Cognitive radio cr technology is recognized as an intelligent radio. Secure cognitive radio networks with multiphase smart. Jamming mitigation in cognitive radio networks using a modified qlearning algorithm. Information theoretical limits on cognitive radio networks the study of cognitive networks is relatively new and there are many questions and aspects to be tackled before before cognitive radios can seamlessly and opportunistically employ spectrum licensed to primary users. In this paper, we study the anti jamming power control problem of secondary users sus in a largescale cooperative cognitive radio network attacked by a smart jammer with the capability to sense the ongoing transmission power. Department of electrical and computer engineering, university of illinois at urbanachampaign, urbana, il. Investigation of security and spectrum management issues in cognitive radio aided by machine learning.
The hnr radio and hnw stand as a topcandidate highcapacity network radio for backbone networks and as alternates for stressed satcom or airborne networks. Pdf reinforcement learning for reactive jamming mitigation. Received 24 september 20 received in revised form 6 august 2014 accepted 1 october 2014 available online xxxx keywords. Perspectives of jamming, mitigation and pattern adaptation.
Mimobased jamming resilient communication in wireless networks qiben yan. Cognitive radio cr networks have been identified in re cent literature as having. Morris chang1 department of electrical and computer engineering, iowa state university, united states article info article history. Pdf cognitive radio networks crns are recognized as the enabling technology for improving future bandwidth utilization. A method, computerreadable storage device and apparatus for locating a source of a communication impairment are disclosed. In this paper, we study the antijamming power control problem of secondary users sus in a largescale cooperative cognitive radio network attacked by a smart jammer with the capability to sense the ongoing transmission power. Antijamming games in multichannel cognitive radio networks. Interference modelling and management for cognitive radio. Pdf jamming mitigation in cognitive radio networks using a. For example, the method detects the communication impairment, performs a sweep to locate a direction of the source of the communication impairment, wherein the sweep is performed in response to the detecting the communication. The jammer can either send jamming signals continuously on a speci.
Jamming and anti jamming techniques are well studied in wireless networks with hd and obfd devices see 9, 10 and therein references. We then analyze various jamming attack strategies where the jammer spends various powers in order to jam various transmission slots of the cognitive. We assume an adversary has gained full control of a cog. Cognitive radio networks, like xgs xmax system, represent an innovative approach to wireless engineering in which radios are designed with an unprecedented level of intelligence and agility cognitive radios are able to monitor, sense, and detect the conditions of their operating environment, and dynamically. Cognitive radio networks cr are one of the enabling technologies for future communication and networking 1. Cognitive radio networks crns which are intelligent networks that adapt to changes in their environments to make a better use of the radio spectrum. Survey of security issues in cognitive radio networks. Jamming mitigation in cognitive radio networks ieee journals. Depending upon the location of the jammer, jamming can equally impact surfacetosurface and surfacetoairspace paths. Mimobased jamming resilient communication in wireless. In this paper, we study detectors that can be potentially used to discover the radio signals that control the roadside bombs. Charles clancy, senior member, ieee abstractcrucial to the successful deployment of cognitive. Jammingaware randomized spectrum sharing in cognitive radio. Stackelberg game approach to cognitive radio network with.
The game players have different intents and asymmetric and hierarchical information about the frequency spectrum which are modeled as three different types of players. Cognitive radio jamming mitigation using markov decision process and reinforcement learning. An antijamming stochastic game for cognitive radio. Virginia polytechnic institute and state university, blacksburg, va, usa utah state university, logan, ut, usa abstractreactive jamming is considered the most powerful jamming attack as the attack ef. Jammingaware randomized spectrum sharing in cognitive. In this paper, we conduct a crosslayer analysis of both the jamming capability of the cognitiveradiobased jammers and the antijamming capability of the cognitive radio networks \crn\. Multiagent jammingresilient control channel game for. Cognitive radio jamming mitigation using markov decision process.
Swarms of multiband, reconfigurable cognitive radio cr technology with fast channel switching and real time spectrum sensing capabilities have been identified as candidates for multichannel jamming electronic attacks ea. The relationship between cr operating parameters and the resulting cr. Charles clancy, senior member, ieee abstractcrucial to the successful deployment of cognitive radio networks, security issues. Markov model based jamming and anti jamming performance analysis for cognitive radio networks author. Reinforcement learning for reactive jamming mitigation 15. Game for cognitive radio ad hoc networks brandon f. Cognitive radio networks crns allow coexistence of unlicensed users uus and licensed users lus and hence, mutual interference between uus and lus is neither ignored nor considered as gaussiandistributed quantity. Crosslayer jamming detection and mitigation in wireless broadcast networks. The proposed algorithm is based on wideband spectrum. This technology allows the coexistence and sharing of licensed. Cr networks have been developed for improving and optimizing the radio electromagnetic spectrum, by combining two main characteristics. Jamming and anti jamming techniques in wireless networks.
