Countermeasure Against Physical Layer Attack in Cognitive Radio

SSRG International Journal of Electronics and Communication Engineering - (ICRTECITA-2017) - Special Issue - March 2017
International Conference on Recent Trends in Engineering, Computers, Information Technology and Applications
(ICRTECITA-2017)
Countermeasure Against Physical Layer
Attack in Cognitive Radio Networks
K. Anbukkarasi,
Assistant professor,
C. Nishanth,
Final year student,
Electronics and Communication Engineering,
Dr. Mahalingam College of Engineering
and Technology,
Pollachi, India,
[email protected]
Electronics and Communication Engineering,
Dr. Mahalingam College of Engineering
and Technology,
Pollachi, India,
[email protected]
M. Sowmiya,
Final year student,
VS. Selva Kiruba,
Final year student,
Electronics and Communication Engineering,
Dr. Mahalingam College of Engineering
and Technology,
Pollachi, India,
[email protected]
Electronics and Communication Engineering,
Dr. Mahalingam College of Engineering
and Technology,
Pollachi, India,
[email protected]
Abstract— A “Cognitive radio” is a latest
technology aiming to solve the spectrum scarcity
problem by allocating the spectrum to
secondary users. It aims to improve the
utilization of the radio spectrum by reducing the
spectrum holes. The existing systems that have
been proposed so far provided the solution for
some attacks in the Physical layer of Cognitive
radio with a limited number of nodes, evaluated
with the parameters like end to end delay,
packet delivery with least security. Also the
methods have not provided the accurate solution
for specific application. Our project aims at
providing solution for the physical layer attack
with enhanced security considering large
number of nodes and thus reduces the
interference among primary and secondary
users.
I.
INTRODUCTION
Wireless technology shows a drastic
enhancement in its technological and its
application features. These primary and
secondary users greatly trust on the available
radio spectrum, which leads to a scarcity in the
available spectrum. Certain portions of the
spectrum are made available for public use,
which is vacant claimed by The Federal
Communications
Commission
(FCC).
Cognitive radio (CR) is defined as software
defined radio in wireless communication that
sense the environment and detect the free
space among the crowded channel, and utilize
the vacant space efficiently.
This paper emphases on the analysis of
security issues in various perspectives on the
cognitive radio networks. On each layer of
spectrum there exists attacks launched by
attackers, but most commonly they target on
the lower level layer i.e. physical layer [2].
The existing systems have considered only a
few nodes with least security for the attacks,
which will not be applicable for all the generic
scenarios.
This paper aims at providing solution with
increased number of nodes for a particular
application and can also be applied for
different scenarios. We use cryptography
technique which relay on certificate concept
like giving specific ID to users. Users ID is
given for a precise period and then it can be
changed after the period. Using energy
consumption ratio and packet delivery ratio,
the attack can be perceived and rejected at the
entrance in spectrum.
II.
COGNITIVE RADIO NETWORKS
Mitola introduced software defined radio in
1991and cognitive radio in 1998. Software
Defined Radio (SDR) is a multiband radio that
supports reconfigurable through software
which runs on Digital Signal Processor (DSP).
A latest communication technology named
“Cognitive Radio Network” is a network in
which an unlicensed user can use a free
channel in a spectrum band of licensed user
without interference. Cognitive Radio (CR) is
ISSN : 2348
8549
Seventh
Sense-Research
Group www.internationaljournalssrg.org
www.internationaljournalssrg.org
Page
1951
Page
SSRG International Journal of Electronics and Communication Engineering - (ICRTECITA-2017) - Special Issue - March 2017
International Conference on Recent Trends in Engineering, Computers, Information Technology and Applications
(ICRTECITA-2017)
an adaptive, intelligent radio and network
technology that can automatically detect
available channels in a wireless spectrum and
change transmission parameters enabling more
communications to run concurrently and
improve radio operating behaviour.
III.
ATTACKS IN CRN
In the ISO/OSI model CRN attacks are
involved in various layers. Attacks which are
falling in physical layer is said to be a physical
layer attack and attackers which rely on link
layer is said to be MAC layer attacks, and over
the network layer is said to be network layer
attacks, and on transport layer is said to be
transport layer attacks. Depending on the
attacks, threats are perceived and the security
measures are taken. In the Physical layer,
Primary User Emulation attack and Jamming
attack is discussed.
A. Jamming Attack
The jamming attack in the communication
network is to deny service by eating up high
part of bandwidth. In jamming attack, it
maliciously send out packets continuously to
obstruct the legitimate participants in a
communication session from sending or
receiving data; simultaneously it creates a
denial of service situation.
