{"title":"用于跟踪认知无线电网络中用户攻击的安全优先簇间信道选择","authors":"Chandra Sekhar Musinana, K. Chilukuri, P. Reddy","doi":"10.14257/ijsia.2018.12.5.04","DOIUrl":null,"url":null,"abstract":"Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security problems like Tracking User Attack (TUA) into consideration. TUA might block the control information shared by a Cognitive Radio Network (CRN), if the attacker predicts the control channel frequency based on traffic analysis. This is a typical Denial of Service (DOS) attack preventing users from handoff to available channels. In cluster based channel selection, cluster heads will receive the channel information, about two users at a time and transmit the common preferred channel that was allocated to the base station. The base station selects a channel and returns it to the cluster head which returns them to the requesting CR users. For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks. In this work, we propose selection of available channels based on the priority of the cluster which we term Prioritized Inter Cluster Channel Selection (PICCS). The priority is essentially the history based reputation of the cluster calculated from the attackers in the cluster. Thus, instead of a random choice of a cluster for the available channel, during inter-cluster channel selection, we select a channel from the best available cluster. We observe the effect of such selection on both the delay and the handoffs in the presence of attackers and compare it with the channel selection scheme based on the nearest available cluster.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Prioritized Inter Cluster Channel Selection for Tracking User Attack in Cognitive Radio Networks\",\"authors\":\"Chandra Sekhar Musinana, K. Chilukuri, P. Reddy\",\"doi\":\"10.14257/ijsia.2018.12.5.04\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security problems like Tracking User Attack (TUA) into consideration. TUA might block the control information shared by a Cognitive Radio Network (CRN), if the attacker predicts the control channel frequency based on traffic analysis. This is a typical Denial of Service (DOS) attack preventing users from handoff to available channels. In cluster based channel selection, cluster heads will receive the channel information, about two users at a time and transmit the common preferred channel that was allocated to the base station. The base station selects a channel and returns it to the cluster head which returns them to the requesting CR users. For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks. In this work, we propose selection of available channels based on the priority of the cluster which we term Prioritized Inter Cluster Channel Selection (PICCS). The priority is essentially the history based reputation of the cluster calculated from the attackers in the cluster. Thus, instead of a random choice of a cluster for the available channel, during inter-cluster channel selection, we select a channel from the best available cluster. We observe the effect of such selection on both the delay and the handoffs in the presence of attackers and compare it with the channel selection scheme based on the nearest available cluster.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/ijsia.2018.12.5.04\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijsia.2018.12.5.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
动态频谱分配的发展是为了允许备用用户占用频谱漏洞,但当主用户返回时,备用用户必须切换,这就带来了跟踪用户攻击(Tracking User Attack, TUA)等新的安全问题。如果攻击者基于流量分析预测控制信道频率,则TUA可能会阻断认知无线网络(CRN)共享的控制信息。这是一种典型的拒绝服务(DOS)攻击,阻止用户切换到可用通道。在基于集群的信道选择中,集群头将一次接收大约两个用户的信道信息,并发送分配给基站的公共首选信道。基站选择一个信道并将其返回给集群头,集群头将它们返回给请求CR用户。在安全信道选择方面,可以通过基站对信息进行加密,在集群头部进行解密,防止DOS攻击。在这项工作中,我们提出了基于集群优先级的可用通道选择,我们称之为优先集群间通道选择(PICCS)。优先级本质上是根据集群中的攻击者计算出的基于历史的集群声誉。因此,在集群间通道选择期间,我们从最佳可用集群中选择一个通道,而不是随机选择可用通道的集群。我们观察了这种选择在攻击者存在时对延迟和切换的影响,并将其与基于最近可用集群的信道选择方案进行了比较。
Secure Prioritized Inter Cluster Channel Selection for Tracking User Attack in Cognitive Radio Networks
Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security problems like Tracking User Attack (TUA) into consideration. TUA might block the control information shared by a Cognitive Radio Network (CRN), if the attacker predicts the control channel frequency based on traffic analysis. This is a typical Denial of Service (DOS) attack preventing users from handoff to available channels. In cluster based channel selection, cluster heads will receive the channel information, about two users at a time and transmit the common preferred channel that was allocated to the base station. The base station selects a channel and returns it to the cluster head which returns them to the requesting CR users. For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks. In this work, we propose selection of available channels based on the priority of the cluster which we term Prioritized Inter Cluster Channel Selection (PICCS). The priority is essentially the history based reputation of the cluster calculated from the attackers in the cluster. Thus, instead of a random choice of a cluster for the available channel, during inter-cluster channel selection, we select a channel from the best available cluster. We observe the effect of such selection on both the delay and the handoffs in the presence of attackers and compare it with the channel selection scheme based on the nearest available cluster.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security