SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3,No. 6,December 2013

SURVEY ON LINK LAYER ATTACKS IN COGNITIVE
RADIO NETWORKS
S.Rajalakshmi and K.Saravanan
Dept of Computer Science Engineering, Erode Sengunthar Engg College, India

ABSTRACT
Cognitive Radio Network (CRNs) is a novel technology for improving the future bandwidth utilization.
CRNs have many security threats due its opportunistic exploitation of the bandwidth. Each layer of the
CRNs consisting of several attacks starting from the physical layer and moving up to the transport layer.
This paper concentrates on the Link layer attacks. The future work uses Signature based Authentication
Coded Intrusion Detection Scheme to detect the Byzantine attack. It works in asynchronous system like
Internet and incorporates optimization to improve detection response time.

KEYWORDS
COGNITIVE RADIO NETWORK (CRN), BYZANTINE ATTACK, FUSION CENTRE, MESSAGE AUTHENTICATION CODE(MAC).

1. INTRODUCTION
Due to increasing demand of the spectrum, because of the explosive growth of wireless services,
the Federal Communication Commission (FCC) has approved the unlicensed users to access the
unused portion of the licensed band. This feature makes the Cognitive Radio Network.
A cognitive radio network is an intelligent radio that can be programmed and configured
dynamically. Its transceiver is designed to use the best wireless channels in its vicinity. Such a
radio automatically detects available channels in wireless spectrum, then accordingly changes
its transmission or reception parameters to allow more concurrent wireless communications in a
given spectrum band at one location. This process is a form of dynamic spectrum management.
Due to this dynamic nature there are many security threats in CRN. In this we present a solution
to detect the link layer attacks such as spectrum sensing data falsification also known as
Byzantine attack. As there is an IDS for the detection of attacks in physical layer, we then move
on to the next layer i.e. link layer attacks. The Byzantines are the attackers and they produce a
false spectrum sensing result to the secondary user and do not allow the unlicensed user to use the
free spectrum band. This is also one of the Denials of service attack (DoS), so to detect this type
of Byzantine attack signature based Authentication Coded Intrusion Detection Scheme is
employed.

2. CATEGORIES OF THREATS IN CRN
The threats in CRN are categorized based on their layers. The physical layer attacks are of
primary user emulation (PUE) attack, Objective Function attack and jamming attack. The link
layer attacks comprise of spectrum sensing data falsification attack and Denial of service attack.
The attacks against the network layer are sinkhole attack and HELLO flood attacks. Transport
layer consisting of the Lion attack.
DOI : 10.5121/ijcseit.2013.3602

