Skip to main content
Top
Published in: Telecommunication Systems 2/2018

30-05-2017

Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks

Authors: Yaser Jararweh, Haythem A. Bany Salameh, Abdallah Alturani, Loai Tawalbeh, Houbing Song

Published in: Telecommunication Systems | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Several new attacks have been identified in CRNs such as primary user emulation, dynamic spectrum access (DSA), and jamming attacks. Such types of attacks can severely impact network performance, specially in terms of the over all achieved network throughput. In response to that, intrusion detection system (IDS) based on anomaly and signature detection is recognized as an effective candidate solution to handle and mitigate these types of attacks. In this paper, we present an intrusion detection system for CRNs (CR-IDS) using the anomaly-based detection (ABD) approach. The proposed ABD algorithm provides the ability to effectively detect the different types of CRNs security attacks. CR-IDS contains different cooperative components to accomplish its desired functionalities which are monitoring, feature generation and selection, rule generation, rule based system, detection module, action module, impact analysis and learning module. Our simulation results show that CR-IDS can detect DSA attacks with high detection rate and very low false negative and false positive probabilities.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bany Salameh, H., Kasasbeh, H., & Harb, B. (2016). A batch-based MAC design with simultaneous assignment decisions for improved throughput in guard-band-constrained cognitive networks. IEEE Transactions on Communications, 64(3), 1143–1152.CrossRef Bany Salameh, H., Kasasbeh, H., & Harb, B. (2016). A batch-based MAC design with simultaneous assignment decisions for improved throughput in guard-band-constrained cognitive networks. IEEE Transactions on Communications, 64(3), 1143–1152.CrossRef
2.
go back to reference Bany Salameh, H. (2016). Efficient resource allocation for multi-cell heterogeneous cognitive networks with varying spectrum availability. IEEE Transactions on Vehicular Technology, 65(8), 6628–6635.CrossRef Bany Salameh, H. (2016). Efficient resource allocation for multi-cell heterogeneous cognitive networks with varying spectrum availability. IEEE Transactions on Vehicular Technology, 65(8), 6628–6635.CrossRef
3.
go back to reference Parvin, S., Hussain, F., Hussain, O., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691–1708.CrossRef Parvin, S., Hussain, F., Hussain, O., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691–1708.CrossRef
4.
go back to reference Zargar, S. T., Weiss, M. B. H., Caicedo, C. E., & Joshi, J. B. D. (2009). Security in dynamic spectrum access systems: A Survey. In Telecommunications policy research conference Arlington. Zargar, S. T., Weiss, M. B. H., Caicedo, C. E., & Joshi, J. B. D. (2009). Security in dynamic spectrum access systems: A Survey. In Telecommunications policy research conference Arlington.
5.
go back to reference Newman, T., Clancy, T., McHenry, M., & Reed, J. (2010). Case study: Security analysis of a dynamic spectrum access radio system. In IEEE global communications conference. Newman, T., Clancy, T., McHenry, M., & Reed, J. (2010). Case study: Security analysis of a dynamic spectrum access radio system. In IEEE global communications conference.
6.
go back to reference Zhang, X., & Li, C. (2009). The security in cognitive radio networks: A survey. IWCMC’09, Leipzig. Zhang, X., & Li, C. (2009). The security in cognitive radio networks: A survey. IWCMC’09, Leipzig.
7.
go back to reference Holcomb, S., & Rawat, D. B. (2016). Recent security issues on cognitive radio networks: A survey. SoutheastCon 2016 (pp. 1–6). Norfolk. Holcomb, S., & Rawat, D. B. (2016). Recent security issues on cognitive radio networks: A survey. SoutheastCon 2016 (pp. 1–6). Norfolk.
8.
go back to reference Liu, S., Chen, Y., Trappe, W., & Greenstein, L. (2009). ALDO: An anomaly detection framework for dynamic spectrum access networks. In The IEEE Infocom conference. Liu, S., Chen, Y., Trappe, W., & Greenstein, L. (2009). ALDO: An anomaly detection framework for dynamic spectrum access networks. In The IEEE Infocom conference.
9.
go back to reference Clancy, T., & Goergen, N. (2008). Security in cognitive radio networks: Threats and mitigation. In Conference on cognitive radio oriented wireless networks and communications. Clancy, T., & Goergen, N. (2008). Security in cognitive radio networks: Threats and mitigation. In Conference on cognitive radio oriented wireless networks and communications.
