Tarun Bansal, Bo Chen and Prasun Sinha

Slides:



Advertisements
Similar presentations
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Advertisements

Tarun Bansal*, Karthik Sundaresan+,
SoNIC: Classifying Interference in Sensor Networks Frederik Hermans et al. Uppsala University, Sweden IPSN 2013 Presenter: Jeffrey.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Authors: David N.C. Tse, Ofer Zeitouni. Presented By Sai C. Chadalapaka.
D EFENSE A GAINST S PECTRUM S ENSING D ATA F ALSIFICATION A TTACKS I N C OGNITIVE R ADIO N ETWORKS Li Xiao Department of Computer Science & Engineering.
Fault-Tolerant Target Detection in Sensor Networks Min Ding +, Dechang Chen *, Andrew Thaeler +, and Xiuzhen Cheng + + Department of Computer Science,
DBLA: D ISTRIBUTED B LOCK L EARNING A LGORITHM F OR C HANNEL S ELECTION I N C OGNITIVE R ADIO N ETWORKS Chowdhury Sayeed Hyder Department of Computer Science.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
System Design for Cognitive Radio Communications
June 4, 2015 On the Capacity of a Class of Cognitive Radios Sriram Sridharan in collaboration with Dr. Sriram Vishwanath Wireless Networking and Communications.
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
ExOR: Opportunistic Multi-Hop Routing For Wireless Networks Sanjit Biswas & Robert Morris.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
A FREQUENCY HOPPING SPREAD SPECTRUM TRANSMISSION SCHEME FOR UNCOORDINATED COGNITIVE RADIOS Xiaohua (Edward) Li and Juite Hwu Department of Electrical and.
Multiantenna-Assisted Spectrum Sensing for Cognitive Radio
Cooperative spectrum sensing in cognitive radio Aminmohammad Roozgard.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
College of Engineering Resource Management in Wireless Networks Anurag Arepally Major Adviser : Dr. Robert Akl Department of Computer Science and Engineering.
MAXIMIZING SPECTRUM UTILIZATION OF COGNITIVE RADIO NETWORKS USING CHANNEL ALLOCATION AND POWER CONTROL Anh Tuan Hoang and Ying-Chang Liang Vehicular Technology.
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
Utility Based Scheduling in Cognitive Radio Networks Term Project CmpE-300 Analysis of Algorithms Spring 2009 Computer Engineering, Boğaziçi University,
1 Performance Analysis of Coexisting Secondary Users in Heterogeneous Cognitive Radio Network Xiaohua Li Dept. of Electrical & Computer Engineering State.
College of Engineering WiFi and WCDMA Network Design Robert Akl, D.Sc. Department of Computer Science and Engineering Robert Akl, D.Sc. Department of Computer.
NIST Standards Education Dynamic Spectrum Access Systems Martin BH Weiss School of Information Sciences University of Pittsburgh
Simulation Of A Cooperative Protocol For Common Control Channel Implementation Prepared by: Aishah Thaher Shymaa Khalaf Supervisor: Dr.Ahmed Al-Masri.
Cognitive Radio Networks
Reliable Telemetry in White Spaces using Remote Attestation Omid Fatemieh, Michael D. LeMay, Carl A. Gunter University of Illinois at Urbana-Champaign.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Sangeetha Nandan (1ay05cs057)
3 Introduction System Model Distributed Data Collection Simulation and Analysis 5 Conclusion 2.
1 11 Optimal Bandwidth Selection in Multi-Channel Cognitive Radio Networks: How Much is Too Much? Dan Xu, Eric Jung, and Xin Liu University of California,
A Distributed Relay-Assignment Algorithm for Cooperative Communications in Wireless Networks ICC 2006 Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department.
Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective Shouling Ji and Raheem Beyah Georgia.
4 Introduction Semi-Structure Routing Framework System Model Performance Analytical Framework Simulation 6 Conclusion.
Cognitive Radio: Next Generation Communication System
Outage in Large Wireless Networks with Spectrum Sharing under Rayleigh Fading MASc. Defence SYSC Dept., Carleton University 1 Arshdeep S. Kahlon, B.E.
Stretchable Architectures for Next Generation Cellular Networks Presented By Shashidhar Lakkavalli, Ansuya Negi and Dr. Suresh Singh Portland State University.
Cooperative MIMO Paradigms for Cognitive Radio Networks
Spectrum Sensing In Cognitive Radio Networks
Dynamic Spectrum Access/Management Models Exclusive-Use Model Shared-Use Model.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Partially Overlapped Channels Not Considered Harmful Arunesh Mishra, Vivek Shrivastava, Suman Banerjee, William Arbaugh (ACM SIGMetrics 2006) Slides adapted.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
Cooperative Resource Management in Cognitive WiMAX with Femto Cells Jin Jin, Baochun Li Department of Electrical and Computer Engineering University of.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Overcoming the Sensing-Throughput Tradeoff in Cognitive Radio Networks ICC 2010.
Ashish Rauniyar, Soo Young Shin IT Convergence Engineering
On Detecting Termination in Cognitive Radio Networks Shantanu Sharma 1 and Awadhesh Kumar Singh 2 1 Ben-Gurion University of the Negev, Israel 2 National.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
1 A Proportional Fair Spectrum Allocation for Wireless Heterogeneous Networks Sangwook Han, Irfanud Din, Woon Bong Young and Hoon Kim ISCE 2014.
A discussion on channel sensing techniques By James Xu.
Mohsen Riahi Manesh and Dr. Naima Kaabouch
Phd Proposal Investigation of Primary User Emulation Attack in Cognitive Radio Networks Chao Chen Department of Electrical & Computer Engineering Stevens.
SPECTRUM SHARING IN COGNITIVE RADIO NETWORK
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors
Cognitive Radio Based 5G Wireless Networks
Enhancing the capacity of Spectrum Sharing in Cognitive Radio Network
PERFORMANCE ANALYSIS OF SPECTRUM SENSING USING COGNITIVE RADIO
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
On the Physical Carrier Sense in Wireless Ad-hoc Networks
Cognitive Radio Networks
Presented by Mohamad Haidar, Ph.D. May 13, 2009 Moncton, NB, Canada
Protocols.
Protocols.
Presentation transcript:

