Channel Detecting Jamming Attacks against Jump-Stay Based Channel Hopping Rendezvous Algorithms for Cognitive Radio Networks

Young-Hyun Oh, D. Thuente
{"title":"Channel Detecting Jamming Attacks against Jump-Stay Based Channel Hopping Rendezvous Algorithms for Cognitive Radio Networks","authors":"Young-Hyun Oh, D. Thuente","doi":"10.1109/ICCCN.2013.6614113","DOIUrl":null,"url":null,"abstract":"Recently many channel hopping algorithms have been studied to guarantee rendezvous for Cognitive Radio Networks (CRNs). These algorithms propose rendezvous methods without using common control channels (CCCs) to avoid the limitations such as single point of failure, low scalability, and jamming attacks. In particular, the Jump-Stay based channel hopping rendezvous (JSR) algorithms provide guaranteed rendezvous for CRNs with no time synchronization or CCCs (i.e., blind rendezvous). However, the JSR algorithms are still vulnerable to Channel Detecting Jamming Attacks (CDJAs) in which the jammer can estimate the channel hopping sequences within the first jump-pattern. The jammer can compute the entire JSR channel hopping sequence and thus reduce the rendezvous success rate from 100% to less than 20% and 10% using one and two listening channels respectively. To mitigate this problem, we revisit both the Random rendezvous scheme and the Role-based Channel Rendezvous (RCR) scheme extended from role- based rendezvous algorithms to increase the probability of the rendezvous against the CDJAs. We also compare the JSR algorithm to both the Random and RCR algorithms and show the Random and RCR vastly outperform the JSR algorithm when there are security concerns about a channel detecting jammer. Especially, the effectiveness of CDJA is negligible for the Random and RCR schemes but their expected time to rendezvous (TTR) is close to the JSR's expected TTR.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN.2013.6614113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

Recently many channel hopping algorithms have been studied to guarantee rendezvous for Cognitive Radio Networks (CRNs). These algorithms propose rendezvous methods without using common control channels (CCCs) to avoid the limitations such as single point of failure, low scalability, and jamming attacks. In particular, the Jump-Stay based channel hopping rendezvous (JSR) algorithms provide guaranteed rendezvous for CRNs with no time synchronization or CCCs (i.e., blind rendezvous). However, the JSR algorithms are still vulnerable to Channel Detecting Jamming Attacks (CDJAs) in which the jammer can estimate the channel hopping sequences within the first jump-pattern. The jammer can compute the entire JSR channel hopping sequence and thus reduce the rendezvous success rate from 100% to less than 20% and 10% using one and two listening channels respectively. To mitigate this problem, we revisit both the Random rendezvous scheme and the Role-based Channel Rendezvous (RCR) scheme extended from role- based rendezvous algorithms to increase the probability of the rendezvous against the CDJAs. We also compare the JSR algorithm to both the Random and RCR algorithms and show the Random and RCR vastly outperform the JSR algorithm when there are security concerns about a channel detecting jammer. Especially, the effectiveness of CDJA is negligible for the Random and RCR schemes but their expected time to rendezvous (TTR) is close to the JSR's expected TTR.
基于跳驻留的认知无线网络跳频交会算法的信道检测干扰攻击
为了保证认知无线网络的交会,近年来研究了多种信道跳变算法。这些算法提出了不使用公共控制通道(CCCs)的会合方法,以避免单点故障、低可扩展性和干扰攻击等限制。特别是,基于Jump-Stay的信道跳变交会(JSR)算法为没有时间同步或CCCs(即盲交会)的crn提供了有保证的交会。然而,JSR算法仍然容易受到信道检测干扰攻击(CDJAs),其中干扰者可以估计第一跳模式内的信道跳序列。干扰机可以计算整个JSR信道跳频序列,从而分别使用一个和两个侦听信道将交会成功率从100%降低到小于20%和10%。为了解决这个问题,我们重新研究了随机集合方案和基于角色的通道集合(RCR)方案,以增加针对CDJAs的集合的概率。我们还将JSR算法与Random和RCR算法进行了比较,并表明当存在有关信道检测干扰器的安全问题时,Random和RCR的性能远远优于JSR算法。特别是,CDJA的有效性对于随机和RCR方案可以忽略不计,但它们的预期交会时间(TTR)接近JSR的预期交会时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信