TY - GEN
T1 - Denial of service attacks in cognitive radio networks through channel eviction triggering
AU - Sodagari, Shabnam
AU - Attar, Alireza
AU - Leung, Victor C.M.
AU - Bilen, Sven G.
PY - 2010/12/1
Y1 - 2010/12/1
N2 - Security issues associated with successful operation of cognitive radio networks (CRNs) recently are gaining a lot of attention. In this paper we focus on a specific class of Denialof-Service attack that is executed through Channel Eviction Triggering (CET), whereby the adversary nodes unduly invoke mechanisms inherent in CRN operation to protect the licensed users and thus disrupt secondary access to the otherwise idle licensed bands. Skewing the spectrum sensing decision of a CRN through sensing mis-reports is a manifestation of CET attacks. Whereas most studies in the literature focus on making the cooperative sensing more robust against such sensing misreports, we tackle the problem from an incentive perspective and develop strategies to minimize the utility difference of truthful and cheating cognitive radios so as to alleviate the incentive of mis-reporting. Our numerical results verify the effectiveness of the proposed CET defense scheme.
AB - Security issues associated with successful operation of cognitive radio networks (CRNs) recently are gaining a lot of attention. In this paper we focus on a specific class of Denialof-Service attack that is executed through Channel Eviction Triggering (CET), whereby the adversary nodes unduly invoke mechanisms inherent in CRN operation to protect the licensed users and thus disrupt secondary access to the otherwise idle licensed bands. Skewing the spectrum sensing decision of a CRN through sensing mis-reports is a manifestation of CET attacks. Whereas most studies in the literature focus on making the cooperative sensing more robust against such sensing misreports, we tackle the problem from an incentive perspective and develop strategies to minimize the utility difference of truthful and cheating cognitive radios so as to alleviate the incentive of mis-reporting. Our numerical results verify the effectiveness of the proposed CET defense scheme.
UR - http://www.scopus.com/inward/record.url?scp=79551641831&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79551641831&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2010.5683177
DO - 10.1109/GLOCOM.2010.5683177
M3 - Conference contribution
AN - SCOPUS:79551641831
SN - 9781424456383
T3 - GLOBECOM - IEEE Global Telecommunications Conference
BT - 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010
T2 - 53rd IEEE Global Communications Conference, GLOBECOM 2010
Y2 - 6 December 2010 through 10 December 2010
ER -