Information Technology - Information Networks

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Doc.: IEEE /0046r0 Submission July 2009 Ari Ahtiainen, NokiaSlide 1 A Cooperation Mechanism for Coexistence between Secondary User Networks on.
Chris Karlof and David Wagner
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Cognitive Engine Development for IEEE Lizdabel Morales April 16 th, 2007
D EFENSE A GAINST S PECTRUM S ENSING D ATA F ALSIFICATION A TTACKS I N C OGNITIVE R ADIO N ETWORKS Li Xiao Department of Computer Science & Engineering.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
Wireless Sensor Network Security Anuj Nagar CS 590.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
Cooperative spectrum sensing in cognitive radio Aminmohammad Roozgard.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Performance of Energy Detection: A Complementary AUC Approach
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Simulation Of A Cooperative Protocol For Common Control Channel Implementation Prepared by: Aishah Thaher Shymaa Khalaf Supervisor: Dr.Ahmed Al-Masri.
Cognitive Radio Networks
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Zaid A. Shafeeq Mohammed N. Al-Damluji Al-Ahliyya Amman University Amman - Jordan September
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Azam Supervisor : Prof. Raj Jain
Support for Multimedia Traffic in Mobile, Distributed, Multiple-Hop Wireless Networks Steven Boyd S.U.R.E. Program 2003.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends Prepared by: Ameer Sameer Hamood University of Babylon - Iraq Information.
Security of the Internet of Things: perspectives and challenges
Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
1 A Proportional Fair Spectrum Allocation for Wireless Heterogeneous Networks Sangwook Han, Irfanud Din, Woon Bong Young and Hoon Kim ISCE 2014.
A discussion on channel sensing techniques By James Xu.
History and Implementation of the IEEE 802 Security Architecture
In the name of God.
Mohsen Riahi Manesh and Dr. Naima Kaabouch
Younes Abdi, PhD Faculty of Information Technology
Prepared by: Ameer Sameer Hamood University of Babylon - Iraq
History and Implementation of the IEEE 802 Security Architecture
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Integrated Energy and Spectrum Harvesting for 5G Wireless Communications submitted by –SUMITH.MS(1KI12CS089) Guided by – BANUSHRI.S(ASST.PROF,Dept.Of.CSE)
Cognitive Radio Networks
Phd Proposal Investigation of Primary User Emulation Attack in Cognitive Radio Networks Chao Chen Department of Electrical & Computer Engineering Stevens.
SPECTRUM SHARING IN COGNITIVE RADIO NETWORK
An Enhancement of WirelessHART Protocol
Cognitive Radio Based 5G Wireless Networks
PERFORMANCE ANALYSIS OF SPECTRUM SENSING USING COGNITIVE RADIO
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
Lecture 45 Review of Lectures Dr. Ghalib A. Shah
Cognitive Radio Networks
ITIS 6010/8010 Wireless Network Security
Multicarrier Communication and Cognitive Radio
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Suman Bhunia, Shamik Sengupta, Felisa Vazquez-Abad
Security in SDR & cognitive radio
An Overview of Security Issues in Sensor Network
Cross-layer Analysis for detecting Wireless Misbehavior
A Vehicular Ad Hoc Network Intrusion Detection System Based on BUSNets
LM 7. Cellular Network Security
HUAWEI Technology 2019/8/25 Cognitive Radio Networks: Imagination or Reality? CrownCom 2008 HUAWEI Technology
Presentation transcript:

Information Technology - Information Networks Cognitive Radio Network Security Status and Challenges Dr. Eng. Sattar B. Sadkhan Ameer Sameer Hamood University of Babylon - Iraq Information Technology - Information Networks

﴿ بِسْمِ اللّهِ الرَّحْمَنِ الرَّحِيمِ ﴾ فَتَعَالَى اللَّهُ الْمَلِكُ الْحَقُّ وَلَا تَعْجَلْ بِالْقُرْآنِ مِن قَبْلِ أَن يُقْضَى إِلَيْكَ وَحْيُهُ وَقُل رَّبِّ زِدْنِي عِلْمًا ( In the Name of Allah, the Merciful, the Most Merciful ) Highly exalted be Allah, the true King! Do not hasten with the Koran before its revelation has been completed to you, but say: 'Lord, increase me in knowledge.

Overview ABSTRACT AIM OF RESEARCHERs AND THEIR SIMULATION TOOLS SECURITY SCHEMEs IN CRNs LAYERED AND CROSS-LAYERS ATTACKS AGAINST CRNS MAIN CHALLENGES IN SECURITY MODELS CONCLUSION AND FUTURE WORK

Cognitive Radio & Cognitive Network Cognitive radio offers the promise of intelligent radios that can learn and adapt to their environment. It has two important characteristics namely, observation and adaptability. It exploits unused licensed radio frequencies, often designated as spectrum holes or white spaces , see (Figure 1 ). Fig 1:spectrum holes.

