australian Computer Network, Information and Forensics Conference (2004)Google Scholar
  6. 6.
    Burbank, J.: Security in cognitive radio networks: The required evolution in approaches to wireless network security. In: 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, pp. 1–7 (May 2008)Google Scholar
  7. 7.
    Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Network 20, 41–47 (2006)CrossRefGoogle Scholar
  8. 8.
    Wi-spy spectrum analyzer, http://www.metageek.net/products/wi-spy/
  9. 9.
    Khattab, S., Melhem, R., Mosse, D., Znati, T.: Honeypot back-propagation for mitigating spoofing distributed denial-of-service attacks. In: 20th International Parallel and Distributed Processing Symposium (IPDPS) (April 2006)Google Scholar
  10. 10.
    Cai, L., Shen, X., Mark, J., Cai, L., Xiao, Y.: Voice capacity analysis of wlan with unbalanced traffic. IEEE Transactions on Vehicular Technology (May 2006)Google Scholar
  11. 11.
    Sun, L., Ifeachor, E.: Voice quality prediction models and their application in voip networks. IEEE Transactions on Multimedia 8, 809–820 (2006)CrossRefGoogle Scholar
  12. 12.
    Vic Grout, D.O., Cunningham, S., Hebblewhite, R.: A note on the distribution of packet arrivals in high-speed data networks. In: Proceedings of IADIS International Conference WWW/Internet (2004)Google Scholar
  13. 13.
    Jain, R., Routhier, S.A.: Packet trains-measurements and a new model for computer network traffic. IEEE Journal on Selected Areas in Communication 6, 986–995 (1986)CrossRefGoogle Scholar
  14. 14.
    Wilson, M.: A historical view of network traffic models, http://www.cse.wustl.edu/~jain/cse567-06/ftp/traffic_models2 (accessed: May 12, 2012)
  15. 15.
    Dennis Guster, D.R., Sundheim, R.: Evaluating computer network packet inter-arrival distributions. In: Encyclopedia of Information Science & Technology (2009)Google Scholar
  16. 16.
    Madan, K.C.: An m/g/1 queue with optional deterministic server vacations. Metron - International Journal of Statistics (3-4), 83–95 (1999)Google Scholar
  17. 17.
    Ross, S.M.: Introduction to Probability Models, 10th edn. Academic Press (December 2009)Google Scholar
  18. 18.
    Ross, S.M.: Simulation, 5th edn. Academic Press (October 2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Suman Bhunia
    • 1
  • Xing Su
    • 2
  • Shamik Sengupta
    • 1
  • Felisa Vázquez-Abad
    • 2
  1. 1.University of NevadaRenoUSA
  2. 2.City University of New YorkUSA

Personalised recommendations