SlideShare a Scribd company logo
1 of 20
Download to read offline
A
Seminar
on
Byzantine Attack & Defence
in
Conginitive Radio Network
August 25, 2015Chandramohansharma.cms@gmail.com
Guided By Presented By
Dr. Sandip Chakraborty Chandra Mohan Sharma
Assitant Professor IIT Kharagpur 15CS60D04, M. Tech. Ist Year
IIT Kharagpur
August 25, 2015Chandramohansharma.cms@gmail.com
Outline
1. Cognitive Radio
2. Evolution of radios
3. Cognitive Radio Network
4. Congnitive Radio Key Terms
5. Byzantine Attack
6. Byzantine Attack Models
7. Byzantine Defence
7. Byzantine Defence Models
8. Conclusion
IIT Kharagpur
COGNITIVE RADIO
A Cognitive Radio is an intelligent radio which is aware of its environment,
adapt its own parametes according to environment to optimise communication.
A conginitve radio
Detect/Sense
Adapt/Reconfigure
Use
Cooperate
A congnitive radio function as autonomous unit in the communication
environment, exchage information about the environment with the network it
access and other CR in the network.
August 25, 2015Chandramohansharma.cms@gmail.com IIT Kharagpur
EVOLUTION OF RADIO
1. Hardware driven radios:
Transmit & Recieve frequencies, modulation & demodulation
type and other radio frequency (RF) parameters are determined
by hardware and cannot be changed. Recieve frequencies can
be tuned/changed within the range using electro-mechanical
tuner.
2. Digital radios:
Digital radios are able to performs part of the signal processing
or transmission electronically, but these are not configurable in
the field.
3. Software Defined Radios:
All transmitter & reciever parameters, modes and applications
can be configured and reconfigured by Software. But these
cannot adapt according to environment
4. Congnitive radios:
These radios are able to sense their environment & can adapt
accordingly to perform operations.
August 25, 2015Chandramohansharma.cms@gmail.com IIT Kharagpur
COGNITIVE RADIO NETWORK
August 25, 2015Chandramohansharma.cms@gmail.com
In some licensed bands such as
GSM bands there is a large number
of user, spectrum is highly utilized
& now they cannot support more
users.
While in some licensed dedicated
bands such TV, defense bands
there is low utilization.
So the cognitive radios
(Secondary User) can be deployed
to use licensed bands in
cooperation with the Primary User
(PU)
IIT Kharagpur
COGNITIVE RADIO TERMINOLGY
1. Primary User (PU):
Primary User is the user of the spectrum which have obtained regulatory
permission/license to operate in that spectrum band.
2. Secondary User (SU):
Secondary user is the unlicensed user which uses the spectrum band in cooperation with
the primary user.
3. Spectrum Sensing:
Spectrum sensing is the term associated with detection of all wireless channel that are
available to use in the vicinity of secondary user.
4. Cooperative Spectrum Sensing (CSS):
It is the spectrum sensing scheme in which CRs shares spectrum information with each
other.
5. Data Falsification:
Data Falsification means reporting of wrong data about the different parameters by a CR in
the network.
August 25, 2015Chandramohansharma.cms@gmail.com IIT Kharagpur
BYZANTINE ATTACK
Byzantine Attack means Spectrum Sensing Data Falsification Attack (SSDF)
Byzantine Attack
Insider attack on Physical layer
Occurs in process of CSS
Objective of Byzantine attacker
Vandalism Objective: Interference to primary user
Exploitation Objective: Exclusion of idle channel
August 25, 2015Chandramohansharma.cms@gmail.com IIT Kharagpur
BYZANTINE ATTACK PARAMETERS
Characterstic of Byzantine attack is the flexibility and diversity
August 25, 2015Chandramohansharma.cms@gmail.com
Byzantine attack classified on the basis
of four parameters
1. Attack Scenario: where to attack?
2. Attack Basis: how to attack?
3. Attack Oppurtunity: when to attack?
4. Attack Population: who to attack?
Fig: Taxonomy of Byzantine Attack
IIT Kharagpur
BYZANTINE ATTACK MODELS
August 25, 2015Chandramohansharma.cms@gmail.com
1. Centralized Independent
Probabilistic Small-Scale (CIPS)
Attack
P( X'm
= Xm
+ ∆|Xm
< η) = α0
P( X'm
= Xm
- ∆|Xm
> η) = α1
2. Centralized Dependent
Probabilistic Small-Scale
(CDPS)Attack
Fig: CIPS
Fig: CDPS
IIT Kharagpur
BYZANTINE ATTACK MODELS
August 25, 2015Chandramohansharma.cms@gmail.com
1. Centralized Dependent Non
Probabilistic Small-Scale (CDNS)
Attack
2. Decentralized Independent