FastProbe: Malicious User Detection in Cognitive Radio Networks Through Active Transmissions Tarun Bansal, Bo Chen and Prasun Sinha Department of Computer Science and Engineering Ohio State University Columbus, Ohio This work is related to the scanning process in the cognitive radio networks. We consider the scenario when some of the reading are not reflecting the correct status of the channel information. How could we detect the radios who provides the misleading information. This is the focus of this talk. Page number

Taken from “How much white-space capacity is there?” IEEE DySPAN, 2010 White Space Channels Discrepancy in channel usage Unlicensed (ISM) bands are congested Licensed bands are free most of the time Unused channels can be used for data transmission When we consider the wireless spectrum, it gives us a feeling that it is a valuable resource. There is more and more wireless communication usage in our daily life. However… Taken from “How much white-space capacity is there?” IEEE DySPAN, 2010

Opportunistic Usage Unlicensed users must avoid interference to licensed user (or primary user, PU) Two Types: In band Scanning: Detect arrival of primary user to avoid causing interference to them Out of band Scanning: Detect channels currently not in use by licensed users Scanning takes time and results in throughput loss Scanning must be reliable Use Cooperation BS based model: BS collects scanning readings from users and aggregates Basestation model What if some users deliberately report incorrect results?

Malicious Cognitive Radio Users May not scan the channel Have a hardware error due to which its readings are erratic Reports arbitrary sensing results without performing any sensing to save time and/or energy Incorrectly report the channel to be busy (DoS attack) Objective: Identify the malicious users in the network

Related Work Existing algorithms (e.g., ADSP, Min et al. ICNP 2009) Divide the Cognitive Radios (CRs) in clusters All users in the same cluster are expected to have similar results If some node has substantially different result compared to its neighbors, it is marked as malicious

Limitations of the Related Work Presence of obstacles affect the readings Assumption that users in the same cluster have similar readings may not be true Vacant Busy Cluster Secondary Base Station (SBS) n1 Vacant n2 n3 Existing algorithms will label n1 as malicious

Limitations of the Related Work (contd.) Ground truth (State of the PU) is unknown Current algorithms detect malicious users reactively Users scan the channel and then base stations determine the malicious users BS may make multiple incorrect scanning decisions before it detects malicious users Incorrect scanning decisions cause interference to licensed users (Violation of FCC requirements)