Fig 1: CRN Architecture
The primary network is also called licensed
user network or incumbent users network,
which is an existing network, where primary
users work in licensed spectrum bands.
A. Functions of CRN
Spectrum sensing, spectrum management,
spectrum mobility and spectrum sharing are
the functions of cognitive radio networks.
Spectrum sensing is defined as sensing
spectrum holes and allocation of the spectrum
without interfering with further users. In DSA,
the licensed users have the certificate to use
the certain frequency band and when they are
not in use, it is left idle. Thus, their available
spectrum could be used by the secondary
users. Such secondary user require sensing
algorithm to detect the spectrum holes for
communication.
Spectrum Management is the process of
selecting the best available channel. It is
accomplished of selecting the most appropriate
bands from the available bands according to
the QoS requirements of the application.
Spectrum sharing avoids multiple users
colliding the overlapping portion of the
spectrum. Spectrum mobility refers to the
maintenance of seamless communication
during the transition to better spectrum. The
implementation of these functionalities
exposes severe security threats.
Seventh
ISSN : Sense
2348 Research
- 8549 Group
Fig 2: Jamming Attack
The
jammer
can
also
interrupt
communication by attacking a radio
transmission resulting in the corruption of
packets received by legitimate users. Thus,
jamming is an attack that is known to both
physical and MAC layers.
B. Primary User Emulation Attack
In CRN, primary users has the priority to
access the channel. If a primary user begins to
transmit through frequency band engaged by a
unlicensed user, it is required to leave that
particular specific spectrum band immediately.
Conversely, when there is no primary user
activity present within a frequency range, all
the secondary users possess equal rights to the
unoccupied frequency channel. When a
secondary user is on, it is assumed that the
www.internationaljournalssrg.org
www.internationaljournalssrg.org
Page
2
Page
196
SSRG International Journal of Electronics and Communication Engineering - (ICRTECITA-2017) - Special Issue - March 2017
International Conference on Recent Trends in Engineering, Computers, Information Technology and Applications
(ICRTECITA-2017)
signal is that of a secondary user only;
otherwise it concludes that the signal is of a
primary user.
The existing detection approaches can be
classified into Received Signal Strength (RSS)
based detection, Feature detection, Location
verification and Cooperative detection.
The
approach
then
employs
a
cyclostationary calculation to represent the
features of the user signals, which are then fed
into an artificial neural network for
classification. There are two location
verification schemes called as Distance Ratio
Test (DRT) and Distance Difference Test
(DDT) respectively.
Fig 3: PUE Attack
Depending on the PUE attacker, it can be a
selfish PUE attack or a malicious PUE attack.
When a selfish PUE attack detects a free
spectrum band, they prevent other unlicensed
users from using that band by emulating the
signal characteristics of the licensed user.
Based on these paradigms, there exists the
potential for malicious secondary users to
mimic the spectral characteristics of the
primary users in order to gain priority access
to the wireless channels occupied by other
secondary users.
In both schemes, dedicated cognitive nodes
(SUs or a cognitive BS) with enhanced
functionality are involved for location
verification. DRT uses a Received Signal
Strength (RSS) based method, where two
dedicated cognitive nodes measure the RSS of
the signal source and calculate the ratio of
these two RSS to check whether it coincides
with their distances to the true PU (e.g., a TV
broadcast tower). Using DDT, the arrival time
of the transmitted signal from the source is
measured by the two dedicated cognitive
nodes.
V.
PROPOSED METHOD
The Existing Systems have considered only
a few nodes with least security for the attacks
which will not be applicable for all the generic
scenarios. The proposed method aims to
provide solution for the physical layer attack
with enhanced security considering large
number of nodes. The betterment of the
proposed system can be realised when
comparing its performance with the existing
system.
A. Introduction
Fig 4: Spectrum Hole
The following figure clearly indicates the
spectrum hole caused due to this attacks in the
Cognitive radio networks. There should be
new security proposals needed to be effective
against these attacks.
IV.
EXISTING METHOD
The increasing demand of wireless
applications has put a lot of limitations on the
use of available radio spectrum is limited and
precious resource.The existing systems
analysed the received energy, end to end delay
ratio, packet delivery ratio with few nodes
which may not provide the accurate solution.
The Proposed method provides solution for
the Primary User Emulation attack. There are
practical requirements for efficient PUE attack
defense approaches. Our Proposed system
fulfill the requirements with enhancement
security. The proposed method analyzes the
parameters like end to end delay, Packet
delivery ratio with large number of nodes.
B. Block Diagram
The main purpose of the proposed system is
giving enhanced security with better spectral
efficiency among the users. The flowchart
designates how the enhanced security system
is implemented in the scenario where it sends
the packets to the spectrum. There are two
users i.e primary users and secondary users.