Probabilistic Small-Scale
(DIPS)Attack
Fig: CDNS
Fig: DIPS
IIT Kharagpur
BYZANTINE DEFENCE
August 25, 2015Chandramohansharma.cms@gmail.com
Byzantine Defence Objective
– Find out Byzantine attackers
– Mitigate negative effect of falsified sensing report
Byzantine Defence is based on wireless channel characterstic
Byzantine Defence Algorithm can be classified as
– Homogeneous Sensing Scenario
• Global Decision
• Mean
• Underlying Distribution
• Utility
– Heterogenous Sensing Scenario
• Propogation Model Based
• Likelyhood Detection Based
IIT Kharagpur
BYZANTINE DEFENCE
August 25, 2015Chandramohansharma.cms@gmail.com
Global Decision Based Defence:
In this, the fusion center(FC) uses deviation of global decision and local decision of SUs
to detect attackers from the honest ones
δi(t) = deviation between
global & local decision
Ao = null hypothesis that
there exists no malicious user
A1 = alternate hypothesis
K = Number of SU
PB, PH = probability of
inconsistency of Byzantine or
honest SU
IIT Kharagpur
BYZANTINE DEFENCE
August 25, 2015Chandramohansharma.cms@gmail.com
Mean-Based Defence:
In this, mean value of SU reports are used to find out the outliers with large deviations.
Robust statistics is essential for the success of this method. Different techniques
are used to find consistent statistics. The below mention method take advantage
of fluctions in the robust statistics.
K is the sensing slot
IIT Kharagpur
BYZANTINE DEFENCE
August 25, 2015Chandramohansharma.cms@gmail.com
Underlying Distribution-Based Defence:
This scheme uses the fact that in homogenous environment, the report of SU must obey
the same distribution. So some metric representing the distribution may be extracted from
the SU reports.
Assuming that the true spectrum is Markovian, some metrics are derived to detect the
malicious users.
are metrics of honest users
IIT Kharagpur
BYZANTINE DEFENCE
August 25, 2015Chandramohansharma.cms@gmail.com
Utility-Based Defence:
In this scheme, instead of identifying the attacker, all SU are guided to report honest
reports by use of penalties and incentives of the system.
U = utility before the attack
Û = utility after the attack
IIT Kharagpur
BYZANTINE DEFENCE
August 25, 2015Chandramohansharma.cms@gmail.com
Propogation Model-Based Defence:
In Propogation Model-Based Defence, deviations in the SUs sensing result can be
mapped using difference in channel characterstics. But falsified reports can deviates from
this mapping. This relation is used to find the malicious users.
β = fading factor of channel
d = distance between PU and
SU
degree of similarity in SU reports is proportional to the distance gap |di - dj|, i ≠ j
IIT Kharagpur
BYZANTINE DEFENCE
August 25, 2015Chandramohansharma.cms@gmail.com
Likelihood Detection-Based Defence:
The FC use prior knowledge to calculate probability of SU being malicious using hisotry
reports of SU. The Bayesian approach is used to find the probability.
To find mutiple malicious users, the onion peeling and belief propogation approach is
used.
In an alternate approach, SUs are divided into classes based on detection & false
alarm probabilties
Class parameters are estimated using iterative expectation maximization algorithm
Malicious users are detected using the class parameters
Likelihood Detection is powerful against CIPS attacks
Tn = M denotes n-th SU is malicious and Ft is all observation of t sensing slots
IIT Kharagpur
BYZANTINE DEFENCE
August 25, 2015Chandramohansharma.cms@gmail.com
Fig: Depicts deferent defence algorithms usefulness against the model of attack
IIT Kharagpur
Conclusion
August 25, 2015Chandramohansharma.cms@gmail.com
CRN is the new rodio technology that can provide optimum utilization of
the scarce spectrum resource
Spectrum Sensing is essential for existense of the CRN
CRN cannot be successfully adopted till there are robust alogrithms are
available for mitigating the risk of Byzantine attacks
Byzantine attack and defence is like an interactive game of Spear & Shield
between the different stakeholders.
Ref: Linyuan Zhang, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han & Jinlong Wang, “Byzantine Attack and Defense in Cognitive Radio
Networks: A Survey” IEEE Communication Surveys & Tutorials, 2015
IIT Kharagpur
August 25, 2015Chandramohansharma.cms@gmail.com
Thank You...
IIT Kharagpur

