security issues in cognitive radio networks (crn)

38
Security Issues in Cognitive Radio Networks (CRN) Peng Zang Apr. 13, 2012 1

Upload: alvaro

Post on 24-Feb-2016

71 views

Category:

Documents


0 download

DESCRIPTION

Security Issues in Cognitive Radio Networks (CRN). Peng Zang Apr. 13, 2012. Outlines. Why Using CRN and its goal Elements of CRN Specific security issues of CRN Selected attack models Several potential solutions and models Conclusion. Why CRN. Spectrum crisis - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Security Issues in Cognitive Radio Networks (CRN)

Security Issues in Cognitive Radio Networks (CRN)

Peng ZangApr. 13, 2012

1

Page 2: Security Issues in Cognitive Radio Networks (CRN)

Outlines• Why Using CRN and its goal• Elements of CRN• Specific security issues of CRN• Selected attack models• Several potential solutions and models• Conclusion

2

Page 3: Security Issues in Cognitive Radio Networks (CRN)

Why CRN• Spectrum crisis

– Most spectrum are occupied by licensed users– Exploit idle portion of the licensed spectrum

• Goals– Coexistence with Primary Users (PU)– Coexistence with other Secondary Users (SU)– Using spectrum effectively and fairly

– Maximum throughput– Fairly allocated spectrum to each SUs

3

Page 4: Security Issues in Cognitive Radio Networks (CRN)

Elements of CRN• Spectrum sensing• Spectrum analysis and decision making• Dynamic Spectrum Access and Allocation (DSA)• Software defined Radio (SDR)

– Cognitive capability– Reconfigurability

4

Page 5: Security Issues in Cognitive Radio Networks (CRN)

Attack against CRN• Primary User Emulation Attack (PUE)• Spectrum Sensing Data Falsification Attack (SSDF)• Common Control Channel Attack (CCC)• Beacon Falsification Attack (BF)• Cross layer attacks• Software Defined Radio Attacks (SDR)• etc..No modification to the incumbent signal should be required to

accommodate opportunistic use of the spectrum by SUs. – FCC

5

Page 6: Security Issues in Cognitive Radio Networks (CRN)

PUE attack• An attacker emulates PU to

force SUs leave the vacant channel

• High probability of success• Could lead to DoS attack

• 3 models will be presented: Signal feature based;Localization based;Lion attack;

Figure 1. A simplified PUEA scheme [1]

6

Page 7: Security Issues in Cognitive Radio Networks (CRN)

Background knowledges

• Received signal• Path loss :• Log-normal Shadowing:

• Received energy:

Path loss : constantShadowing

7

Variance of shadowing parameter

Page 8: Security Issues in Cognitive Radio Networks (CRN)

PUE attack 1.1: Signal feature based – Assumptions

• SU & Attacker know r1, attacker know r2 & r3.• SU & PU : stationary• Energy detection is adopted• Attack knows and waveform of PU signal

• When signal transmitter is:– PU:

– Attacker:

8

Different and unique

Page 9: Security Issues in Cognitive Radio Networks (CRN)

PUE defense Model 1.1 – naive defense

• Received signal energy:• they are i.i.d. And follow the same distribution as • Use unbiased estimator:

• Determination:

Keys for determination

Threshold

Step1:

Step2:

9

Page 10: Security Issues in Cognitive Radio Networks (CRN)

PUE attack 1.2: advanced attack

• Goal: Make SU receive emulation signals has same power level as PU signal:

• Need two parameter first:• Attacker received signal from PU:

where:

10

Page 11: Security Issues in Cognitive Radio Networks (CRN)

PUE attack 1.2: advanced attack cont'd

• From MLE, parameters are found:

• Design of emulation signal:

• Leads to:

The emulation signal transmitted with power:

11

Page 12: Security Issues in Cognitive Radio Networks (CRN)

Advanced Defense 1.2: Variance detection

• Basic idea: Detect PU channel parameter –• Using unbiased estimation:

• Detection:

12

Page 13: Security Issues in Cognitive Radio Networks (CRN)

Advanced Defense 1.2: Variance detection

• Decision making:

• However, there are always trade-offs

13

Page 14: Security Issues in Cognitive Radio Networks (CRN)

Naïve detection simulation[1]

14

Page 15: Security Issues in Cognitive Radio Networks (CRN)

Advanced variance detection[1]

15

Page 16: Security Issues in Cognitive Radio Networks (CRN)

m sensing attempts[1]

16

Page 17: Security Issues in Cognitive Radio Networks (CRN)

PUE attack defense model 2: localization based[2]

• Basic idea: Transmitter's location verification• Methods:

– Received Signal Strength (RSS); – Need help from Wireless Sensor Network (WSN)

• Assumptions:– WSN distributed uniformly– Attacker not in the same position as PU

• RSS Model:• Variance: mean:

17

Page 18: Security Issues in Cognitive Radio Networks (CRN)

18

RSS smoothing procedure

Pivot point 1

Pivot point 2

Transmitter

Page 19: Security Issues in Cognitive Radio Networks (CRN)

RSS Smoothing Procedure• Step 1: Calculate Median value of RSS in each pivot point.

