SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE ... · SECURITY THREATS AND DETECTION...

3
IJRET: International Journal of Resea ______________________________ Volume: 03 Issue: 02 | Feb-2014, Availab SECURITY THREATS A RADIO NETW 1 Student, Communication world is growing day by d cognitive radio network its name as CRN. In user this help to improve the spectrum effici and hamper the communication. So in this pa Keywords: Cognitive radio network, Pus ------------------------------------------------- 1. INTRODUCTION Communication is a process of transmitting one place to another through the medium inf the form of electromagnetic waves through Here we see the advances in wireless Cognitive radio network is advancem communication cognitive means sharing, in network Un-authorized user can used empty spectrum band of authorized user. Cognitive (CRNs) is an intelligent network that adapt t network to make a better use of the spectrum spectrum shortage problem by allowing un use spectrum band of licensed user with generally authorized or licensed users known and un-authorized or un-licensed users kno users. When data or information send b primary user here primary user not used to them are free these empty channels are allow authorized or secondary users .Secondary observe the activities of primary u secondary user detect the empty channel channel without disturbing the primary primary users are sending information or secondary user should either avoid using Empty channel also known as spectrum h hole is a band of frequencies assigned to a pr a particular time and specific geographic is not being utilized by that user. [2].Figure- structure of cognitive radio network. In this occupy the space called white space band which is under-utilized. Normally own communication area, in which secondar empty channel without any interference. arch in Engineering and Technology eISSN: _____________________________________ ble @ http://www.ijret.org AND DETECTION TECHNIQU WORK WITH SENSING STRA Sandeep Thakre 1 , Shruti Dixit 2 , 2 Professor, EC, SIRT, RGPV, Bhopal, MP, India Abstract day In wireless communication system introduces a n CRN Un-authorized user can used empty channel fro iency as well generate a problem like some malicious aper we discuss on security threats and technique to fi s, SUs, Spectrum sensing, spectrum holes --------------------***------------------------------------ information from formation sends in h the medium air. s communication. ment in wireless n Cognitive radio y channel from the e Radio Networks to changes in their m. CRNs solve the nlicensed users to hout interference, n as primary users own as secondary by authorized or otal band some of wed to used by un- y users always user, and when and occupy the y user. When the it is active, the the channel. An holes. A spectrum rimary user, but at location, the band -1 shows the basic s secondary user of primary user primary user has ry user utilized the 1.1 Basic Cognitive Rad Fig.1 Basic c Figure-1 shows the arch When a primary user (P licensed spectrum band, it channels of spectrum othe channels are sensed by s license for using this spect the spectrum andsend the i SU’s. SU analyses the spe channels or not, becaus channels which they n spectrum analysis SU’s required to send their data 1.2 Spectrum Sensing T It is very important in Cog user properly sense the em use energy sensing techniq bit sequences of primary an : 2319-1163 | pISSN: 2321-7308 ______________________ 34 UE IN COGNITIVE ATEGIES a new technology which I known as om the spectrum band of authorized s or fake users can used the channel nd them with sensing strategies. ----------------------------------- dio Network cognitive radio network hitecture of cognitive radio cycle. PU) transmits data signal from a may be possible that it use only few er channels are empty. These empty secondary user (SU) which has no trum. Firstly secondary users sensed information of spectrum holes to the ectrum that PU ever uses these se sometime PU use the empty not use before operation. After decide how many channels they signal Technique gnitive radio network that secondary mpty spectrum band. In this paper we que. But first look into the original nd secondary user.

Transcript of SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE ... · SECURITY THREATS AND DETECTION...

Page 1: SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE ... · SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE RADIO NETWORK WITH SENSING STRATEGIES 1Student, Communication world

IJRET: International Journal of Research in Engineering and Technology

_______________________________________________________________________________________

Volume: 03 Issue: 02 | Feb-2014, Available @

SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE

RADIO NETWORK WITH SENSING STRATEGIES

1Student,

Communication world is growing day by day In wirecognitive radio network its name as CRN. In CRN Unuser this help to improve the spectrum efficiency as well generate a problem like some malicious or fake users can used the channel and hamper the communication. So in this paper we discuss on security threats and technique to find them with sensing strategies Keywords: Cognitive radio network, Pus, SUs,