9
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3,No. 6,December 2013

3. DEFENDING AGAINST LINK LAYER ATTACK
Many data fusion techniques were proposed to detect the Spectrum Sensing Data Falsification
(SSDF) Attack.
In [2], a Decision fusion technique is proposed in which all local spectrum-sensing results are
collected and summed then it is compared to a threshold to detect an attack. Threshold value will
be in between 1 and the number of sensing terminals If the sum is greater than or equal to the
threshold then the result will be “Busy” i.e., it denotes the presence of the primary user.
Otherwise, the result will be “free” i.e., it denotes the absence of the primary user. The major
drawback in this is using of fixed thresholds. In this a problem is increasing and decreasing the
threshold has major impact on the decision. Moreover, the method is ineffective in many
scenarios that include multiple attackers.
In [3] Weighted Sequential Ratio Test (WSRT) is used and the Solution is composed of 2 steps: a
reputation maintenance step and the actual hypothesis test. In the reputation maintenance step
initially every node is assigned with the reputation value equal to zero, upon each correct
spectrum report the reputation value gets increased by one. The second step is based on the
Sequential Probability Ratio Test [4]. Unlike the ordinary SPRT this WSRT approach uses a trust
based data fusion schemes. The drawback that exists here is there is no analytical studies have
been conducted, but performance is good.
In [5] a Weight based fusion scheme is used to encounter the malicious node which transmits
false sensing signals. It uses trust approach and pre-filtering techniques. Permanent malicious
nodes are usually of two types such as, “Always Yes” and the “Always No”. The “always Yes”
type advertises the presence of the primary user and thus increasing the probability of false alarm.
The other type “Always No” advertises the absence of the primary user and thus decreasing the
probability of detection. This approach mainly concentrates on the pr-filtering of the data to
identify the malicious user and assigning the trust factor to each user. It shows good performance
result.
In [6] a Detection mechanism that runs in the fusion center. The fusion center identifies the
attackers by counting mismatches between their local decision and the global decision and
removes them from the data fusion process. It is robust against Byzantine attack and removes the
Byzantines in a very short time span, but it works only when a centralized fusion center exists.
In [7] a Bayesian detection mechanism that requires the knowledge of priori conditional
probabilities of the local spectrum sensing result and also the knowledge of priori conditional
probabilities of the final sensing result. There are several combination cases exist between these
two cases either correct or wrong and cost are assigned. A large cost is assigned to the wrong
ones and a small cost is assigned to the correct ones. Then the overall cost is calculated by sum of
all the costs weighted by the probabilities of the corresponding cases. The major drawback is that
when there is an SSDF attacker the prior knowledge becomes not trustworthy, and thus the
suggested detection mechanism becomes no longer optimal in terms of minimizing the overall
cost.
In [8] the Neyman-Pearson Test is proposed that does not require the priori probabilities of final
sensing or any cost associated with each decision case. It needs to define either maximum
acceptable probability of false alarm or a maximum acceptable probability of miss detection. The
other probability is minimized and the defined probability is acceptable. But, it still requires a
priori conditional probabilities of the local sensing.
10
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3,No. 6,December 2013

In [9] a detection mechanism is used to detect the malicious user and it is based on the past
reports. This algorithm detects the suspicious level of the secondary user based on their past
reports. It calculates the trust values and the consistency values. Trust value indicator can
effectively differentiate honest and the malicious secondary user. When a user turns bad then the
trust value indicator reduces the trust value. If the user behaves badly for few times then after a
large number of good behaviors the trust value gets increased. If the bad behavior is consistent
then it is impossible to recover. The major drawback is that the scheme cannot be applied to
multiple malicious users’ scenario.

4. TABLE
Table 1. Link Layer Threats, Countermeasures and Evaluations

Threats
Spectrum Sensing
Data Falsification
(Byzantine attack)

Countermeasures

Evaluation

Decision fusion technique
where all collected local
spectrum-sensing results are
summed and compared to a
threshold to detect an attack
[2]

The major drawback is in
using fixed thresholds. In
this
particular
countermeasure increasing
and
decreasing
the
threshold has major impact
on the decision. Moreover,
the method is ineffective in
many
scenarios
that
include multiple attackers

Weighted Sequential Ratio
Test [3]

Solution is composed of 2
steps:
a
reputation
maintenance step and the
actual hypothesis test. No
analytical studies have
been
conducted,
but
performance is good.

Weight based fusion scheme
[5]

Uses trust approach and
pre-filtering techniques.
Shows good performance.

Detection mechanism that
runs in the fusion center [6]

The fusion center identifies
the attackers and removes
them from the data fusion
process. Only works when
a centralized fusion center
exists.

Detection mechanism that
requires a priori knowledge

The major drawback is
that
the
a
priori
knowledge becomes not
11
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3,No. 6,December 2013

[7]

trustworthy when a
network is under SSDF
attack, and thus the
suggested
detection
mechanism becomes no
longer optimal in terms
of
minimizing
the
overall cost

Neyman-Pearson Test
[8]

Works by defining either a
maximum
acceptable
probability of false alarm
or a maximum acceptable
probability
of
miss
detection. It still requires a
priori
conditional
probabilities of the local
sensing

Detection mechanism based
on trust

The major drawback is that
the scheme cannot be
applied
to
multiple
malicious users’ scenario.