– For Pivot point 1 (R0):

– Find minimum value of

19

Page 20: Security Issues in Cognitive Radio Networks (CRN)

RSS Smoothing Procedure– For Pivot point 2 (R1):

– Find maximum value of

• Step 2: Get a loose lower bound:

20

Page 21: Security Issues in Cognitive Radio Networks (CRN)

RSS Smoothing procedure• Step3: Obtain

– P: confidence level– New R.V. X0:

• Then r and d must satisfy:

21

Page 22: Security Issues in Cognitive Radio Networks (CRN)

Results

22

Page 23: Security Issues in Cognitive Radio Networks (CRN)

Results

23

Page 24: Security Issues in Cognitive Radio Networks (CRN)

PUE attack 3: Lion Attack Model [4]• Intelligent algorithm: attack TCP transmission utilizing

retransmission timer back off.• Analytical Model:

24

Page 25: Security Issues in Cognitive Radio Networks (CRN)

25

Page 26: Security Issues in Cognitive Radio Networks (CRN)

Assumptions and definitions• Each attack lead to a handoff• Fixed handoff time: Fixed detection time: • R.V.: Another R.V.:• Round Trip Time(RTT) < Minimum Retransmittion Time

Out(RTO)• At least one handoff take place• Probability of k handoffs in an interval (x',x'+τ) is • Then:

26

Page 27: Security Issues in Cognitive Radio Networks (CRN)

RTO and Retransmission time• Retransmission Time Out (RTO):

• Retransmission Time instant:

27

Page 28: Security Issues in Cognitive Radio Networks (CRN)

Analytical model of lion attack [4]

28

Page 29: Security Issues in Cognitive Radio Networks (CRN)

Find Inactivity Time• Probability that inactive time is a given value:

• Expected average time of inactivity:

29

Pr(every t’ before this one happened in a handoff)

Page 30: Security Issues in Cognitive Radio Networks (CRN)

Find Inactivity Ratio• Find TCP inactivity percentage:

• Average activity time:

30

Page 31: Security Issues in Cognitive Radio Networks (CRN)

Performance

31

Page 32: Security Issues in Cognitive Radio Networks (CRN)

PUE attack Conclusion• Model 1.1 &1.2

– Goal: Authentication– Channel parameters Map vs. Public/Private Key

• Model 2– WSN vs. KDC

• Model 3– RTO vs. Secrete Key

32

Page 33: Security Issues in Cognitive Radio Networks (CRN)

SSDF : Model

• Assumptions: – In distributed sensing; – Fixed graph for the network; – Duplex wireless connections;– Attackers are in the graph and send falsified

information to SU;– Energy detection model is used.

33

Page 34: Security Issues in Cognitive Radio Networks (CRN)

Basic idea• Step1: Get mean value of sensing result from neighbor nodes

• Step2: Exclude most deviate neighbor node

• Step3: Consensus algorithm

34

Page 35: Security Issues in Cognitive Radio Networks (CRN)

Basic idea con't• Step 4: Compare with threshold:

• Vector form of algorithm:

• P: double Stochastic Matrix – ensure convergence of x* in whole network

35

Page 36: Security Issues in Cognitive Radio Networks (CRN)

Conclusion• Consensus

vs. Trust model

• To trust, or not to trust…

36

Page 37: Security Issues in Cognitive Radio Networks (CRN)

References[1] Ruiliang Chen; Jung-Min Park; Reed, J.H.; , "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," Selected Areas in Communications, IEEE Journal on , vol.26, no.1, pp.25-37, Jan. 2008

[2] Zesheng Chen; Cooklev, T.; Chao Chen; Pomalaza-Raez, C.; , "Modeling primary user emulation attacks and defenses in cognitive radio networks," Performance Computing and Communications Conference (IPCCC), 2009 IEEE 28th International , vol., no., pp.208-215, 14-16 Dec. 2009

[3] Yu, F.R.; Tang, H.; Minyi Huang; Zhiqiang Li; Mason, P.C.; , "Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios," Military Communications Conference, 2009. MILCOM 2009. IEEE , vol., no., pp.1-7, 18-21 Oct. 2009

[4] Hernández, J.; León, O.; Soriano, M. “Modeling the lion attack in cognitive radio networks. Eurasip journal on wireless communication and networking, 2011, vol. 2011, p. 1-10.

[5] Nansai Hu; Yu-Dong Yao; Mitola, J.; , "Most Active Band (MAB) Attack and Countermeasures in a Cognitive Radio Network," Wireless Communications, IEEE Transactions on , vol.11, no.3, pp.898-902, March 2012

37

Page 38: Security Issues in Cognitive Radio Networks (CRN)

Thank you !• Questions?

38