--------------------------------------------------------------------

1. INTRODUCTION

Communication is a process of transmitting information from one place to another through the medium information sends in the form of electromagnetic waves through the medium air. Here we see the advances in wireless communication. Cognitive radio network is advancement in wireless communication cognitive means sharing, in Cognitive radnetwork Un-authorized user can used empty channel from the spectrum band of authorized user. Cognitive Radio (CRNs) is an intelligent network that adapt to changes in their network to make a better use of the spectrum. CRNs solve the spectrum shortage problem by allowing unlicensed users to use spectrum band of licensed user without generally authorized or licensed users known as primary users and un-authorized or un-licensed users known as secondary users. When data or information send by authorized or primary user here primary user not used total band some of them are free these empty channels are allowed to used by unauthorized or secondary users .Secondary observe the activities of primary user, and when secondary user detect the empty channel and occupy the channel without disturbing the primary user. When the primary users are sending information or it is active, the secondary user should either avoid using the channel. An Empty channel also known as spectrum holes. A spectrum hole is a band of frequencies assigned to a primary user, but at a particular time and specific geographic location, the band is not being utilized by that user. [2].Figure-structure of cognitive radio network. In this secondary user occupy the space called white space of primary user band which is under-utilized. Normally primary user has own communication area, in which secondary user utilized the empty channel without any interference.

arch in Engineering and Technology eISSN: 2319

_______________________________________________________________________________________

2014, Available @ http://www.ijret.org

SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE

RADIO NETWORK WITH SENSING STRATEGIES

Sandeep Thakre1, Shruti Dixit2

tudent, 2Professor, EC, SIRT, RGPV, Bhopal, MP, India

Abstract ommunication world is growing day by day In wireless communication system introduces a new technology which I known as

cognitive radio network its name as CRN. In CRN Un-authorized user can used empty channel from the spectrum band of authorized spectrum efficiency as well generate a problem like some malicious or fake users can used the channel

o in this paper we discuss on security threats and technique to find them with sensing strategies

Pus, SUs, Spectrum sensing, spectrum holes

--------------------------------------------------------------------***----------------------------------------------------------------------

Communication is a process of transmitting information from through the medium information sends in

the form of electromagnetic waves through the medium air. the advances in wireless communication.

Cognitive radio network is advancement in wireless communication cognitive means sharing, in Cognitive radio

authorized user can used empty channel from the spectrum band of authorized user. Cognitive Radio Networks

that adapt to changes in their network to make a better use of the spectrum. CRNs solve the spectrum shortage problem by allowing unlicensed users to

without interference, or licensed users known as primary users

licensed users known as secondary . When data or information send by authorized or

primary user here primary user not used total band some of them are free these empty channels are allowed to used by un-

.Secondary users always observe the activities of primary user, and when secondary user detect the empty channel and occupy the channel without disturbing the primary user. When the primary users are sending information or it is active, the

y user should either avoid using the channel. An Empty channel also known as spectrum holes. A spectrum hole is a band of frequencies assigned to a primary user, but at a particular time and specific geographic location, the band

-1 shows the basic structure of cognitive radio network. In this secondary user occupy the space called white space of primary user

utilized. Normally primary user has in which secondary user utilized the

1.1 Basic Cognitive Radio Network

Fig.1 Basic cognitive radio network

Figure-1 shows the architecture of When a primary user (PU) transmits data licensed spectrum band, it may be possible tchannels of spectrum other channels are emptychannels are sensed by secondary user (SU) which has no license for using this spectrum. Firstly secondary users sensedthe spectrum andsend the information of spectrum holes to the SU’s. SU analyses the spectrum that PU ever uses these channels or not, because sometime PU uschannels which they not use before operation. After spectrum analysis SU’s decide howrequired to send their data signal 1.2 Spectrum Sensing Technique

It is very important in Cognitive radio network that secondary user properly sense the empty spectrum band. In this paper we use energy sensing technique.bit sequences of primary and secondary user.

eISSN: 2319-1163 | pISSN: 2321-7308

_______________________________________________________________________________________

34

SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE

RADIO NETWORK WITH SENSING STRATEGIES

, Bhopal, MP, India

introduces a new technology which I known as authorized user can used empty channel from the spectrum band of authorized

spectrum efficiency as well generate a problem like some malicious or fake users can used the channel o in this paper we discuss on security threats and technique to find them with sensing strategies.

----------------------------------------------------------------------

Basic Cognitive Radio Network

Basic cognitive radio network

shows the architecture of cognitive radio cycle. When a primary user (PU) transmits data signal from a licensed spectrum band, it may be possible that it use only few

other channels are empty. These empty channels are sensed by secondary user (SU) which has no license for using this spectrum. Firstly secondary users sensed

information of spectrum holes to the SU’s. SU analyses the spectrum that PU ever uses these channels or not, because sometime PU use the empty

not use before operation. After SU’s decide how many channels they

required to send their data signal

ctrum Sensing Technique

It is very important in Cognitive radio network that secondary user properly sense the empty spectrum band. In this paper we use energy sensing technique. But first look into the original bit sequences of primary and secondary user.