Jamming ack attack to wireless networks and a mitigation approach zhiguo zhang jingqi wu jing deng meikang qiu. The jamming attack is one of the most severe threats in cognitive radio networks, because it can lead to network degradation and even denial of service. The authors in developed a defense strategy, combining fh and rate adaption techniques. J zhu, securityreliability tradeoff for cognitive radio networks in the presence of eavesdropping attack. Jamming ack attack to wireless networks and a mitigation approach. Deploying cognitive radio networks raises several open issues and security concerns.
In this paper, an overview of the cognitive radio networks and their security challenges will be provided. Jamming mitigation in cognitive radio networks using a modified q. Index termscognitive radio networks, primary user emulation attack, energy harvesting, wireless security. However, a cognitive radio can exploit its ability of dynamic spectrum access and its learning capabilities to avoid jammed channels. Defence against responsive and nonresponsive jamming attack in. Crns suffer from both classical wireless networks vulnerabilities and threats, and new threats related to their inherent functionalities. Past demonstrations have shown that a single cr can be deployed in an ea on 802. Rao general audience abstract wireless communications have evolved continuously over the last four decades in order to meet the everincreasing number of users.
Antijamming defense in cognitive radio networks radio jamming is a denial of service dos attack which targets at disrupting communications at the physical and link layers of a wireless network. The relationship between cr operating parameters and the resulting crprimary interference is investigated. However, security issues pertaining to cognitive radio technology are still an understudied topic. Jamming attacks are a subset of denial of service dos attacks in. This paper deals with the jamming attack which may hinder the cognitive radio from efficiently exploiting the spectrum. Because of the proliferation of wireless technologies, jamming in wireless networks has become a major research problem due to the ease in blocking communication in wireless networks.
Cognitive radio network, jamming attack, qlearning algorithm. Markov model based jamming and antijamming performance. The jamming mitigation technique we develop uses the packet delivery ratio. The probability of each possible next sate, s, given the current state s and action a. Instead of using the traditional cryptographic approaches 2 to combat the malicious users, we consider the informationtheoretic secrecy. Achieving rf jamming with dsaenabled cognitive radio. Jamming mitigation in cognitive radio networks article pdf available in ieee network 273. With the growing multiplicity, security challenges have become more sophisticated and multidirectional in different aspects 16.
Cognitive radio networks crns are recognized as the enabling technology for improving future bandwidth utilization. Antijamming communication in cognitive radio networks with. The basic idea of the cr networks is to identify the. The cognitive radio technology is a promising solution to the imbalance between scarcity and under utilization of the spectrum. Responsive communication jamming detector with noise power fluctuation using cognitive radio mohsen m. Rd pietro, g oligeri, jamming mitigation in cognitive radio networks. Crns help solve the problem of spectrum shortage by allowing unlicensed users to use primary systems without interference. Multichannel jamming attacks using cognitive radios. The jammers can be classii ed according to the following criteria.
Below we only discuss the papers that are most related to our work in terms of attack model and defense strategies. Citeseerx document details isaac councill, lee giles, pradeep teregowda. Reinforcement learning for reactive jamming mitigation 219 in rl, the environment is typically formulated as a mdp, which is a way to model decision making in situations where outcomes are partially random and partially under the control of the decision maker. May 24, 2012 the performance indices include data rate, covertness, jamming, and anti jamming. Crosslayer jamming detection and mitigation in wireless. However, this technology is susceptible to both classical and advanced jamming attacks which can prevent it from the efficient exploitation of the free frequency bands. The probability density functions of crprimary interference are derived for cr networks adopting di. The jamming attack can be done by a single jammer or in a coordinated way between several jammers to gain more knowledge about the network and to ef. Reliabilitysecurity tradeoff analysis of cognitive radio. Intelligent cognitive radio jamming a gametheoretical.