More Related Content

What's hot

Cognitive radio
Cognitive radioCognitive radio
Cognitive radioNeha Singh
 
Cognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationCognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationIffat Anjum
 
Cognitive radio network
Cognitive radio networkCognitive radio network
Cognitive radio networkSuhad Malayshi
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networksVatsala Sharma
 
Stat of the art in cognitive radio
Stat of the art in cognitive radioStat of the art in cognitive radio
Stat of the art in cognitive radioMohsen Tantawy
 
M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network Shashank Narayan
 
Study of admission and control system in a Centralized Cognitive Radio Network
Study of admission and control system in a Centralized Cognitive Radio NetworkStudy of admission and control system in a Centralized Cognitive Radio Network
Study of admission and control system in a Centralized Cognitive Radio Networkfaskone
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Ameer Sameer
 
Cognitive Radio Network
Cognitive Radio Network Cognitive Radio Network
Cognitive Radio Network Dr Praveen Jain
 
Cognitive Radio
Cognitive Radio Cognitive Radio
Cognitive Radio RiyaSaini16
 
Cognitive Radio For Smart Grid
Cognitive Radio For Smart GridCognitive Radio For Smart Grid
Cognitive Radio For Smart Gridyasser hassen
 
Cognitive-Radio-Sensor-Network
Cognitive-Radio-Sensor-NetworkCognitive-Radio-Sensor-Network
Cognitive-Radio-Sensor-NetworkSatyaki Mitra
 

What's hot (19)

Cognitive radio
Cognitive radioCognitive radio
Cognitive radio
 
Cognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationCognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentation
 
Cognitive radio network
Cognitive radio networkCognitive radio network
Cognitive radio network
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
CR (1)
CR (1)CR (1)
CR (1)
 
Stat of the art in cognitive radio
Stat of the art in cognitive radioStat of the art in cognitive radio
Stat of the art in cognitive radio
 
M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 
Study of admission and control system in a Centralized Cognitive Radio Network
Study of admission and control system in a Centralized Cognitive Radio NetworkStudy of admission and control system in a Centralized Cognitive Radio Network
Study of admission and control system in a Centralized Cognitive Radio Network
 
Qual2
Qual2Qual2
Qual2
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...
 
Cognitive Radio Network
Cognitive Radio Network Cognitive Radio Network
Cognitive Radio Network
 
27. cognitive radio
27. cognitive radio27. cognitive radio
27. cognitive radio
 
Cognitive Radio
Cognitive Radio Cognitive Radio
Cognitive Radio
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 
Cognitive radio (1)
Cognitive radio (1)Cognitive radio (1)
Cognitive radio (1)
 
What is Cognitive Radio?
What is Cognitive Radio? What is Cognitive Radio?
What is Cognitive Radio?
 
Cognitive Radio For Smart Grid
Cognitive Radio For Smart GridCognitive Radio For Smart Grid
Cognitive Radio For Smart Grid
 
Cognitive-Radio-Sensor-Network
Cognitive-Radio-Sensor-NetworkCognitive-Radio-Sensor-Network
Cognitive-Radio-Sensor-Network
 

Viewers also liked

Viewers also liked (9)

Trends in communication technology
Trends in communication technologyTrends in communication technology
Trends in communication technology
 
Eero Mäkinen
Eero MäkinenEero Mäkinen
Eero Mäkinen
 
EMBARQ India - Talking Transit August 2012 - APSRTC
EMBARQ India - Talking Transit August 2012 - APSRTCEMBARQ India - Talking Transit August 2012 - APSRTC
EMBARQ India - Talking Transit August 2012 - APSRTC
 
Evolution Of Television
Evolution Of TelevisionEvolution Of Television
Evolution Of Television
 