Seventh
Sense
Research Group www.internationaljournalssrg.org
www.internationaljournalssrg.org
ISSN
: 2348
- 8549
PagePage
197 3
SSRG International Journal of Electronics and Communication Engineering - (ICRTECITA-2017) - Special Issue - March 2017
International Conference on Recent Trends in Engineering, Computers, Information Technology and Applications
(ICRTECITA-2017)
Both the users are given with certain keys.
These keys are fed in the source at the initial
stage.
Source
Sends the
packet in
the network
with test ID
If
key=
test
Deliver
the
packet
Network
will check
the node
key
Fig 6: Scenario of Nodes from Source to
Destination in the Existing System
Revoke
the node
The figure depicts the existing system in
the cognitive radio network where primary
user and secondary users are assigned to
specific bandwidth.
Fig 5: Block Diagram of Proposed System
When the licensed user occupies the
specific band and sends the signal it will be
identified by the source with the key which
was already provided. When it sends the signal
it will check with the keys, if it is same it will
allow otherwise it will revoke the node.
By the time an attacker comes and sends
the signal like primary user the source will
identify that it is an attacker by comparing
with the key and that node is revoked by the
source. If the source checks the user with the
key that is already provided and found that it is
not an attacker, it is allowed to deliver the
packet. Thus an enhanced security is ensured
among the users.
C. Advantages
1. Enhanced security among users.
2. Secure CRN from PUE attacks.
3. Spectrum hole will be reduced.
Fig 7: Scenario of CRN Simulation
The below figure shows the Cognitive
radio sensing in the spectrum. Among the four
functions of CRN, the most important sensing
is simulated among the users in the spectrum.
The sensing services to identify whether the
spectrum is free or not to the users. When the
spectrum is free the secondary user will utilize
the band, if the primary user enters the
spectrum the secondary user must leave the
spectrum as the primary user has the higher
priority to use the spectrum.
4. Reduces interference long users.
VI.
RESULTS AND ANALYSIS
The Simulation output of CRN with PUE
attack is shown in this chapter. The Existing
system output is also given to compare with
the Proposed system. Therefore Security
concept is clearly analyzed in comparison with
the existing system.
Fig 8: Scenario of Attacks in CRN
A. Existing System Output
The figure shows the communication
between the nodes in Cognitive radio. In the
spectrum, specific bandwidth are assigned to
the users from the router.
Seventh
ISSN Sense
: 2348Research
- 8549 Group
In PUE attack, the attacker sends the signal
same as that of a Primary user and thus the
secondary user gets cheated which results in
spectrum hole.
www.internationaljournalssrg.org
www.internationaljournalssrg.org
Page198
4
Page
SSRG International Journal of Electronics and Communication Engineering - (ICRTECITA-2017) - Special Issue - March 2017
International Conference on Recent Trends in Engineering, Computers, Information Technology and Applications
(ICRTECITA-2017)
B. Proposed System Output
The Proposed system reduces the attack
and thus an efficient use of spectrum is
achieved by the cognitive radio.
Fig 9: Scenario of CRN with Increased Number of
Nodes in the Proposed System.
In this method, key authentication is
implemented which is used for transferring
encrypted message among the users.
This ensures security among the users
which is not available with the existing
system. Initially, the keys are assigned for
every node in the CRN .This key is the
identity for the node while sending packets.
The Keys are fed in the Source at the initial
stage. When the Primary user occupies the
specific band and sends the signal it will be
identified by the Source as it is already
provided enough information about the key.
When the users send the signal it will check
with the Keys, if it is same, the
communication will be permitted among the
users otherwise it will revoke the node. When
an attacker comes and sends the signal like
Primary user the source will identify that it is
an attacker by comparing with the key and that
node is revoked by the Source.
VII.
SIMULATION RESULT
A. Throughput
Throughput is the rate of successful
message delivery over a communication
channel. In this regard the output shows that,
in existing method the throughput is less
which is indicated in third curve (Blue).
Fig 10: Scenario of Proposed Concept With PUE
Attack
This scenario represents a large number of
nodes which is not present in the existing
method. This scenario is helpful for
considering the performances of the users. The
below figure shows the CRN with individual
key provision for the users.
Fig 12: Throughput
Throughput is better in the proposed
system by using security key provision with a
common source for many users which is
indicated in second curve (Green). Throughput
is much better by using security key provision
with a unique source for separate set of users
is indicated in first curve (Red).
