首页> 外文期刊>IEEE transactions on information forensics and security >Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities
【24h】

Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities

机译:面对干扰攻击时的带宽扫描旨在减少频谱机会

获取原文
获取原文并翻译 | 示例
       

摘要

Unutilized spectra, i.e., spectrum holes, are opportunities that may be used for communication or adapting other services that use radio frequency (RF). Such opportunities can also represent an adversarial target, if his objective is to block the RF system from using such opportunities opened by spectrum holes. In this paper, we explore the challenge of finding spectrum holes in an adversarial environment. First, by means of a simple model, we show that an adversary’s attack designed to close spectrum holes can be more harmful for the spectrum holes than just random jamming. This calls for designing a scanning strategy to detect such an attack. Second, by applying a game-theoretical model, we design the optimal scanning strategy to detect such attacks. In particular, we show the efficiency of such a scanning strategy compared with uninformed random scanning. This efficiency is achieved by focusing scanning efforts on the bands that will be more likely under attack, and neglecting less promising bands. Beyond the benefits, though, such a strategy has also drawbacks since, if the adversary has a different objective, such as sneaking usage of the spectrum, he can sneak usage undetected by using the bands neglected by such specially tuned scanning. To deal with this problem, third, we suggest to combine this strategy with a strategy that maximizes detection probability in a learning algorithm that updates the beliefs about the adversary’s objective. The convergence of the combined algorithm is proven.
机译:未利用的频谱,即频谱空洞,是可用于通信或改编使用射频(RF)的其他服务的机会。如果他的目标是阻止RF系统使用频谱漏洞带来的此类机会,那么这些机会也可以代表对抗目标。在本文中,我们探讨了在对抗性环境中寻找频谱漏洞的挑战。首先,通过一个简单的模型,我们证明了旨在关闭频谱漏洞的对手攻击可能对频谱漏洞的危害要大于随机干扰。这要求设计一种扫描策略来检测这种攻击。其次,通过应用博弈论模型,我们设计了最佳的扫描策略来检测此类攻击。特别是,我们展示了这种扫描策略与不知情的随机扫描相比的效率。通过将扫描工作重点放在更有可能受到攻击的频段上,而忽略前景较差的频段,可以实现这种效率。但是,除了好处之外,这种策略也有缺点,因为如果对手有不同的目标(例如偷偷使用频谱),他可以通过使用这种经过特殊调谐的扫描而忽略的频段来发现偷偷使用的方法。为了解决这个问题,第三,我们建议将这种策略与一种最大化检测概率的策略结合起来,该算法采用一种学习算法来更新有关对手目标的信念。证明了组合算法的收敛性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号