Communication then & now
Communication then & nowCommunication then & now
Communication then & now
 
History of radio
History of radioHistory of radio
History of radio
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
 
Evolution of mass media
Evolution of mass mediaEvolution of mass media
Evolution of mass media
 
Evolution of communication technology
Evolution  of  communication  technologyEvolution  of  communication  technology
Evolution of communication technology
 

Similar to Byzantine Attack & Defense in Cognitive Radio Network

DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...IAEME Publication
 
Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
Attacks in Cognitive Radio Networks (CRN)   A Survey.pdfAttacks in Cognitive Radio Networks (CRN)   A Survey.pdf
Attacks in Cognitive Radio Networks (CRN) A Survey.pdfYolanda Ivey
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733SIVA SASTHRI
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDSiva Sasthri
 
Malicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksMalicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksTELKOMNIKA JOURNAL
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyberAttack detection and prevention in the cyber
Attack detection and prevention in the cyberJahangirnagar University
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...IRJET Journal
 
Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...IJECEIAES
 
Endangered Species Conservation
Endangered Species ConservationEndangered Species Conservation
Endangered Species ConservationIRJET Journal
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio IJECEIAES
 
Collaborative cyclostationary spectrum sensing for cognitive radio systems
Collaborative cyclostationary spectrum sensing for cognitive radio systemsCollaborative cyclostationary spectrum sensing for cognitive radio systems
Collaborative cyclostationary spectrum sensing for cognitive radio systemskareenavolt
 
IRJET - Network Selection and Spectrum Handoff based on Adaptive Weights in C...
IRJET - Network Selection and Spectrum Handoff based on Adaptive Weights in C...IRJET - Network Selection and Spectrum Handoff based on Adaptive Weights in C...
IRJET - Network Selection and Spectrum Handoff based on Adaptive Weights in C...IRJET Journal
 
IRJET- Cooperative Spectrum Sensing based on Adaptive Threshold for Cognitive...
IRJET- Cooperative Spectrum Sensing based on Adaptive Threshold for Cognitive...IRJET- Cooperative Spectrum Sensing based on Adaptive Threshold for Cognitive...
IRJET- Cooperative Spectrum Sensing based on Adaptive Threshold for Cognitive...IRJET Journal
 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET Journal
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Publishing House
 

Similar to Byzantine Attack & Defense in Cognitive Radio Network (20)

DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
 
Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
Attacks in Cognitive Radio Networks (CRN)   A Survey.pdfAttacks in Cognitive Radio Networks (CRN)   A Survey.pdf
Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRID
 
Malicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksMalicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio Networks
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyberAttack detection and prevention in the cyber
Attack detection and prevention in the cyber
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
 
C0363012014
C0363012014C0363012014
C0363012014
 
Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...
 
Endangered Species Conservation
Endangered Species ConservationEndangered Species Conservation
Endangered Species Conservation
 
Sub1568
Sub1568Sub1568
Sub1568
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio
 
Collaborative cyclostationary spectrum sensing for cognitive radio systems
Collaborative cyclostationary spectrum sensing for cognitive radio systemsCollaborative cyclostationary spectrum sensing for cognitive radio systems
Collaborative cyclostationary spectrum sensing for cognitive radio systems
 
IRJET - Network Selection and Spectrum Handoff based on Adaptive Weights in C...
IRJET - Network Selection and Spectrum Handoff based on Adaptive Weights in C...IRJET - Network Selection and Spectrum Handoff based on Adaptive Weights in C...
IRJET - Network Selection and Spectrum Handoff based on Adaptive Weights in C...
 
IRJET- Cooperative Spectrum Sensing based on Adaptive Threshold for Cognitive...
IRJET- Cooperative Spectrum Sensing based on Adaptive Threshold for Cognitive...IRJET- Cooperative Spectrum Sensing based on Adaptive Threshold for Cognitive...
IRJET- Cooperative Spectrum Sensing based on Adaptive Threshold for Cognitive...
 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
 
H010434655
H010434655H010434655
H010434655
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 

