Denial of service attacks in cognitive radio networks through channel eviction triggering

Shabnam Sodagari, Alireza Attar, Victor C.M. Leung, Sven G. Bilen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Abstract

Security issues associated with successful operation of cognitive radio networks (CRNs) recently are gaining a lot of attention. In this paper we focus on a specific class of Denialof-Service attack that is executed through Channel Eviction Triggering (CET), whereby the adversary nodes unduly invoke mechanisms inherent in CRN operation to protect the licensed users and thus disrupt secondary access to the otherwise idle licensed bands. Skewing the spectrum sensing decision of a CRN through sensing mis-reports is a manifestation of CET attacks. Whereas most studies in the literature focus on making the cooperative sensing more robust against such sensing misreports, we tackle the problem from an incentive perspective and develop strategies to minimize the utility difference of truthful and cheating cognitive radios so as to alleviate the incentive of mis-reporting. Our numerical results verify the effectiveness of the proposed CET defense scheme.

Original languageEnglish (US)
Title of host publication2010 IEEE Global Telecommunications Conference, GLOBECOM 2010
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781424456383
DOIs
StatePublished - 2010
Event53rd IEEE Global Communications Conference, GLOBECOM 2010 - Miami, FL, United States
Duration: Dec 6 2010Dec 10 2010

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Other

Other53rd IEEE Global Communications Conference, GLOBECOM 2010
Country/TerritoryUnited States
CityMiami, FL
Period12/6/1012/10/10

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Denial of service attacks in cognitive radio networks through channel eviction triggering'. Together they form a unique fingerprint.

Cite this