10.
go back to reference Al-Nashif, Y., Kumar, A., Hariri, S., Luo, Y., Szidarovsky, F., & Qu, G. (2008). Multi-level intrusion detection system (ML-IDS). In The 5th IEEE international conference on autonomic computing (ICAC’08). Al-Nashif, Y., Kumar, A., Hariri, S., Luo, Y., Szidarovsky, F., & Qu, G. (2008). Multi-level intrusion detection system (ML-IDS). In The 5th IEEE international conference on autonomic computing (ICAC’08).
11.
go back to reference Chen, R., Park, J.-M., & Reed, J. (2007). Defense against primary user emulation attacks in cognitive radio networks. In National science foundation under grants CNS-0627436 and CNS-0716208. Chen, R., Park, J.-M., & Reed, J. (2007). Defense against primary user emulation attacks in cognitive radio networks. In National science foundation under grants CNS-0627436 and CNS-0716208.
12.
go back to reference Federal Communications Commission. (2004). Unlicensed operation in the TV broadcast bands and additional spectrum for unlicensed devices. In Below 900 MHz in the 3GHz band, ET Docket. Federal Communications Commission. (2004). Unlicensed operation in the TV broadcast bands and additional spectrum for unlicensed devices. In Below 900 MHz in the 3GHz band, ET Docket.
13.
go back to reference Wu, Y., Wang, B., & Liu, K. (2010). Optimal defense against jamming attacks in cognitive radio networks using the Markov decision process approach. In IEEE globecom conference. Wu, Y., Wang, B., & Liu, K. (2010). Optimal defense against jamming attacks in cognitive radio networks using the Markov decision process approach. In IEEE globecom conference.
14.
go back to reference Hlavacek, D., & Chang, J. M. (2014). A layered approach to cognitive radio network security: A survey. Computer Networks, 75, 414–436.CrossRef Hlavacek, D., & Chang, J. M. (2014). A layered approach to cognitive radio network security: A survey. Computer Networks, 75, 414–436.CrossRef
15.
go back to reference Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and Countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 17 (2), 1023–1043. Second quarter 2015. Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and Countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 17 (2), 1023–1043. Second quarter 2015.
16.
go back to reference Marinho, J., Granjal, J., & Monteiro, E. (2015). A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP Journal on Information Security, 2015(1), 1–14.CrossRef Marinho, J., Granjal, J., & Monteiro, E. (2015). A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP Journal on Information Security, 2015(1), 1–14.CrossRef
17.
go back to reference Khasawneh, M., & Agarwal, A. (2014). A survey on security in cognitive radio networks. In Proceedings of the 6th international conference on computer science and information technology (CSIT), 2014 (pp. 64–70). IEEE. Khasawneh, M., & Agarwal, A. (2014). A survey on security in cognitive radio networks. In Proceedings of the 6th international conference on computer science and information technology (CSIT), 2014 (pp. 64–70). IEEE.
18.
go back to reference Jianwu, L., Zebing, F., Zhiyong, F., & Ping, Z. (2015). A survey of security issues in cognitive radio networks. China Communications, 12(3), 132–150.CrossRef Jianwu, L., Zebing, F., Zhiyong, F., & Ping, Z. (2015). A survey of security issues in cognitive radio networks. China Communications, 12(3), 132–150.CrossRef
19.
go back to reference Ling, M. H., Yau, K.-L. A., & Poh, G. S. (2014). Trust and reputation management in cognitive radio networks: A survey. Security and Communication Networks, 7(11), 2160–2179.CrossRef Ling, M. H., Yau, K.-L. A., & Poh, G. S. (2014). Trust and reputation management in cognitive radio networks: A survey. Security and Communication Networks, 7(11), 2160–2179.CrossRef
20.
go back to reference Reddy, Y. (2013). Security issues and threats in cognitive radio networks. In The ninth advanced international conference on telecommunications (AICT 2013) (pp. 84–89). Bangkok. Reddy, Y. (2013). Security issues and threats in cognitive radio networks. In The ninth advanced international conference on telecommunications (AICT 2013) (pp. 84–89). Bangkok.
21.
go back to reference Bhattacharjee, S., Sengupta, S., & Chatterjee, M. (2013). Vulnerabilities in cognitive radio networks: A survey. Computer Communications, 36(13), 1387–1398.CrossRef Bhattacharjee, S., Sengupta, S., & Chatterjee, M. (2013). Vulnerabilities in cognitive radio networks: A survey. Computer Communications, 36(13), 1387–1398.CrossRef
22.
go back to reference Wengui, S., & Yang, L. (2015). A jury-based trust management mechanism in distributed cognitive radio networks. China Communications, 12(7), 119–126.CrossRef Wengui, S., & Yang, L. (2015). A jury-based trust management mechanism in distributed cognitive radio networks. China Communications, 12(7), 119–126.CrossRef
23.
