Visible to the public Evaluating physical-layer security for secondary users in cognitive radio systems with attackers

TitleEvaluating physical-layer security for secondary users in cognitive radio systems with attackers
Publication TypeConference Paper
Year of Publication2017
AuthorsRawat, D. B., Malomo, O., Bajracharya, C., Song, M.
Conference NameMILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)
Date Publishedoct
ISBN Number978-1-5386-0595-0
KeywordsBandwidth, Cognitive Radio Security, Interference, jamming, pubcrawl, Radio frequency, Resiliency, security, Sensors, Wireless communication
Abstract

Cognitive radio network (CRN) is regarded as an emerging technology for better spectrum efficiency where unlicensed secondary users (SUs) sense RF spectrum to find idle channels and access them opportunistically without causing any harmful interference to licensed primary users (PUs). However, RF spectrum sensing and sharing along with reconfigurable capabilities of SUs bring severe security vulnerabilities in the network. In this paper, we analyze physical-layer security (secrecy rates) of SUs in CRN in the presence of eavesdroppers, jammers and PU emulators (PUEs) where SUs compete not only with jammers and eavesdroppers who are trying to reduce SU's secrecy rates but also against PUEs who are trying to compel the SUs from their current channel by imitating the behavior of PUs. In addition, a legitimate SU competes with other SUs with a sharing attitude for dynamic spectrum access to gain a high secrecy rate, however, the malicious users (i.e., attackers) attempt to abuse the channels egotistically. The main contribution of this work is the design of a game theoretic approach to maximize utilities (that is proportional to secrecy rates) of SUs in the presence of eavesdroppers, jammers and PUEs. Furthermore, SUs use signal energy and cyclostationary feature detection along with location verification technique to detect PUEs. As the proposed approach is generic and considers different attackers, it can be particularized to a situation with eavesdroppers only, jammers only or PUEs only while evaluating physical-layer security of SUs in CRN. We evaluate the performance of the proposed approach using results obtained from simulations. The results show that the proposed approach outperforms other existing methods.

URLhttps://ieeexplore.ieee.org/document/8170855
DOI10.1109/MILCOM.2017.8170855
Citation Keyrawat_evaluating_2017