B. Delay
Packet delay is the difference in end to end
one way delay between selected packets in a
flow with any lost packets being ignored. In
this regard the output shows that, in existing
method the delay is high since there is no
security between the users, this is indicated in
first curve (Red).
Fig 11: CRN with Security Provision
Seventh
Sense
Research Group www.internationaljournalssrg.org
www.internationaljournalssrg.org
ISSN
: 2348
- 8549
PagePage
199 5
SSRG International Journal of Electronics and Communication Engineering - (ICRTECITA-2017) - Special Issue - March 2017
International Conference on Recent Trends in Engineering, Computers, Information Technology and Applications
(ICRTECITA-2017)
an adaptable method in the demanding
wireless technology. This method diminishes
the attack and thus an efficient use of spectrum
is achieved by the cognitive radio networks.
This method also reduces the interference
among licensed and unlincesed users and also
reduces the spectrum holes. In our project, a
background on CRNs security and common
threats/attacks on physical layer are analyzed
and addressed with their countermeasures
IX.
Fig 13: Delay
Delay is better by using security key
provision for many users which is indicated in
second curve (Green). Delay is much better by
using security key provision with a unique
source for separate set of users is indicated in
third curve (Blue)
C. Energy
Energy is an important parameter in data
transmission. In this regard the output shows
that, in existing method the energy is low
between which is indicated in third curve
(Blue).
Fig 14: Energy
Energy is better by using security key
provision with a common source for many
users which is indicated in second curve
(Green). Energy is much better by using
security key provision with a unique source for
separate set of users is indicated in first curve
(Red).
VIII.
CONCLUSION
We report successful simulation of Primary
User Emulation attack on physical layer in
cognitive radio network with implementing
high security among the users. The lack of
available spectrum and increase in the
applications on wireless systems made the CR
REFERENCES
[1] C.Kiruthika and A.C.Sumathi, “A
Study on
Primary User Emulation Attack in Cognitive Radio
Networks,” International Journal of Computer
Science Engineering and Technology( IJCSET),
Vol.4, Issue.10, October 2014.
[2] C.Manogna and K.Bhaskar Naik, “Detection of
Jamming Attack in Cognitive Radio Networks,”
International Journal of Recent Advances in
Engineering & Technology (IJRAET), Vol.2,
Issue.6, July 2014.
[3] Goutam Ghosh, Prasun Das and Subhajit Chatterjee,
“Simulation and Analysis of Cognitive Radio
System Using Matlab,” International Journal of
Next-Generation Networks (IJNGN), Vol.6, No.2,
June 2014.
[4] I.F.Alyildiz, “A survey on Spectrum Management
in
Cognitive
Radio
Networks,”
IEEE
Communication Magazine, April 2008.
[5] Pooja Dubey, Bhupendra Singh Thakur and Sapna
Chaudhary, “Survey on Security Issues in Cognitive
Radio Network,” International Journal of Innovative
Research in Computer and Communication
Engineering, Vol.2, Issue.12, December 2014.
[6] Ruiliang Chen, “Enhancing Attack Resilience in
Cognitive Radio Network,” Virginia Poly technique
Institute and State University, February 2008.
[7] R.Chen, Y.Thomas and J.Park, “Ensuring
Trustworthy Spectrum Sensing in Cognitive Radio
Networks,” First IEEE workshop on Networking
Technologies for Software defined Radio Network
(SDR), pp.1-11, Sept 2006.
[8] Roshni Rajkumari, Suchismita Bhattacharjee and
Ningrinla Marchang, “Cognitive Radio Networks
Security Threats and Attacks,” International
Conference on Information and Communication
Technologies (ICICT), 2014.
[9] Sandeep Thakre and Shruti Dixit, “Security Threats
and Detection Technique in Cognitive radio
Network,” International Journal of Emerging
Technology and Advanced Engineering, Vol.4,
Issue.2, February 2014.
[10]S.Bhagavathy
Nanthini,
M.Hemalatha,
D.Manivannan and L.Devasena , “Attacks in
Cognitive Radio Networks (CRN) -A Survey,”
Indian Journal of Science and Technology,
Vol.7(4), April 2014.
[11]Sugata Sanyal, Rohit Bhadauria and Chittabrata
Ghosh, “Secure Communication in Cognitive Radio
Networks,” International Conference on Computers
and Devices for Communication, 2009.
[12]Susmita Das and Deepa Das, “Primary User
Emulation Attack in Cognitive Radio Networks: A
Survey,” International Journal of Computer
Networks
and
Wireless
Communications
(IJCNWC), Vol.3, June 2013.
Seventh
Sense
Research Group www.internationaljournalssrg.org
www.internationaljournalssrg.org
ISSN
: 2348
- 8549
PagePage
200 6