Control Channel
Saturation DoS Attack

Detection mechanism based
on trust [9]

The
suggested
countermeasure adapts a
trusted architecture where
any suspicious CR host
will be monitored and
evaluated by its neighbors.
A neighbor can then
perform
Sequential
Probability Ratio Test to
reach a final decision
whether it is misbehaving
or not. Its performance is
proven to be good

Selfish Channel
Negotiation

Detection mechanism based
on trust [9]

Same
countermeasure
suggested for Control
Channel Saturation DoS
Attack works for this
attack.

5. CONCLUSION
Signature based Authentication detects byzantine Attacks generated by malicious users and it
reject false sensed data. It also reduces incorrect sensing results.CRN is less vulnerable to
intrusion generated by Byzantine attacks and improves intrusion detection performance gain.

12
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3,No. 6,December 2013

FUTURE WORK
The Proposed system uses a Signature based Authentication Coded Intrusion Detection Scheme
to combat Byzantine Attacks in Cognitive Radio Networks. It works in asynchronous systems
like the Internet and it incorporates optimizations to improve detection response time.
Optimization replaces public-key signatures by vectors of message authentication codes during its
normal operation and overcomes fundamental limitation on power of message authentication
codes. Authentication has two orders of magnitude faster and providing the same level of
security. Message authentication codes (MAC) uses a symmetric cryptography to authenticate
communication between two parties and shares a secret session key during the communication.
Sender of a message m computes a small bit string function of m and this is the key it shares with
the receiver. It then appends the string (MAC) to the message.
The receiver check the authenticity by computing the MAC in the same way and then comparing
it to the one appended to the message. To compute MAC each replica and each (active) client
shares a secret session key with each replica. Actually a pair of session keys for each pair of
replicas. Each replica has secret session key for each client that is used for communication in both
directions. Rather than a single session key it use a pair of keys for communication between
replicas and also to allow replicas to change independently. These keys are use to verify incoming
messages.

REFERENCES
[1]

[2]
[3]

[4]

[5]

[6]

[7]
[8]

[9]

Zubair Md.Fadlullah, Hiroki Nishiyama, and Nei Kato,Tohoku University Mostafa M.Foda, (2013),
“Intrusion Detection System (IDS) for combating attacks in cognitive radio networks”, IEEE network,
vol. 27, pp.51-56.
A. Pandharipande et al., (2005), IEEE P802.22 “Wireless RANs: Technology Proposal Package for
IEEE 802.22”, IEEE 802.22 WG on WRANs.
Ruiliang Chen, Jung-Min Park, Y. Thomas Hou and Jeffrey H. Reed, (2008), “Toward Secure
Distributed Spectrum Sensing in Cognitive Radio Networks”, IEEE Communications Magazine,
Vol.46, pp.50-55.
Yeelin Shei and Y. T. Su, (2008), “A Sequential Test Based Cooperative Spectrum Sensing Scheme
for Cognitive Radios”, IEEE 19th International Symposium on Personal, Indoor and Mobile Radio
Communications (PIMRC 2008), pp.1-5.
Praveen Kaligineedi, Majid Khabbazian and Vijay Bhargava. K , (2008), “Secure Cooperative
Sensing Techniques for Cognitive Radio Systems”, IEEE International Conference on
Communications (ICC), Beijing, China, pp.3406-3410.
Ankit Rawat, Priyank Anand, Hao Chen and Pramod Varshney, (2010), “Countering Byzantine
Attacks in Cognitive Radio Networks”, 2010 IEEE International Conference on Acoustics Speech and
Signal Processing (ICASSP), Dallas, TX, pp.3098-3101.
Linjun Lu, Soo-Young Chang et al., (2006), “Technology Proposal Clarifications for IEEE 802.22
WRAN Systems”, IEEE 802.22 WG on WRANs.
Joerg Hillenbrand, Timo Weiss and Friedrich K. Jondral, “Calculation of Detection and False Alarm
Probabilities in Spectrum Pooling Systems”, IEEE Communication Letters, Vol.9, No.4, 2005,
pp.349-351.
Wenkai Wang, Husheng Li, Yan Sun and Zhu Han, (2009), “Attack-Proof Collaborative Spectrum
Sensing in Cognitive Radio Networks”, 43rd Annual Conference on Information Sciences and
Systems, 2009 (CISS 2009), Baltimore, pp.130-134.