go back to reference Rahman, S. M. M., Kamruzzaman, S. M., Almogren, A., Alelaiwi, A., Alamri, A., & Alghamdi, A. (2014). Anonymous and secure communication protocol for cognitive radio ad hoc networks. In Proceedings of the IEEE international symposium on multimedia (ISM), 2014 (pp. 393–398). IEEE. Rahman, S. M. M., Kamruzzaman, S. M., Almogren, A., Alelaiwi, A., Alamri, A., & Alghamdi, A. (2014). Anonymous and secure communication protocol for cognitive radio ad hoc networks. In Proceedings of the IEEE international symposium on multimedia (ISM), 2014 (pp. 393–398). IEEE.
24.
go back to reference Rawat, D. B. (2016). Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements. In Proceedings of the 2016 IEEE conference on communications and network security (CNS) (pp. 465–471). Philadelphia. Rawat, D. B. (2016). Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements. In Proceedings of the 2016 IEEE conference on communications and network security (CNS) (pp. 465–471). Philadelphia.
25.
go back to reference Ouyang, J., Zhu, W. P., Massicotte, D., & Lin, M. (2016). Energy efficient optimization for physical layer security in cognitive relay networks. In Proceedings of the 2016 IEEE international conference on communications (ICC) (pp. 1–6). Kuala Lumpur. Ouyang, J., Zhu, W. P., Massicotte, D., & Lin, M. (2016). Energy efficient optimization for physical layer security in cognitive relay networks. In Proceedings of the 2016 IEEE international conference on communications (ICC) (pp. 1–6). Kuala Lumpur.
26.
go back to reference Shim, K., Do, N. T., An, B., & Nam, S. Y. (2016). Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information. In Proceedings of the 2016 international conference on electronics, information, and communications (ICEIC) (pp. 1–4). Da Nang. Shim, K., Do, N. T., An, B., & Nam, S. Y. (2016). Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information. In Proceedings of the 2016 international conference on electronics, information, and communications (ICEIC) (pp. 1–4). Da Nang.
27.
go back to reference Zhang, H., Wang, T., Song, L., & Han, Z. (2016). Interference improves PHY security for cognitive radio networks. IEEE Transactions on Information Forensics and Security, 11(3), 609–620.CrossRef Zhang, H., Wang, T., Song, L., & Han, Z. (2016). Interference improves PHY security for cognitive radio networks. IEEE Transactions on Information Forensics and Security, 11(3), 609–620.CrossRef
28.
go back to reference Sorrells, C., Potier, P., Qian, L., & Li, X. (2011). Anomalous spectrum usage attack detection in cognitive radio wireless networks. In IEEE international conference on technologies for homeland security (HST), 2011 (pp. 384–389). 15–17 Nov. Sorrells, C., Potier, P., Qian, L., & Li, X. (2011). Anomalous spectrum usage attack detection in cognitive radio wireless networks. In IEEE international conference on technologies for homeland security (HST), 2011 (pp. 384–389). 15–17 Nov.
29.
go back to reference Blesa, J., Romero, E., Rozas, A., & Araujo, A. (2013). PUE attack detection in CWSNs using anomaly detecttion techniques. EURASIP Journal on Wireless Communications and Networking, 2013(1), 215.CrossRef Blesa, J., Romero, E., Rozas, A., & Araujo, A. (2013). PUE attack detection in CWSNs using anomaly detecttion techniques. EURASIP Journal on Wireless Communications and Networking, 2013(1), 215.CrossRef
30.
go back to reference Fragkiadakis, A. G., Siris, V. A., Petroulakis, N. E., & Traganitis, A. P. (2015). Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection. Wireless Communications and Mobile Computing, 15, 276–294. Fragkiadakis, A. G., Siris, V. A., Petroulakis, N. E., & Traganitis, A. P. (2015). Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection. Wireless Communications and Mobile Computing, 15, 276–294.
31.
go back to reference Fayssal, S., Hariri, S., & Al-Nashif, Y. (2007). Anomaly-based behavior analysis of wireless network security. In Mobile and ubiquitous systems: Networking and services. Fayssal, S., Hariri, S., & Al-Nashif, Y. (2007). Anomaly-based behavior analysis of wireless network security. In Mobile and ubiquitous systems: Networking and services.
32.
go back to reference Fayssal, S., Al-Nashif, Y., Uk Kim, B., & Hariri, S. (2008). A proactive wireless self-protection system. In The 5th ACM international conference on pervasive services. Fayssal, S., Al-Nashif, Y., Uk Kim, B., & Hariri, S. (2008). A proactive wireless self-protection system. In The 5th ACM international conference on pervasive services.