Recently uploaded

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 

Byzantine Attack & Defense in Cognitive Radio Network

  • 1. A Seminar on Byzantine Attack & Defence in Conginitive Radio Network August 25, 2015Chandramohansharma.cms@gmail.com Guided By Presented By Dr. Sandip Chakraborty Chandra Mohan Sharma Assitant Professor IIT Kharagpur 15CS60D04, M. Tech. Ist Year IIT Kharagpur
  • 2. August 25, 2015Chandramohansharma.cms@gmail.com Outline 1. Cognitive Radio 2. Evolution of radios 3. Cognitive Radio Network 4. Congnitive Radio Key Terms 5. Byzantine Attack 6. Byzantine Attack Models 7. Byzantine Defence 7. Byzantine Defence Models 8. Conclusion IIT Kharagpur
  • 3. COGNITIVE RADIO A Cognitive Radio is an intelligent radio which is aware of its environment, adapt its own parametes according to environment to optimise communication. A conginitve radio Detect/Sense Adapt/Reconfigure Use Cooperate A congnitive radio function as autonomous unit in the communication environment, exchage information about the environment with the network it access and other CR in the network. August 25, 2015Chandramohansharma.cms@gmail.com IIT Kharagpur
  • 4. EVOLUTION OF RADIO 1. Hardware driven radios: Transmit & Recieve frequencies, modulation & demodulation type and other radio frequency (RF) parameters are determined by hardware and cannot be changed. Recieve frequencies can be tuned/changed within the range using electro-mechanical tuner. 2. Digital radios: Digital radios are able to performs part of the signal processing or transmission electronically, but these are not configurable in the field. 3. Software Defined Radios: All transmitter & reciever parameters, modes and applications can be configured and reconfigured by Software. But these cannot adapt according to environment 4. Congnitive radios: These radios are able to sense their environment & can adapt accordingly to perform operations. August 25, 2015Chandramohansharma.cms@gmail.com IIT Kharagpur
  • 5. COGNITIVE RADIO NETWORK August 25, 2015Chandramohansharma.cms@gmail.com In some licensed bands such as GSM bands there is a large number of user, spectrum is highly utilized & now they cannot support more users. While in some licensed dedicated bands such TV, defense bands there is low utilization. So the cognitive radios (Secondary User) can be deployed to use licensed bands in cooperation with the Primary User (PU) IIT Kharagpur
  • 6. COGNITIVE RADIO TERMINOLGY 1. Primary User (PU): Primary User is the user of the spectrum which have obtained regulatory permission/license to operate in that spectrum band. 2. Secondary User (SU): Secondary user is the unlicensed user which uses the spectrum band in cooperation with the primary user. 3. Spectrum Sensing: Spectrum sensing is the term associated with detection of all wireless channel that are available to use in the vicinity of secondary user. 4. Cooperative Spectrum Sensing (CSS): It is the spectrum sensing scheme in which CRs shares spectrum information with each other. 5. Data Falsification: Data Falsification means reporting of wrong data about the different parameters by a CR in the network. August 25, 2015Chandramohansharma.cms@gmail.com IIT Kharagpur
  • 7. BYZANTINE ATTACK Byzantine Attack means Spectrum Sensing Data Falsification Attack (SSDF) Byzantine Attack Insider attack on Physical layer Occurs in process of CSS Objective of Byzantine attacker Vandalism Objective: Interference to primary user Exploitation Objective: Exclusion of idle channel August 25, 2015Chandramohansharma.cms@gmail.com IIT Kharagpur
  • 8. BYZANTINE ATTACK PARAMETERS Characterstic of Byzantine attack is the flexibility and diversity August 25, 2015Chandramohansharma.cms@gmail.com Byzantine attack classified on the basis of four parameters 1. Attack Scenario: where to attack? 2. Attack Basis: how to attack? 3. Attack Oppurtunity: when to attack? 4. Attack Population: who to attack? Fig: Taxonomy of Byzantine Attack IIT Kharagpur
  • 9. BYZANTINE ATTACK MODELS August 25, 2015Chandramohansharma.cms@gmail.com 1. Centralized Independent Probabilistic Small-Scale (CIPS) Attack P( X'm = Xm + ∆|Xm < η) = α0 P( X'm = Xm - ∆|Xm > η) = α1 2. Centralized Dependent Probabilistic Small-Scale (CDPS)Attack Fig: CIPS Fig: CDPS IIT Kharagpur
