...
首页> 外文期刊>Network Science and Engineering, IEEE Transactions on >Hide and Seek: A Markov-Based Defense Strategy Against Off-Sensing Attack in Cognitive Radio Networks
【24h】

Hide and Seek: A Markov-Based Defense Strategy Against Off-Sensing Attack in Cognitive Radio Networks

机译:隐藏并寻求:基于马尔可夫的防御战略,免受认知无线电网络的禁区攻击

获取原文
获取原文并翻译 | 示例

摘要

In a cognitive radio-based network (CRN), secondary users (SUs) opportunistically access underutilized spectrum resources and stop utilizing these resources when licensed or primary users (PUs) reappear. However, this way of opportunistic spectrum access is susceptible to novel vulnerabilities. Recently, a new attack, off-sensing (OS), has shed light on a vulnerability in the Federal Communications Commission (FCC) policy of CRN, which affects the channel utilization of the victim SU by creating an illusion of a PU's presence. However, prior work on OS-attack considers a deterministic approach that is unrealistic and is futile to fortify against conventional defense techniques. In this paper, we propose a new random approach, the random-OS attack, which adapts to realistic scenarios and is difficult to detect using conventional techniques. Then, we model the interaction between the victim SU and attackers as a stochastic zero-sum Markov game and propose a novel safeguard approach based on the Markov decision process to defend the proposed attack, namely hide and seek. Finally, we introduce an OS-attack detection strategy, which utilizes the sensing history to detect the presence of attackers without violating any policy or design constraints and without any networking overhead. Mathematical analysis and extensive simulation results exhibit the superior performance of our proposed work and advent a direction in designing safeguard strategies without amending the current FCC policies.
机译:在基于认知无线电基网络(CRN)中,辅助用户(SUS)机会访问未充分利用的频谱资源,并在许可或主用户(PU)重新出现时使用这些资源。然而,这种机会主义频谱访问方式易于新颖的漏洞。最近,一个新的攻击,偏见感应(OS),在CRN的联邦通信委员会(FCC)政策中阐明了一个脆弱性,这影响了受害者苏的渠道利用,通过创造普的存在幻觉。然而,对OS攻击的事先工作考虑了一个确定性的方法,这是不现实的,并且难以防止传统的防御技术。在本文中,我们提出了一种新的随机方法,随机OS攻击,适应现实场景,并且难以使用传统技术检测。然后,我们将受害者和攻击者之间的互动模拟作为随机零和马尔可夫游戏,并提出了一种基于马尔可夫决策过程的新型保障方法,以捍卫建议的攻击,即隐藏和寻求。最后,我们介绍了一种操作系统攻击检测策略,它利用传感历史来检测攻击者的存在,而无需违反任何策略或设计限制,没有任何网络开销。数学分析和广泛的仿真结果表现出我们所提出的工作的卓越表现,并在不修改当前的FCC政策的情况下在不修改的情况下在设计方面的方向上进行。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号