Page 2: SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE ... · SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE RADIO NETWORK WITH SENSING STRATEGIES 1Student, Communication world

IJRET: International Journal of Research in Engineering and Technology

_______________________________________________________________________________________

Volume: 03 Issue: 02 | Feb-2014, Available @

Fig-2 Original bit sequence of primary user

Figure23 shows bit sequence of primary user , whose data is send in the form of bits, but there is some holes as shown in figure as a gap in between two BPSK modulated signals. This signal gaps is nothing but an empty channels or spectrum holes.

Fig 3 Original bit sequence of Secondary User

In figure 3 shows bit sequence of secondary user, we use Energy spectrum technique and find the spectrum holes or empty channel without interfering or disturbing the licensed user or primary user. In this Energy Spectrum Sensing techniques, secondary user or un-licensed user analyze the channel whether the channel have some data packets or not, if its energy level is zero then they decided that the spectrum is empty, and SU’s easily send their data to the desired receiver. 2. THREATS OF COGNITIVE RADIO

2.1 PUEs or Primary User Emulsion Attack:

Primary user emulsion attack means when primary user send data secondary user continuously monitor the channelprimary sends data it means channel busy, this by using energy spectrum sensing techniquenot send continuously When it is ideal or not busysecondary sense channel and send data but when primary requires channel then sold the control. But if somewhere else

arch in Engineering and Technology eISSN: 2319

_______________________________________________________________________________________

2014, Available @ http://www.ijret.org

al bit sequence of primary user

3 shows bit sequence of primary user , whose data is send in the form of bits, but there is some holes as shown in

as a gap in between two BPSK modulated signals. This signal gaps is nothing but an empty channels or spectrum

Original bit sequence of Secondary User

shows bit sequence of secondary user, we use Energy spectrum technique and find the spectrum holes or empty channel without interfering or disturbing the licensed user or primary user. In this Energy Spectrum Sensing

licensed user analyze the channel whether the channel have some data packets or not, if its energy level is zero then they decided that the spectrum is empty, and SU’s easily send their data to the desired

. THREATS OF COGNITIVE RADIO NETWORK

PUEs or Primary User Emulsion Attack:

Primary user emulsion attack means when primary user send data secondary user continuously monitor the channel. When

secondary knows sensing technique but primary

hen it is ideal or not busy state secondary sense channel and send data but when primary

ut if somewhere else

malicious or fake secondary user work as primary ancontrol of channel and secondary send data at same time malicious user behaves as primary so secondary sold control and not send data such attack referred as primary user emulsion attack.Additional fake or malicious secondary users, may use a primary user emulation attacks to take advantage of the secondary user's ability to avoid primary users and cause excessive and unexpected discommunications.[10] A fundamental characteristic of a CR is its ability for spectrum sensing,an opportunistic manner. This means that the CR has to vacate a currently used spectrum band if an incumbent signal is detected. In this case, CR’s perform spectrum handoff seeking for different spectrumPerforming spectrum handdegradation of the CR performance since more time for sensing of the spectrum is required, and this decreases the available time for accessing the spectrum.[3

Figure 4&5 shows Primary User SignalsSignals for Primary User Emulsion Attack in Cognitive Radio

eISSN: 2319-1163 | pISSN: 2321-7308

_______________________________________________________________________________________

35

malicious or fake secondary user work as primary and wants control of channel and secondary send data at same time malicious user behaves as primary so secondary sold control and not send data such attack referred as primary user

Additional fake or malicious secondary primary user emulation attacks to take

advantage of the secondary user's ability to avoid primary users and cause excessive and unexpected disruptions to

] A fundamental characteristic of a CR is its ability for spectrum sensing, as it shall use the spectrum in an opportunistic manner. This means that the CR has to vacate a currently used spectrum band if an incumbent signal is detected. In this case, CR’s perform spectrum hand-off seeking for different spectrum holes for transmissions. Performing spectrum hand-off very often results in degradation of the CR performance since more time for sensing of the spectrum is required, and this decreases the

e for accessing the spectrum.[3]

Fig4

Fig5

shows Primary User Signals and Secondary User for Primary User Emulsion Attack in Cognitive Radio

Page 3: SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE ... · SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE RADIO NETWORK WITH SENSING STRATEGIES 1Student, Communication world

IJRET: International Journal of Research in Engineering and Technology

_______________________________________________________________________________________

Volume: 03 Issue: 02 | Feb-2014, Available @

Network. This figure shows 18000 samples for the simulation with 2 BPSK.