  • 10. BYZANTINE ATTACK MODELS August 25, 2015Chandramohansharma.cms@gmail.com 1. Centralized Dependent Non Probabilistic Small-Scale (CDNS) Attack 2. Decentralized Independent Probabilistic Small-Scale (DIPS)Attack Fig: CDNS Fig: DIPS IIT Kharagpur
  • 11. BYZANTINE DEFENCE August 25, 2015Chandramohansharma.cms@gmail.com Byzantine Defence Objective – Find out Byzantine attackers – Mitigate negative effect of falsified sensing report Byzantine Defence is based on wireless channel characterstic Byzantine Defence Algorithm can be classified as – Homogeneous Sensing Scenario • Global Decision • Mean • Underlying Distribution • Utility – Heterogenous Sensing Scenario • Propogation Model Based • Likelyhood Detection Based IIT Kharagpur
  • 12. BYZANTINE DEFENCE August 25, 2015Chandramohansharma.cms@gmail.com Global Decision Based Defence: In this, the fusion center(FC) uses deviation of global decision and local decision of SUs to detect attackers from the honest ones δi(t) = deviation between global & local decision Ao = null hypothesis that there exists no malicious user A1 = alternate hypothesis K = Number of SU PB, PH = probability of inconsistency of Byzantine or honest SU IIT Kharagpur
  • 13. BYZANTINE DEFENCE August 25, 2015Chandramohansharma.cms@gmail.com Mean-Based Defence: In this, mean value of SU reports are used to find out the outliers with large deviations. Robust statistics is essential for the success of this method. Different techniques are used to find consistent statistics. The below mention method take advantage of fluctions in the robust statistics. K is the sensing slot IIT Kharagpur
  • 14. BYZANTINE DEFENCE August 25, 2015Chandramohansharma.cms@gmail.com Underlying Distribution-Based Defence: This scheme uses the fact that in homogenous environment, the report of SU must obey the same distribution. So some metric representing the distribution may be extracted from the SU reports. Assuming that the true spectrum is Markovian, some metrics are derived to detect the malicious users. are metrics of honest users IIT Kharagpur
  • 15. BYZANTINE DEFENCE August 25, 2015Chandramohansharma.cms@gmail.com Utility-Based Defence: In this scheme, instead of identifying the attacker, all SU are guided to report honest reports by use of penalties and incentives of the system. U = utility before the attack Û = utility after the attack IIT Kharagpur
  • 16. BYZANTINE DEFENCE August 25, 2015Chandramohansharma.cms@gmail.com Propogation Model-Based Defence: In Propogation Model-Based Defence, deviations in the SUs sensing result can be mapped using difference in channel characterstics. But falsified reports can deviates from this mapping. This relation is used to find the malicious users. β = fading factor of channel d = distance between PU and SU degree of similarity in SU reports is proportional to the distance gap |di - dj|, i ≠ j IIT Kharagpur
  • 17. BYZANTINE DEFENCE August 25, 2015Chandramohansharma.cms@gmail.com Likelihood Detection-Based Defence: The FC use prior knowledge to calculate probability of SU being malicious using hisotry reports of SU. The Bayesian approach is used to find the probability. To find mutiple malicious users, the onion peeling and belief propogation approach is used. In an alternate approach, SUs are divided into classes based on detection & false alarm probabilties Class parameters are estimated using iterative expectation maximization algorithm Malicious users are detected using the class parameters Likelihood Detection is powerful against CIPS attacks Tn = M denotes n-th SU is malicious and Ft is all observation of t sensing slots IIT Kharagpur
  • 18. BYZANTINE DEFENCE August 25, 2015Chandramohansharma.cms@gmail.com Fig: Depicts deferent defence algorithms usefulness against the model of attack IIT Kharagpur
  • 19. Conclusion August 25, 2015Chandramohansharma.cms@gmail.com CRN is the new rodio technology that can provide optimum utilization of the scarce spectrum resource Spectrum Sensing is essential for existense of the CRN CRN cannot be successfully adopted till there are robust alogrithms are available for mitigating the risk of Byzantine attacks Byzantine attack and defence is like an interactive game of Spear & Shield between the different stakeholders. Ref: Linyuan Zhang, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han & Jinlong Wang, “Byzantine Attack and Defense in Cognitive Radio Networks: A Survey” IEEE Communication Surveys & Tutorials, 2015 IIT Kharagpur