Working of FastProbe Active Transmissions Based Approach: Proactively detect malicious users A subset of CRs (testing nodes) transmit PU-Emulated (PUE) signals Neighboring CRs are asked to scan the channel and report results back to the Base Station Malicious users can’t distinguish PUE signals from the actual PU signals and would report incorrect results. Mission Accomplished. Backup slides for PUE(2 types)

n5 did not participate in out of band sensing in this round Detecting Malicious Users (Out-of-Band Sensing) : FastProbe Illustration Link Historical Path Loss PathLoss (this round) n1 <-> n2 67 dB 66 dB n1 <-> n3 59 dB 60 dB n4 <-> n5 61dB 48 dB n4 <-> n6 46 dB 47 dB Reputation Value 0.8 -> 0.9 0.9 -> 0.95 0.82 -> 0.64 0.83 -> 0.89 Reputation Value 0.8 0.9 0.82 0.83 SBS n2 n1 n4 n3 n6 n5 Soft decision A difference of 13 dB: n5 did not participate in out of band sensing in this round Testing Nodes: n1, n4

Detecting Malicious Users (In-Band Sensing) FastProbe works similar as before SBS asks a subset of the users to transmit PUE signals The neighboring users must report the presence of PU within 2 seconds (FCC requirement)

Detecting Malicious Users (In-Band Sensing) : FastProbe Illustration SBS n2 and n3 must report the arrival of the licensed user within 2 seconds n1 n4 n2 n6 n5 n1 transmits PUE signals on the channel that n2 and n3 are currently using If not, mark them as malicious

Advantages of FastProbe Base Station has knowledge about the ground truth (e.g., transmission power level) for the tests It can more accurately conclude if the received power level reported by the tested node is correct Path loss readings compared with the previous readings for the same transmitter-receiver pair Uncertainties due to obstacles and multipath are removed

Other Challenges Answered in the Paper How do we test the nodes in the shortest possible time? Choose the set of testing nodes carefully Checking if the testing node itself is malicious and does not transmit PUE signals faithfully Aggregate data from neighboring CRs with high reputation How to make it difficult for the malicious users to distinguish PUE signals from the actual PU signals Transmit PUE signals at random power level Let multiple testing nodes transmit simultaneously to make it difficult to localize Detecting collusion of malicious users Use the SBS to transmit PUE signals Practical improvement PU-partern List the solution

Experiment Setup SBS CRs Wall affects the correlation among neighboring users CRs 3 PUs also deployed (not shown above) 5 channels in 2.4Ghz and 5Ghz spectrum Number of malicious CRs varied from 1 to 5

Experiments Setup (Contd.) Two different attack models: Attack 1: Malicious nodes sense the channel but they either report higher power level, lower power level or the correct power level, each with 1/3 probability . Attack 2: Multiple malicious CRs located close to each other collude so as to improve the reputation value of one of the malicious nodes.

Other Algorithms Implemented ADSP: “Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks”, Min et al., ICNP 2009 Arranges neighboring CRs in clusters CRs in the same cluster assumed to have similar readings Most of the existing algorithms work in a similar way

Experiment Results: Throughput Loss 65% lower loss Font size color FastProbe detects malicious users with up to 65% less throughput loss.

Experiment Results: Scanning Accuracy On an average, sensing accuracy of FastProbe is 1.2x of ADSP

Experiment Results: Detection Latency ADSP takes 4x longer On an average, ADSP takes 4x longer to detect malicious users

Thank you Summary Proposed an active transmissions based approach Proactively detect malicious CRs Detect malicious users that do not perform in-band sensing or out of band sensing Thank you

Simulation Setup 100 km X 100 km field Number of CRs: 400 Malicious CRs: 80 Number of PUs: 40 Number of Channels: 50

Simulation Results: Total Transmissions in FastProbe Number of transmissions done in FastProbe taper off since each user can test multiple neighbors

Simulation Results: Throughput Loss Throughput loss for ADSP is at least 2X compared to FastProbe for both the models FastProbe does not require multiple users to scan at the same time

Simulation Results under mobility: Throughput Loss Base Station in FastProbe knows the ground truth, and detects malicious users faster with lower overhead