13

More Related Content

What's hot

Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONSECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainIJCI JOURNAL
 
A Study on -Risk Aware Mitigation for MANET Routing Attacks
A Study on -Risk Aware Mitigation for MANET Routing AttacksA Study on -Risk Aware Mitigation for MANET Routing Attacks
A Study on -Risk Aware Mitigation for MANET Routing AttacksIRJET Journal
 
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...IJNSA Journal
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...swathi78
 
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionMulti Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionIJNSA Journal
 
DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1IJITE
 
EFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDS
EFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDSEFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDS
EFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDSIJNSA Journal
 
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...LeMeniz Infotech
 
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A ReviewIRJET Journal
 
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET Journal
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
 
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...IJNSA Journal
 

What's hot (15)

Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONSECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
 
A Study on -Risk Aware Mitigation for MANET Routing Attacks
A Study on -Risk Aware Mitigation for MANET Routing AttacksA Study on -Risk Aware Mitigation for MANET Routing Attacks
A Study on -Risk Aware Mitigation for MANET Routing Attacks
 
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionMulti Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
 
DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1
 
EFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDS
EFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDSEFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDS
EFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDS
 
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
 
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A Review
 
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart Grid
 
06558266
0655826606558266
06558266
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
 
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
 

Similar to SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS

International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKSSURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKSijcseit
 
A NOVEL ALERT CORRELATION TECHNIQUE FOR FILTERING NETWORK ATTACKS
A NOVEL ALERT CORRELATION TECHNIQUE FOR FILTERING NETWORK ATTACKSA NOVEL ALERT CORRELATION TECHNIQUE FOR FILTERING NETWORK ATTACKS
A NOVEL ALERT CORRELATION TECHNIQUE FOR FILTERING NETWORK ATTACKSIJNSA Journal
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityijcsa
 
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkAlert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkIJRES Journal
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LogicMindtech Nologies
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...1crore projects
 
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...IRJET Journal
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...ijcsit
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques IJMER
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYJournal For Research
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyberAttack detection and prevention in the cyber
Attack detection and prevention in the cyberJahangirnagar University
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Networkijircee
 
METRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMS
METRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMSMETRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMS
METRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMSIJNSA Journal
 
FLOODING ATTACKS DETECTION OF MOBILE AGENTS IN IP NETWORKS
FLOODING ATTACKS DETECTION OF MOBILE AGENTS IN IP NETWORKSFLOODING ATTACKS DETECTION OF MOBILE AGENTS IN IP NETWORKS
FLOODING ATTACKS DETECTION OF MOBILE AGENTS IN IP NETWORKScsandit
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Drjabez
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Drjabez
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET Journal
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyIOSR Journals
 

Similar to SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS (20)

International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKSSURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
 
A NOVEL ALERT CORRELATION TECHNIQUE FOR FILTERING NETWORK ATTACKS
A NOVEL ALERT CORRELATION TECHNIQUE FOR FILTERING NETWORK ATTACKSA NOVEL ALERT CORRELATION TECHNIQUE FOR FILTERING NETWORK ATTACKS
A NOVEL ALERT CORRELATION TECHNIQUE FOR FILTERING NETWORK ATTACKS
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application security
 
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkAlert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
 
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyberAttack detection and prevention in the cyber
Attack detection and prevention in the cyber
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Network
 
METRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMS
METRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMSMETRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMS
METRICS FOR EVALUATING ALERTS IN INTRUSION DETECTION SYSTEMS
 
FLOODING ATTACKS DETECTION OF MOBILE AGENTS IN IP NETWORKS
FLOODING ATTACKS DETECTION OF MOBILE AGENTS IN IP NETWORKSFLOODING ATTACKS DETECTION OF MOBILE AGENTS IN IP NETWORKS
FLOODING ATTACKS DETECTION OF MOBILE AGENTS IN IP NETWORKS
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 

SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS

  • 1. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3,No. 6,December 2013 SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS S.Rajalakshmi and K.Saravanan Dept of Computer Science Engineering, Erode Sengunthar Engg College, India ABSTRACT Cognitive Radio Network (CRNs) is a novel technology for improving the future bandwidth utilization. CRNs have many security threats due its opportunistic exploitation of the bandwidth. Each layer of the CRNs consisting of several attacks starting from the physical layer and moving up to the transport layer. This paper concentrates on the Link layer attacks. The future work uses Signature based Authentication Coded Intrusion Detection Scheme to detect the Byzantine attack. It works in asynchronous system like Internet and incorporates optimization to improve detection response time. KEYWORDS COGNITIVE RADIO NETWORK (CRN), BYZANTINE ATTACK, FUSION CENTRE, MESSAGE AUTHENTICATION CODE(MAC). 1. INTRODUCTION Due to increasing demand of the spectrum, because of the explosive growth of wireless services, the Federal Communication Commission (FCC) has approved the unlicensed users to access the unused portion of the licensed band. This feature makes the Cognitive Radio Network. A cognitive radio network is an intelligent radio that can be programmed and configured dynamically. Its transceiver is designed to use the best wireless channels in its vicinity. Such a radio automatically detects available channels in wireless spectrum, then accordingly changes its transmission or reception parameters to allow more concurrent wireless communications in a given spectrum band at one location. This process is a form of dynamic spectrum management. Due to this dynamic nature there are many security threats in CRN. In this we present a solution to detect the link layer attacks such as spectrum sensing data falsification also known as Byzantine attack. As there is an IDS for the detection of attacks in physical layer, we then move on to the next layer i.e. link layer attacks. The Byzantines are the attackers and they produce a false spectrum sensing result to the secondary user and do not allow the unlicensed user to use the free spectrum band. This is also one of the Denials of service attack (DoS), so to detect this type of Byzantine attack signature based Authentication Coded Intrusion Detection Scheme is employed. 2. CATEGORIES OF THREATS IN CRN The threats in CRN are categorized based on their layers. The physical layer attacks are of primary user emulation (PUE) attack, Objective Function attack and jamming attack. The link layer attacks comprise of spectrum sensing data falsification attack and Denial of service attack. The attacks against the network layer are sinkhole attack and HELLO flood attacks. Transport layer consisting of the Lion attack. DOI : 10.5121/ijcseit.2013.3602 9
  • 2. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3,No. 6,December 2013 3. DEFENDING AGAINST LINK LAYER ATTACK Many data fusion techniques were proposed to detect the Spectrum Sensing Data Falsification (SSDF) Attack. In [2], a Decision fusion technique is proposed in which all local spectrum-sensing results are collected and summed then it is compared to a threshold to detect an attack. Threshold value will be in between 1 and the number of sensing terminals If the sum is greater than or equal to the threshold then the result will be “Busy” i.e., it denotes the presence of the primary user. Otherwise, the result will be “free” i.e., it denotes the absence of the primary user. The major drawback in this is using of fixed thresholds. In this a problem is increasing and decreasing the threshold has major impact on the decision. Moreover, the method is ineffective in many scenarios that include multiple attackers. In [3] Weighted Sequential Ratio Test (WSRT) is used and the Solution is composed of 2 steps: a reputation maintenance step and the actual hypothesis test. In the reputation maintenance step initially every node is assigned with the reputation value equal to