CFP last date
20 May 2024
Reseach Article

An Effective Primary user Authentication Mechanism for Denial of Service Attack in Cognitive Radio Networks

Published on November 2014 by Christo Reegan Raj. V, Sabitha. R M.e., Karthikha.c
International Conference on Innovations in Information, Embedded and Communication Systems
Foundation of Computer Science USA
ICIIECS - Number 1
November 2014
Authors: Christo Reegan Raj. V, Sabitha. R M.e., Karthikha.c
26467e61-a119-4b3f-8039-5ed1db302b28

Christo Reegan Raj. V, Sabitha. R M.e., Karthikha.c . An Effective Primary user Authentication Mechanism for Denial of Service Attack in Cognitive Radio Networks. International Conference on Innovations in Information, Embedded and Communication Systems. ICIIECS, 1 (November 2014), 28-33.

@article{
author = { Christo Reegan Raj. V, Sabitha. R M.e., Karthikha.c },
title = { An Effective Primary user Authentication Mechanism for Denial of Service Attack in Cognitive Radio Networks },
journal = { International Conference on Innovations in Information, Embedded and Communication Systems },
issue_date = { November 2014 },
volume = { ICIIECS },
number = { 1 },
month = { November },
year = { 2014 },
issn = 0975-8887,
pages = { 28-33 },
numpages = 6,
url = { /proceedings/iciiecs/number1/18651-1442/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations in Information, Embedded and Communication Systems
%A Christo Reegan Raj. V
%A Sabitha. R M.e.
%A Karthikha.c
%T An Effective Primary user Authentication Mechanism for Denial of Service Attack in Cognitive Radio Networks
%J International Conference on Innovations in Information, Embedded and Communication Systems
%@ 0975-8887
%V ICIIECS
%N 1
%P 28-33
%D 2014
%I International Journal of Computer Applications
Abstract

The vacant or under-utilized TV bands are resourcefully operated by Cognitive Radio permitted IEEE 802. 22 Wireless Regional Area Networks (WRAN). Conversely due to the nature of cognitive radio networks and absence of active security protocols, the IEEE 802. 22 networks are exposed to several Denial of Service (DoS) threats. In this work the target band for DoS attack is a particular band called as Most User Band which has maximum number of operators between the existing sub bands in the CR network. A primary user authentication system created on the spreading of "helper" nodes, motionless within the geographic area of the CRN. Our system works on a mixture of physical-layer signatures (link signatures) and cryptographic mechanisms to regularly sense PU action and pass data to the CRN. We suggest a countermeasure strategy (Time concealment strategy), to counter the MUB attack. Simulation results are provided to establish the efficiency of the proposed MUB attack and TCS with attack time control for more survival improvement of secondary nodes.

References
  1. J. Mitola and G. Maguire, "Cognitive radio: making software radios more personal," IEEE Personal Commun. , vol. 6, 1999.
  2. S. Arkoulis, L. Kazatzopoulos, C. Delakouridis, and G. F. Marias, "Cognitive spectrum and its security issue," 2008 International Conference on Next Generation Mobile Applications, Services and Technologies.
  3. J. L. Burbank, "Security in cognitive radio network: the required evolution in approaches to the wireless network security," 2009 International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
  4. T. C. Clancy and N. Goergen, "Security in cognitive radio network: threat and mitigation," 2008 International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
  5. R. Chen, J. M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE J. Sel. Areas Commun. , vol. 26, pp. 25–37, 2008.
  6. Y. Zhang, G. Xu, and X. Geng, "Security threats in cognitive radio networks," 2008 IEEE International Conference on High Performance Computing and Communications.
  7. T. X. Brown and A. Sethi, "Potential cognitive radio denial of service attacks and remedies," 2007 International Symposium on Advanced Radio Technologies.
  8. W. Wang, "Denial of service attacks in cognitive radio networks," 2010 International Conference on Environmental Science and Information Application Technology.
  9. C. Cordeiro, K. Challapali, D. Birru, and N. S. Shankar, "IEEE 802. 22: the first worldwide wireless standard based on cognitive radios," 2005 IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
  10. H. Li and Z. Han, "Dogfight in spectrum: jamming and anti-jamming in multichannel cognitive radio systems," 2009 IEEE Global Telecommunications Conference.
  11. L. Wang and Y. Wang, "Method for security enhancement of cognitive radio system," 2009 International Symposium on Intelligent Ubiquitous Computing and Education.
  12. J. Ma, Y. Zhong, and S. Zhang, "Frequency-hopping based secure schemes in sensornets," 2005 International Conference on Computer and Information Technology.
  13. K. Bian and J. -M. Park, "Security vulnerabilities in IEEE 802. 22," 2008 International Wireless Internet Conference.
  14. Z. Jin, S. Anand, and K. Subbalakshmi, "Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing," ACM Mobile Computing and Commun. Rev. , vol. 13, 2009.
  15. K. Whitehouse, C. Karlof, and D. Culler, "A practical evaluation of radio signal strength for ranging-based localization," ACM Mobile Computing and Commun. Rev. , vol. 11, 2007.
  16. N. Li and P. Li, "A range-free localization scheme in wireless sensor networks," 2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop.
  17. Y. Chen, W. Trappe, and R. P. Martin, "Attack detection in wireless localization," 2007 IEEE International Conference on Computer Communications.
  18. I. Akyildiz, W. Lee, M. Vuran, and S. Mohanty. NeXt generation/ dynamic spectrum access/cognitive radio wireless networks: a survey. Computer Networks, 50(13):2127–2159, 2006.
  19. H. Kim and K. Shin. In-band spectrum sensing in cognitive radio networks: energy detection or feature detection? In Proceedings of MOBICOM, pages 14–25, 2008.
  20. B. Wild and K. Ramchandran. Detecting primary receivers for cognitive radio applications. In Proceedings of IEEE DySPAN, pages 124–130, 2005.
  21. Q. Yuan, P. Tao, W. Wenbo, and Q. Rongrong. Cyclostationarity based spectrum sensing for wideband cognitive radio. In Proceedings of the WRI International Conference on Communications and Mobile Computing, volume1, 2009.
  22. N. Patwari and S. Kasera. Robust location distinction using temporal link signatures. In Proceedings of MOBICOM, page 122, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Cognitive Radio Most User Band Attack Denial Of Service Attack Interference Authentication