ABSTRACT One of the important trends which is supposed to have more attention in the system of cognitive radio is wireless security models. Security requirements for CRNs are the same as the general wireless networks, taking into consideration that the frequency band changes dynamically adding a specific feature when we deal with security of CRNs. A new category of security issues and challenges have been introduced in the cognitive radio systems, and providing security models to realize good and reasonable protection must be one of the main researchers interest.

AIM OF RESEARCHERs AND THEIR SIMULATION TOOLS Aim of the work Simulation tool Solve existing and predict new attacks to provide secure and reliable system MONTE CARLO and MATLAB Measure how can attacks influence on CRNs performance, detect PUE and new cross-layer attack NS-2 Reduce attacks and protect the communication in core wire networks and wireless CRNs Study the impact of CRNs threat in CWSNs, develop security strategies against PUE , eavesdropping attacks. Study the impact of CR technology on military applications, analyze intelligent jamming and anti-jamming between CRs OMNEST , OPNET, NS-3 and QUALNET TABLE 1: AIM OF RESEARCHERs AND THEIR SIMULATION TOOLS

SECURITY SCHEMEs IN CRNs Fig 2: CRNs SECURITY SCHEME BLOCK DIAGRAM

LAYERED AND CROSS-LAYERS ATTACKS AGAINST CRNS Targeted layer Common countermeasure PUE Attack Physical Layer   Cryptographic Authentication OFA Attack Prior identification the threshold value, Intrusion Detection System (IDS) Jamming Attack Determine and keep track the location identification of the primary user’s, Frequency hopping spread spectrum Technique Eavesdropping Attack Encryption Techniques Primary Users’ Location Attack changing the density of signals irregularly LA Attack Control Environment especially during learning phase, Constant Reevaluation Byzantine Attack Data Link Layer Misbehavior Detection System (MDS) , Cooperative neighboring cognitive radio nodes (COOPON) , trust and reputation metrics CCSD Attack Trust as Detection Mechanism SCN Attack objective Function Attack (OFA) Learning Attack (LA) Spectrum Sensing Data Falsification (Byzantine attack) Control Channel Saturation DoS Attack (CCSD) Selfish Channel Negotiation (SCN) TABLE 2: LAYERED AND CROSS-LAYERS ATTACK WITH THEIR COMMON COUNTERMEASURE.

Con.. Attack Targeted layer Common countermeasure Sinkhole Attack Network Layer   Symmetric Key based algorithm Hello Attack Geographic routing protocols Sybil Attack identity validation Ripple effect Attack checked and validated necessary information Key Depletion Attack Transport Layer Security Protocols Jelly fish Attack not complicated algorithm like direct trust-based detection (DTD) Lion attack Cross-Layers Single Layer Monitoring & Trust Calculation (SLMTC) ,Trust Fusion, Abnormal Detection Lure Attack TABLE 2: LAYERED AND CROSS-LAYERS ATTACK WITH THEIR COMMON COUNTERMEASURE.

MAIN CHALLENGES IN SECURITY MODELS Main challenges in these models are : power consumption, less complexity . Reliable spectrum sensing . Reliability module CR communications . Optimal allocation of radio resources .

CONCLUSION AND FUTURE WORK Threats against CR environments divided into Wireless nature Threats (jamming, spoofing, DoS, etc.) and Cognitive nature Threats (PUE, Ripple effect, Spectrum Sensing Data Falsification, etc.).They are different Security Models reviewed in previous work as separately models or as compound models on several levels of security within Encryption and Modulation techniques to mitigate different types of attacks and make reliable communications in CRNs. Build hybrid security scheme fast and flexible furthermore non-vulnerable to attack for example compound scheme combines between more secure encryption algorithm like Advanced Encryption Standard (AES) further enhance resistance to large number of layered attacks like Frequency Hopping Spread Spectrum (FHSS) proposed in future work.

REFERENCES Hamood, Ameer Sameer, and Sattar B. Sadkhan. "Cognitive radio network security status and challenges." New Trends in Information & Communications Technology Applications (NTICT), 2017 Annual Conference on. IEEE, 2017. Hamood, A. S., & Sadkhan, S. B. (2017, March). Cognitive radio network security status and challenges. In New Trends in Information & Communications Technology Applications (NTICT), 2017 Annual Conference on (pp. 1-6). IEEE. Hamood, Ameer Sameer, and Sattar B. Sadkhan. "Cognitive radio network security status and challenges." In New Trends in Information & Communications Technology Applications (NTICT), 2017 Annual Conference on, pp. 1-6. IEEE, 2017. Hamood, A.S. and Sadkhan, S.B., 2017, March. Cognitive radio network security status and challenges. In New Trends in Information & Communications Technology Applications (NTICT), 2017 Annual Conference on (pp. 1-6). IEEE. Hamood AS, Sadkhan SB. Cognitive radio network security status and challenges. InNew Trends in Information & Communications Technology Applications (NTICT), 2017 Annual Conference on 2017 Mar 7 (pp. 1-6). IEEE.

Thank You