zero, upon each correct spectrum report the reputation value gets increased by one. The second step is based on the Sequential Probability Ratio Test [4]. Unlike the ordinary SPRT this WSRT approach uses a trust based data fusion schemes. The drawback that exists here is there is no analytical studies have been conducted, but performance is good. In [5] a Weight based fusion scheme is used to encounter the malicious node which transmits false sensing signals. It uses trust approach and pre-filtering techniques. Permanent malicious nodes are usually of two types such as, “Always Yes” and the “Always No”. The “always Yes” type advertises the presence of the primary user and thus increasing the probability of false alarm. The other type “Always No” advertises the absence of the primary user and thus decreasing the probability of detection. This approach mainly concentrates on the pr-filtering of the data to identify the malicious user and assigning the trust factor to each user. It shows good performance result. In [6] a Detection mechanism that runs in the fusion center. The fusion center identifies the attackers by counting mismatches between their local decision and the global decision and removes them from the data fusion process. It is robust against Byzantine attack and removes the Byzantines in a very short time span, but it works only when a centralized fusion center exists. In [7] a Bayesian detection mechanism that requires the knowledge of priori conditional probabilities of the local spectrum sensing result and also the knowledge of priori conditional probabilities of the final sensing result. There are several combination cases exist between these two cases either correct or wrong and cost are assigned. A large cost is assigned to the wrong ones and a small cost is assigned to the correct ones. Then the overall cost is calculated by sum of all the costs weighted by the probabilities of the corresponding cases. The major drawback is that when there is an SSDF attacker the prior knowledge becomes not trustworthy, and thus the suggested detection mechanism becomes no longer optimal in terms of minimizing the overall cost. In [8] the Neyman-Pearson Test is proposed that does not require the priori probabilities of final sensing or any cost associated with each decision case. It needs to define either maximum acceptable probability of false alarm or a maximum acceptable probability of miss detection. The other probability is minimized and the defined probability is acceptable. But, it still requires a priori conditional probabilities of the local sensing. 10
  • 3. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3,No. 6,December 2013 In [9] a detection mechanism is used to detect the malicious user and it is based on the past reports. This algorithm detects the suspicious level of the secondary user based on their past reports. It calculates the trust values and the consistency values. Trust value indicator can effectively differentiate honest and the malicious secondary user. When a user turns bad then the trust value indicator reduces the trust value. If the user behaves badly for few times then after a large number of good behaviors the trust value gets increased. If the bad behavior is consistent then it is impossible to recover. The major drawback is that the scheme cannot be applied to multiple malicious users’ scenario. 4. TABLE Table 1. Link Layer Threats, Countermeasures and Evaluations Threats Spectrum Sensing Data Falsification (Byzantine attack) Countermeasures Evaluation Decision fusion technique where all collected local spectrum-sensing results are summed and compared to a threshold to detect an attack [2] The major drawback is in using fixed thresholds. In this particular countermeasure increasing and decreasing the threshold has major impact on the decision. Moreover, the method is ineffective in many scenarios that include multiple attackers Weighted Sequential Ratio Test [3] Solution is composed of 2 steps: a reputation maintenance step and the actual hypothesis test. No analytical studies have been conducted, but performance is good. Weight based fusion scheme [5] Uses trust approach and pre-filtering techniques. Shows good performance. Detection mechanism that runs in the fusion center [6] The fusion center identifies the attackers and removes them from the data fusion process. Only works when a centralized fusion center exists. Detection mechanism that requires a priori knowledge The major drawback is that the a priori knowledge becomes not 11