Jamming attack health care cognitive radio networks ns2. Research on electronic warfare ew and jamming dates to world war ii, an era when jammers needed to be categorized by signal type, because each signal type had to be constructed from distinct radio circuitry. Citeseerx jamming mitigation in cognitive radio networks. In addition, the cognitive radio network is vulnerable to new attacks based on. Cognitive radio networks crn can play a vital role in accom plishing ubiquitous. Cognitive radio network, jamming attack, qlearning algorithm 1. The crn is based on ieee wireless regional area network wran. Anti jamming defense in cognitive radio networks radio jamming is a denial of service dos attack which targets at disrupting communications at the physical and link layers of a wireless network. Ieee network magazine, special issue on security in cognitive radio networks. Power control with reinforcement learning in cooperative. Markov model based jamming and antijamming performance analysis for cognitive radio networks author.
Antijamming communication in cognitive radio networks with unknown channel statistics qian wang, kui ren, and peng ning department of ece, illinois institute of technology, email. An antijamming stochastic game for cognitive radio networks. Akyildiz broadband wireless networking laboratory, school of electrical and computer engineering georgia institute of technology, atlanta, ga 30332 email. Skoglund, multiphase smart relaying and cooperative jamming in secure cognitive radio networks, ieee transactions on cognitive communications and networking, vol. For example, the authors in 18 investigated the optimal transmission and energy harvesting policy to maximize the secondary network throughput in a cognitive radio network, where the secondary users opportunistically access the spectrum or harvest energy from. We analyze the vulnerability of existing spectrum access protocols under jamming attacks, formulate the antijamming problem as a nonstochastic mab problem and propose the. Antijamming communication in cognitive radio networks. One of the prevailing such issues are intelligent radio frequency rf jamming attacks, where adversaries are able to exploit onthefly reconfigurability potentials and learning mechanisms of cognitive. Engineering school of engineering, discipline of electrical, electronic and computer engineering university of kwazulunatal, durban, south africa august 2014 supervisor. Jamming attack on inband fullduplex communications.
Perspectives of jamming, mitigation and pattern adaptation of. Primary user emulation attack mitigation in cognitive radio networks by efe francis orumwense submitted in completion of the academic requirements for the degree of m. We propose a realtime reinforcement learning algorithm based on qlearning to proactively avoid jammed channels. International conference on cognitive radio oriented wireless networks and communications, may, 2008. Cognitive radio cr promises to be a solution for the spectrum underutilization problems. Us9288007b2 endpoint device antenna beam forming based. Security issues and threats in cognitive radio networks.
Cognitive radio jamming mitigation using markov decision. Cooperative qlearning based channel selection for cognitive. Introduction cognitive radio cr technology is recognized as an intelligent radio that is able of learning and recon. Additionally, exploiting jamming signals to purposely interfere with signal reception of eavesdroppers is a feasible solution to improve security performance of. Furthermore, cognitive radio networks crns are characterized by dynamic spectrum access dsa and by mainly distributed architectures which make it dii.
Introduction cognitiveradiocr networking1,2isa promising technique to solve the spectrum scarcity problem and has attracted a lot of research interest in recent years. Responsive communication jamming detector with noise power. Jamming mitigation in cognitive radio networks using. We derive the stackelberg equilibrium of the anti jamming power control game. We model the problem of channel selection as a markov decision process. Further, we illustrate the need of careful engineering with security checks while designing the cognitive radio networks. The attacker may be external users or secondary users. Jamming mitigation in cognitive radio networks using a. Spectrum sensing, interference mitigation, and localization mobile communications kandeepan sithamparanathan, andrea giorgetti on. Then, we model the cognitive radio behavior in the suspicious environment as a markov decision process. Jamming ack attack to wireless networks and a mitigation. Spectrum sensing, interference mitigation, and localization mobile communications. Jorswieck dresden university of technology due to the broadcast nature of wireless networks, communications are potentially subject to attacks, such as passive eavesdropping or active jamming. Perspectives of jamming, mitigation and pattern adaptation of ofdm pilot signals for the evolution of wireless networks raghunandan m.
The proposed algorithm is based on wideband spectrum sensing and a greedy policy to learn. Pdf jamming mitigation in cognitive radio networks using. Abstractthe jamming attack is one of the most severe threats in cognitive radio networks, because it can lead to network degradation and even denial of service. A layered approach to cognitive radio network security. One of the prevailing such issues are intelligent radio frequency rf jamming attacks, where adversaries are able to exploit onthefly reconfigurability potentials and.
612 156 1454 417 568 534 1028 733 28 434 362 1120 630 371 735 1340 1137 1496 1418 435 136 48 1343 1542 1236 1413 1048 751 1516 1277 1348 1264 1034 1260 357 1322 210 637 1004 1111 76 192 949