Fig 6

This figure 6 shows the Bit error rate reduced continuously when Primary User Emulsion Attack occurred in network. CONCLUSIONS

Through this paper, we practically find the wireless communication environment and sense spectrum band through Energy sensing technthe practical approach of a secondary userempty channel and send their data packets withe authorized user. In this wework on two types of threats like primary user emulation attack and jamming attack .These two are the major threats of cognitive radio networkcommunication environment. Jamming is the common attackof wireless communication. It is similar to (DoS) attack. In future we willimprove the work on cognitive radio network and try to practically work on the security of threats REFERENCES

[1]. F. Akyildiz, W. Lee, M. C. Vuran, S. Mohanty, “A survey on spectrum Management in Cognitive Radio Networks,” IEEE Communications Magazine, April 2008. [2]. Chetan N. Mathur, K.P. Subhalakshami, “Security issues in cognitive radio netwroks,” Cognitive netwSelf-Aware Networks, 2007. [3]. X. Zhang, C. Li, “Constructing secure cognitive wireless networks experiences and challenges,” Wireless Communications and Mobile Computing, vol. 10, pp. 552009. [4]. R. Chen and J. Park “Ensuring TrustwoSensing in Cognitive Radio Networks,” Proc., IEEE workshop

5NR 1 4 7 10

BER 0.1877

0.1907

0.1881

0.1817

arch in Engineering and Technology eISSN: 2319

_______________________________________________________________________________________

2014, Available @ http://www.ijret.org

Network. This figure shows 18000 samples for the simulation

shows the Bit error rate reduced continuously on Attack occurred in network.

the threats from the wireless communication environment and sense the empty

band through Energy sensing technique. Because of the practical approach of a secondary user which sense an

without disturbing work on two types of threats

like primary user emulation attack and jamming attack .These two are the major threats of cognitive radio network wireless

. Jamming is the common attack to Denial of Service

improve the work on cognitive work on the security of

F. Akyildiz, W. Lee, M. C. Vuran, S. Mohanty, “A survey on spectrum Management in Cognitive Radio Networks,” IEEE Communications Magazine, April 2008.

Chetan N. Mathur, K.P. Subhalakshami, “Security issues in cognitive radio netwroks,” Cognitive network: Towards

X. Zhang, C. Li, “Constructing secure cognitive wireless networks experiences and challenges,” Wireless Communications and Mobile Computing, vol. 10, pp. 55-69.

R. Chen and J. Park “Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks,” Proc., IEEE workshop

on Networking Technol. For Software Defined Radio Networks (SDR) 2006, pp. 110[5]. S. Haykin, \Cognitive radio: Braincommunications," IEEEJ. SeleCommunications, vol.23, no.2, pp. 201[6]. S. Anand, Z. Jin, K. P. Subbalakshmi, “An analytical model for primary user emulation attacksin cognitive radio networks,” To appear in Proc., IEEE symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN) , Oct.2008. [7]. Author-Alexandros G. Fragkiadakis, Elias Z. Tragos, Ioannis G. Askoxylakis “A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks” IEEE Communications Surveys & Tutorials, Accepted For Publication July-2012 [8]. T. Aysal, S. Kandeepan, and R. PiSpectrum Sensing with Noisy Hard Decision Transmissions,” in Proc. ICC, 2009, pp. 1–5.[9]. Y. Chen, “Collaborative spectrum sensing in the presence of secondary user interferences for lognormal shadowing,” Wireless Communications and[10]. Z. Jin, S. Anand, K. P. Subbalakshmi, “Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing,” Mobile Computing and Communications Review, vol. 13, no. 2, 2009.

13 16 19

0.1697

0.1624

0.1576

eISSN: 2319-1163 | pISSN: 2321-7308

_______________________________________________________________________________________

36

on Networking Technol. For Software Defined Radio Networks (SDR) 2006, pp. 110-119, Sep. 2006.

Cognitive radio: Brain-empowered wireless communications," IEEEJ. Selected. Areas of Communications, vol.23, no.2, pp. 201-220, Feb 2005.

S. Anand, Z. Jin, K. P. Subbalakshmi, “An analytical model for primary user emulation attacksin cognitive radio networks,” To appear in Proc., IEEE symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN) ,

G. Fragkiadakis, Elias Z. Tragos, Ioannis G. Askoxylakis “A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks” IEEE Communications Surveys & Tutorials, Accepted For

T. Aysal, S. Kandeepan, and R. Piesewicz, “Cooperative Spectrum Sensing with Noisy Hard Decision Transmissions,”

5. Y. Chen, “Collaborative spectrum sensing in the presence

of secondary user interferences for lognormal shadowing,” Wireless Communications and Mobile Computing, 2010.

Z. Jin, S. Anand, K. P. Subbalakshmi, “Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing,” Mobile Computing and Communications Review, vol. 13, no. 2, 2009.