33.
go back to reference Fayssal, S., & Hariri, S. (2007). Anomaly-based protection approach against wireless network attacks. In IEEE international conference on pervasive services. Fayssal, S., & Hariri, S. (2007). Anomaly-based protection approach against wireless network attacks. In IEEE international conference on pervasive services.
34.
go back to reference Doulat, A., Al Abed Al Aziz, A., Al-Ayyoub, M., Jararweh, Y., Bany Salameh, H. A., & Khreishah, A. A. (2014). Software defined framework for multi-cell cognitive radio networks. In 2014 IEEE 10th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 513–518). Larnaca. Doulat, A., Al Abed Al Aziz, A., Al-Ayyoub, M., Jararweh, Y., Bany Salameh, H. A., & Khreishah, A. A. (2014). Software defined framework for multi-cell cognitive radio networks. In 2014 IEEE 10th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 513–518). Larnaca.
35.
go back to reference Phuong, T., Hung, L. X., Cho, S. J., Lee, Y. K., & gyoung, S. (2006). An anomaly detection algorithm for detecting attacks in wireless sensor networks. Berlin: Springer.CrossRef Phuong, T., Hung, L. X., Cho, S. J., Lee, Y. K., & gyoung, S. (2006). An anomaly detection algorithm for detecting attacks in wireless sensor networks. Berlin: Springer.CrossRef
36.
go back to reference Le’on, O., Hernandez-Serrano, J., & Soriano, M. (2010). Securing cognitive radio networks. International Journal of Communication Systems, 23(5), 633–652. Le’on, O., Hernandez-Serrano, J., & Soriano, M. (2010). Securing cognitive radio networks. International Journal of Communication Systems, 23(5), 633–652.
37.
go back to reference Abraham, A. (2005). Rule-based expert systems. In P. H. Sydenham & R. Thorn (Eds.), Handbook of measuring system design. Hoboken: Wiley. Abraham, A. (2005). Rule-based expert systems. In P. H. Sydenham & R. Thorn (Eds.), Handbook of measuring system design. Hoboken: Wiley.
38.
go back to reference Garca-Teodoro, P., Daz-Verdejo, J., Macia-Fernandez, G., & Vazquez, E. (2008). Anomaly-based network intrusion detection: Techniques, systems and challenges. Science Direct, Computer and Security, 28(1), 18–28. Garca-Teodoro, P., Daz-Verdejo, J., Macia-Fernandez, G., & Vazquez, E. (2008). Anomaly-based network intrusion detection: Techniques, systems and challenges. Science Direct, Computer and Security, 28(1), 18–28.
39.
40.
go back to reference Eskin, E., Arnold, A., Prerau, M., Portony, L., & Stolfo, S. (2002). A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In Data mining for security applications. Eskin, E., Arnold, A., Prerau, M., Portony, L., & Stolfo, S. (2002). A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In Data mining for security applications.
41.
go back to reference Luo, Y., Szidarovszky, F., Al-Nashif, Y., & Hariri, S. (2009). A game theory based risk and impact analysis method for intrusion defense systems. In IEEE/ACS international conference on computer systems and applications. Luo, Y., Szidarovszky, F., Al-Nashif, Y., & Hariri, S. (2009). A game theory based risk and impact analysis method for intrusion defense systems. In IEEE/ACS international conference on computer systems and applications.
42.
go back to reference Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., & Autrel, F. (2007). Advanced reaction using risk assessment in intrusion detection systems. In Proceedings of the 2nd international workshop on critical information infrastructures security, Malaga. Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., & Autrel, F. (2007). Advanced reaction using risk assessment in intrusion detection systems. In Proceedings of the 2nd international workshop on critical information infrastructures security, Malaga.
43.
go back to reference Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., & Araujo, J. (2008). Automated reaction based on risk analysis and attackers skills in intrusion detection systems. In Third international conference on risks and security of internet and systems, 2008. CRiSIS’08 (pp. 117–124). IEEE. Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., & Araujo, J. (2008). Automated reaction based on risk analysis and attackers skills in intrusion detection systems. In Third international conference on risks and security of internet and systems, 2008. CRiSIS’08 (pp. 117–124). IEEE.
Metadata
Title
Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks
Authors
Yaser Jararweh
Haythem A. Bany Salameh
Abdallah Alturani
Loai Tawalbeh
Houbing Song
Publication date
30-05-2017
Publisher
Springer US
Published in
Telecommunication Systems / Issue 2/2018
Print ISSN: 1018-4864
Electronic ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-017-0329-9

Other articles of this Issue 2/2018

Telecommunication Systems 2/2018 Go to the issue