security issues in cognitive radio networks (crn)

Post on 24-Feb-2016

71 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Security Issues in Cognitive Radio Networks (CRN). Peng Zang Apr. 13, 2012. Outlines. Why Using CRN and its goal Elements of CRN Specific security issues of CRN Selected attack models Several potential solutions and models Conclusion. Why CRN. Spectrum crisis - PowerPoint PPT Presentation

TRANSCRIPT

Security Issues in Cognitive Radio Networks (CRN)

Peng ZangApr. 13, 2012

1

Outlines• Why Using CRN and its goal• Elements of CRN• Specific security issues of CRN• Selected attack models• Several potential solutions and models• Conclusion

2

Why CRN• Spectrum crisis

– Most spectrum are occupied by licensed users– Exploit idle portion of the licensed spectrum

• Goals– Coexistence with Primary Users (PU)– Coexistence with other Secondary Users (SU)– Using spectrum effectively and fairly

– Maximum throughput– Fairly allocated spectrum to each SUs

3

Elements of CRN• Spectrum sensing• Spectrum analysis and decision making• Dynamic Spectrum Access and Allocation (DSA)• Software defined Radio (SDR)

– Cognitive capability– Reconfigurability

4

Attack against CRN• Primary User Emulation Attack (PUE)• Spectrum Sensing Data Falsification Attack (SSDF)• Common Control Channel Attack (CCC)• Beacon Falsification Attack (BF)• Cross layer attacks• Software Defined Radio Attacks (SDR)• etc..No modification to the incumbent signal should be required to

accommodate opportunistic use of the spectrum by SUs. – FCC

5

PUE attack• An attacker emulates PU to

force SUs leave the vacant channel

• High probability of success• Could lead to DoS attack

• 3 models will be presented: Signal feature based;Localization based;Lion attack;

Figure 1. A simplified PUEA scheme [1]

6

Background knowledges

• Received signal• Path loss :• Log-normal Shadowing:

• Received energy:

Path loss : constantShadowing

7

Variance of shadowing parameter

PUE attack 1.1: Signal feature based – Assumptions

• SU & Attacker know r1, attacker know r2 & r3.• SU & PU : stationary• Energy detection is adopted• Attack knows and waveform of PU signal

• When signal transmitter is:– PU:

– Attacker:

8

Different and unique

PUE defense Model 1.1 – naive defense

• Received signal energy:• they are i.i.d. And follow the same distribution as • Use unbiased estimator:

• Determination:

Keys for determination

Threshold

Step1:

Step2:

9

PUE attack 1.2: advanced attack

• Goal: Make SU receive emulation signals has same power level as PU signal:

• Need two parameter first:• Attacker received signal from PU:

where:

10

PUE attack 1.2: advanced attack cont'd

• From MLE, parameters are found:

• Design of emulation signal:

• Leads to:

The emulation signal transmitted with power:

11

Advanced Defense 1.2: Variance detection

• Basic idea: Detect PU channel parameter –• Using unbiased estimation:

• Detection:

12

Advanced Defense 1.2: Variance detection

• Decision making:

• However, there are always trade-offs

13

Naïve detection simulation[1]

14

Advanced variance detection[1]

15

m sensing attempts[1]

16

PUE attack defense model 2: localization based[2]

• Basic idea: Transmitter's location verification• Methods:

– Received Signal Strength (RSS); – Need help from Wireless Sensor Network (WSN)

• Assumptions:– WSN distributed uniformly– Attacker not in the same position as PU

• RSS Model:• Variance: mean:

17

18

RSS smoothing procedure

Pivot point 1

Pivot point 2

Transmitter

RSS Smoothing Procedure• Step 1: Calculate Median value of RSS in each pivot point.

– For Pivot point 1 (R0):

– Find minimum value of

19

RSS Smoothing Procedure– For Pivot point 2 (R1):

– Find maximum value of

• Step 2: Get a loose lower bound:

20

RSS Smoothing procedure• Step3: Obtain

– P: confidence level– New R.V. X0:

• Then r and d must satisfy:

21

Results

22

Results

23

PUE attack 3: Lion Attack Model [4]• Intelligent algorithm: attack TCP transmission utilizing

retransmission timer back off.• Analytical Model:

24

25

Assumptions and definitions• Each attack lead to a handoff• Fixed handoff time: Fixed detection time: • R.V.: Another R.V.:• Round Trip Time(RTT) < Minimum Retransmittion Time

Out(RTO)• At least one handoff take place• Probability of k handoffs in an interval (x',x'+τ) is • Then:

26

RTO and Retransmission time• Retransmission Time Out (RTO):

• Retransmission Time instant:

27

Analytical model of lion attack [4]

28

Find Inactivity Time• Probability that inactive time is a given value:

• Expected average time of inactivity:

29

Pr(every t’ before this one happened in a handoff)

Find Inactivity Ratio• Find TCP inactivity percentage:

• Average activity time:

30

Performance

31

PUE attack Conclusion• Model 1.1 &1.2

– Goal: Authentication– Channel parameters Map vs. Public/Private Key

• Model 2– WSN vs. KDC

• Model 3– RTO vs. Secrete Key

32

SSDF : Model

• Assumptions: – In distributed sensing; – Fixed graph for the network; – Duplex wireless connections;– Attackers are in the graph and send falsified

information to SU;– Energy detection model is used.

33

Basic idea• Step1: Get mean value of sensing result from neighbor nodes

• Step2: Exclude most deviate neighbor node

• Step3: Consensus algorithm

34

Basic idea con't• Step 4: Compare with threshold:

• Vector form of algorithm:

• P: double Stochastic Matrix – ensure convergence of x* in whole network

35

Conclusion• Consensus

vs. Trust model

• To trust, or not to trust…

36

References[1] Ruiliang Chen; Jung-Min Park; Reed, J.H.; , "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," Selected Areas in Communications, IEEE Journal on , vol.26, no.1, pp.25-37, Jan. 2008

[2] Zesheng Chen; Cooklev, T.; Chao Chen; Pomalaza-Raez, C.; , "Modeling primary user emulation attacks and defenses in cognitive radio networks," Performance Computing and Communications Conference (IPCCC), 2009 IEEE 28th International , vol., no., pp.208-215, 14-16 Dec. 2009

[3] Yu, F.R.; Tang, H.; Minyi Huang; Zhiqiang Li; Mason, P.C.; , "Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios," Military Communications Conference, 2009. MILCOM 2009. IEEE , vol., no., pp.1-7, 18-21 Oct. 2009

[4] Hernández, J.; León, O.; Soriano, M. “Modeling the lion attack in cognitive radio networks. Eurasip journal on wireless communication and networking, 2011, vol. 2011, p. 1-10.

[5] Nansai Hu; Yu-Dong Yao; Mitola, J.; , "Most Active Band (MAB) Attack and Countermeasures in a Cognitive Radio Network," Wireless Communications, IEEE Transactions on , vol.11, no.3, pp.898-902, March 2012

37

Thank you !• Questions?

38

top related