{"title":"Securing Cognitive Radio Networks with Distributed Trust Management against Belief Manipulation Attacks","authors":"Lei Ding, O. Savas, Gahng-Seop Ahn, Hongmei Deng","doi":"10.1109/GLOCOMW.2015.7414012","DOIUrl":null,"url":null,"abstract":"In Cognitive Radio Networks (CRNs), Cognitive radios (CRs) learn from their environment and adapt to the environment based on their learned beliefs accordingly. Malicious nodes may exploit the cognitive engine of CRs, and conduct belief manipulation attacks to degrade the network performance. In this paper, we address the problem of belief manipulation attacks and develop a distributed trust management strategy to detect and mitigate such attacks in CRNs. Specifically, we first study the impact of malicious behaviors to the network performance, and define trust evaluation metrics to capture malicious behaviors. We then illustrate how to incorporate distributed trust management to mitigate the effectiveness of belief manipulation attacks to enhance the security in CRNs. Performance evaluation results show that the network end-to-end throughput is significantly improved compared to the case when all users are by default trusted to be normal users.","PeriodicalId":315934,"journal":{"name":"2015 IEEE Globecom Workshops (GC Wkshps)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Globecom Workshops (GC Wkshps)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOMW.2015.7414012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In Cognitive Radio Networks (CRNs), Cognitive radios (CRs) learn from their environment and adapt to the environment based on their learned beliefs accordingly. Malicious nodes may exploit the cognitive engine of CRs, and conduct belief manipulation attacks to degrade the network performance. In this paper, we address the problem of belief manipulation attacks and develop a distributed trust management strategy to detect and mitigate such attacks in CRNs. Specifically, we first study the impact of malicious behaviors to the network performance, and define trust evaluation metrics to capture malicious behaviors. We then illustrate how to incorporate distributed trust management to mitigate the effectiveness of belief manipulation attacks to enhance the security in CRNs. Performance evaluation results show that the network end-to-end throughput is significantly improved compared to the case when all users are by default trusted to be normal users.