首页> 外文期刊>IEEE Journal on Selected Areas in Communications >You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing
【24h】

You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing

机译:您可以阻塞但不能隐藏:防御地理位置数据库驱动的频谱共享的干扰攻击

获取原文
获取原文并翻译 | 示例
       

摘要

The emerging paradigm for dynamic spectrum sharing is based on allowing secondary users (SUs) to exploit white space frequency that is not occupied by primary users. White space database provides an opportunity for SUs to obtain spectrum availability information by submitting a location-based query. However, this new paradigm can also be exploited by the attackers to significantly enhance their jamming capability due to the available channel information from spectrum queries, which is expected to increasingly block SUs. The challenge is that the unique characteristics (e.g., lack of the wide range frequencies or continuous broadband) make existing anti-jamming techniques (e.g., direct-sequence spread spectrum and frequency hopping spread spectrum) difficult to be applied. In this paper, we present a novel Jammer Inference-based Jamming Defense (jDefender) framework. The main idea of jDefender is inferring the likelihood of a user being a jammer based on the observed jamming events and then utilizing the inferred attack likelihood to enhance the effectiveness of a series of the proposed anti-jamming strategies. Specifically, we first propose the Channel Allocation-based Jammer Inference scheme to infer the likelihood of an SU being a jammer based on the channels occupied by SUs even under the collusion attack performed by multiple jammers. The strength of the anti-jamming strategies (e.g., puzzle difficulties, available spectrum resources) will be correlated with the possibility of an SU being a jammer to achieve the tradeoff between system performance and jamming tolerance. We then implement the proposed scheme on Universal Software Radio Peripheral and PC. Extensive evaluations are performed to validate the effectiveness of the attacks and countermeasures.
机译:动态频谱共享的新兴范例基于允许次要用户(SU)利用主要用户不占用的空白频率。空白空间数据库为SU提供了机会,可以通过提交基于位置的查询来获取频谱可用性信息。然而,由于来自频谱查询的可用信道信息,攻击者也可以利用这种新的范式来显着增强其干扰能力,这有望越来越多地阻塞SU。挑战在于,独特的特性(例如,缺少宽频率或连续宽带)使得现有的抗干扰技术(例如,直接序列扩频和跳频扩频)难以应用。在本文中,我们提出了一个新颖的基于干扰推理的干扰防御(jDefender)框架。 jDefender的主要思想是基于观察到的干扰事件来推断用户成为干扰者的可能性,然后利用推断出的攻击可能性来增强一系列建议的抗干扰策略的有效性。具体而言,我们首先提出基于信道分配的干扰推断方案,即使在多个干扰者执行的共谋攻击下,也可以基于SU占用的信道来推断SU成为干扰者的可能性。抗干扰策略的强度(例如,难题,可用频谱资源)将与SU成为干扰器以在系统性能和干扰容忍度之间进行权衡的可能性有关。然后,我们在通用软件无线电外围设备和PC上实施建议的方案。进行了广泛的评估,以验证攻击和对策的有效性。

著录项

  • 来源
    《IEEE Journal on Selected Areas in Communications》 |2016年第10期|2723-2737|共15页
  • 作者单位

    Department of Computer Science and Engineering, Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China;

    Department of Computer Science and Engineering, Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China;

    Department of Computer Science and Engineering, University of South Florida, Tampa, FL, USA;

    Department of Automation, Shanghai Jiao Tong University, Shanghai, China;

    Department of Computer Science and Engineering, Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai, China;

    Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Jamming; Databases; Sensors; White spaces; Cognitive radio; Spread spectrum communication; Channel allocation;

    机译:干扰;数据库;传感器;空白;认知无线电;扩频通信;信道分配;
  • 入库时间 2022-08-18 01:22:55

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号