Information Technology - Information Networks Cognitive Radio Network Security Status and Challenges Dr. Eng. Sattar B. Sadkhan Ameer Sameer Hamood University of Babylon - Iraq Information Technology - Information Networks
﴿ بِسْمِ اللّهِ الرَّحْمَنِ الرَّحِيمِ ﴾ فَتَعَالَى اللَّهُ الْمَلِكُ الْحَقُّ وَلَا تَعْجَلْ بِالْقُرْآنِ مِن قَبْلِ أَن يُقْضَى إِلَيْكَ وَحْيُهُ وَقُل رَّبِّ زِدْنِي عِلْمًا ( In the Name of Allah, the Merciful, the Most Merciful ) Highly exalted be Allah, the true King! Do not hasten with the Koran before its revelation has been completed to you, but say: 'Lord, increase me in knowledge.
Overview ABSTRACT AIM OF RESEARCHERs AND THEIR SIMULATION TOOLS SECURITY SCHEMEs IN CRNs LAYERED AND CROSS-LAYERS ATTACKS AGAINST CRNS MAIN CHALLENGES IN SECURITY MODELS CONCLUSION AND FUTURE WORK
Cognitive Radio & Cognitive Network Cognitive radio offers the promise of intelligent radios that can learn and adapt to their environment. It has two important characteristics namely, observation and adaptability. It exploits unused licensed radio frequencies, often designated as spectrum holes or white spaces , see (Figure 1 ). Fig 1:spectrum holes.
ABSTRACT One of the important trends which is supposed to have more attention in the system of cognitive radio is wireless security models. Security requirements for CRNs are the same as the general wireless networks, taking into consideration that the frequency band changes dynamically adding a specific feature when we deal with security of CRNs. A new category of security issues and challenges have been introduced in the cognitive radio systems, and providing security models to realize good and reasonable protection must be one of the main researchers interest.
AIM OF RESEARCHERs AND THEIR SIMULATION TOOLS Aim of the work Simulation tool Solve existing and predict new attacks to provide secure and reliable system MONTE CARLO and MATLAB Measure how can attacks influence on CRNs performance, detect PUE and new cross-layer attack NS-2 Reduce attacks and protect the communication in core wire networks and wireless CRNs Study the impact of CRNs threat in CWSNs, develop security strategies against PUE , eavesdropping attacks. Study the impact of CR technology on military applications, analyze intelligent jamming and anti-jamming between CRs OMNEST , OPNET, NS-3 and QUALNET TABLE 1: AIM OF RESEARCHERs AND THEIR SIMULATION TOOLS
SECURITY SCHEMEs IN CRNs Fig 2: CRNs SECURITY SCHEME BLOCK DIAGRAM
LAYERED AND CROSS-LAYERS ATTACKS AGAINST CRNS Targeted layer Common countermeasure PUE Attack Physical Layer Cryptographic Authentication OFA Attack Prior identification the threshold value, Intrusion Detection System (IDS) Jamming Attack Determine and keep track the location identification of the primary user’s, Frequency hopping spread spectrum Technique Eavesdropping Attack Encryption Techniques Primary Users’ Location Attack changing the density of signals irregularly LA Attack Control Environment especially during learning phase, Constant Reevaluation Byzantine Attack Data Link Layer Misbehavior Detection System (MDS) , Cooperative neighboring cognitive radio nodes (COOPON) , trust and reputation metrics CCSD Attack Trust as Detection Mechanism SCN Attack objective Function Attack (OFA) Learning Attack (LA) Spectrum Sensing Data Falsification (Byzantine attack) Control Channel Saturation DoS Attack (CCSD) Selfish Channel Negotiation (SCN) TABLE 2: LAYERED AND CROSS-LAYERS ATTACK WITH THEIR COMMON COUNTERMEASURE.
Con.. Attack Targeted layer Common countermeasure Sinkhole Attack Network Layer Symmetric Key based algorithm Hello Attack Geographic routing protocols Sybil Attack identity validation Ripple effect Attack checked and validated necessary information Key Depletion Attack Transport Layer Security Protocols Jelly fish Attack not complicated algorithm like direct trust-based detection (DTD) Lion attack Cross-Layers Single Layer Monitoring & Trust Calculation (SLMTC) ,Trust Fusion, Abnormal Detection Lure Attack TABLE 2: LAYERED AND CROSS-LAYERS ATTACK WITH THEIR COMMON COUNTERMEASURE.
MAIN CHALLENGES IN SECURITY MODELS Main challenges in these models are : power consumption, less complexity . Reliable spectrum sensing . Reliability module CR communications . Optimal allocation of radio resources .
CONCLUSION AND FUTURE WORK Threats against CR environments divided into Wireless nature Threats (jamming, spoofing, DoS, etc.) and Cognitive nature Threats (PUE, Ripple effect, Spectrum Sensing Data Falsification, etc.).They are different Security Models reviewed in previous work as separately models or as compound models on several levels of security within Encryption and Modulation techniques to mitigate different types of attacks and make reliable communications in CRNs. Build hybrid security scheme fast and flexible furthermore non-vulnerable to attack for example compound scheme combines between more secure encryption algorithm like Advanced Encryption Standard (AES) further enhance resistance to large number of layered attacks like Frequency Hopping Spread Spectrum (FHSS) proposed in future work.
REFERENCES Hamood, Ameer Sameer, and Sattar B. Sadkhan. "Cognitive radio network security status and challenges." New Trends in Information & Communications Technology Applications (NTICT), 2017 Annual Conference on. IEEE, 2017. Hamood, A. S., & Sadkhan, S. B. (2017, March). Cognitive radio network security status and challenges. In New Trends in Information & Communications Technology Applications (NTICT), 2017 Annual Conference on (pp. 1-6). IEEE. Hamood, Ameer Sameer, and Sattar B. Sadkhan. "Cognitive radio network security status and challenges." In New Trends in Information & Communications Technology Applications (NTICT), 2017 Annual Conference on, pp. 1-6. IEEE, 2017. Hamood, A.S. and Sadkhan, S.B., 2017, March. Cognitive radio network security status and challenges. In New Trends in Information & Communications Technology Applications (NTICT), 2017 Annual Conference on (pp. 1-6). IEEE. Hamood AS, Sadkhan SB. Cognitive radio network security status and challenges. InNew Trends in Information & Communications Technology Applications (NTICT), 2017 Annual Conference on 2017 Mar 7 (pp. 1-6). IEEE.
Thank You