  • 4. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3,No. 6,December 2013 [7] trustworthy when a network is under SSDF attack, and thus the suggested detection mechanism becomes no longer optimal in terms of minimizing the overall cost Neyman-Pearson Test [8] Works by defining either a maximum acceptable probability of false alarm or a maximum acceptable probability of miss detection. It still requires a priori conditional probabilities of the local sensing Detection mechanism based on trust The major drawback is that the scheme cannot be applied to multiple malicious users’ scenario. Control Channel Saturation DoS Attack Detection mechanism based on trust [9] The suggested countermeasure adapts a trusted architecture where any suspicious CR host will be monitored and evaluated by its neighbors. A neighbor can then perform Sequential Probability Ratio Test to reach a final decision whether it is misbehaving or not. Its performance is proven to be good Selfish Channel Negotiation Detection mechanism based on trust [9] Same countermeasure suggested for Control Channel Saturation DoS Attack works for this attack. 5. CONCLUSION Signature based Authentication detects byzantine Attacks generated by malicious users and it reject false sensed data. It also reduces incorrect sensing results.CRN is less vulnerable to intrusion generated by Byzantine attacks and improves intrusion detection performance gain. 12
  • 5. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3,No. 6,December 2013 FUTURE WORK The Proposed system uses a Signature based Authentication Coded Intrusion Detection Scheme to combat Byzantine Attacks in Cognitive Radio Networks. It works in asynchronous systems like the Internet and it incorporates optimizations to improve detection response time. Optimization replaces public-key signatures by vectors of message authentication codes during its normal operation and overcomes fundamental limitation on power of message authentication codes. Authentication has two orders of magnitude faster and providing the same level of security. Message authentication codes (MAC) uses a symmetric cryptography to authenticate communication between two parties and shares a secret session key during the communication. Sender of a message m computes a small bit string function of m and this is the key it shares with the receiver. It then appends the string (MAC) to the message. The receiver check the authenticity by computing the MAC in the same way and then comparing it to the one appended to the message. To compute MAC each replica and each (active) client shares a secret session key with each replica. Actually a pair of session keys for each pair of replicas. Each replica has secret session key for each client that is used for communication in both directions. Rather than a single session key it use a pair of keys for communication between replicas and also to allow replicas to change independently. These keys are use to verify incoming messages. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] Zubair Md.Fadlullah, Hiroki Nishiyama, and Nei Kato,Tohoku University Mostafa M.Foda, (2013), “Intrusion Detection System (IDS) for combating attacks in cognitive radio networks”, IEEE network, vol. 27, pp.51-56. A. Pandharipande et al., (2005), IEEE P802.22 “Wireless RANs: Technology Proposal Package for IEEE 802.22”, IEEE 802.22 WG on WRANs. Ruiliang Chen, Jung-Min Park, Y. Thomas Hou and Jeffrey H. Reed, (2008), “Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks”, IEEE Communications Magazine, Vol.46, pp.50-55. Yeelin Shei and Y. T. Su, (2008), “A Sequential Test Based Cooperative Spectrum Sensing Scheme for Cognitive Radios”, IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2008), pp.1-5. Praveen Kaligineedi, Majid Khabbazian and Vijay Bhargava. K , (2008), “Secure Cooperative Sensing Techniques for Cognitive Radio Systems”, IEEE International Conference on Communications (ICC), Beijing, China, pp.3406-3410. Ankit Rawat, Priyank Anand, Hao Chen and Pramod Varshney, (2010), “Countering Byzantine Attacks in Cognitive Radio Networks”, 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), Dallas, TX, pp.3098-3101. Linjun Lu, Soo-Young Chang et al., (2006), “Technology Proposal Clarifications for IEEE 802.22 WRAN Systems”, IEEE 802.22 WG on WRANs. Joerg Hillenbrand, Timo Weiss and Friedrich K. Jondral, “Calculation of Detection and False Alarm Probabilities in Spectrum Pooling Systems”, IEEE Communication Letters, Vol.9, No.4, 2005, pp.349-351. Wenkai Wang, Husheng Li, Yan Sun and Zhu Han, (2009), “Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks”, 43rd Annual Conference on Information Sciences and Systems, 2009 (CISS 2009), Baltimore, pp.130-134. 13