FENG Guangsheng, LIN Junyu, ZHAO Qian, WANG Huiqiang, LYU Hongwu, ZHAO Xiaoyu, HAN Jizhong, LI Bingyang. A Differential Game Based Approach Against Objective Function Attack in Cognitive Networks[J]. Chinese Journal of Electronics, 2018, 27(4): 879-888. doi: 10.1049/cje.2017.08.006
Citation: FENG Guangsheng, LIN Junyu, ZHAO Qian, WANG Huiqiang, LYU Hongwu, ZHAO Xiaoyu, HAN Jizhong, LI Bingyang. A Differential Game Based Approach Against Objective Function Attack in Cognitive Networks[J]. Chinese Journal of Electronics, 2018, 27(4): 879-888. doi: 10.1049/cje.2017.08.006

A Differential Game Based Approach Against Objective Function Attack in Cognitive Networks

doi: 10.1049/cje.2017.08.006
Funds:  This work is supported by the National Natural Science Foundation of China (No.61502118, No.61402127, No.61370212) and the Natural Science Foundation of Heilongjiang Province in China (No.F2016028, No.F2016009, No.F2015029).
More Information
  • Corresponding author: LIN Junyu (corresponding author) was born in 1981. He received the M.E. and Ph.D. degrees from HEU in 2009 and 2014, respectively. Now, he is postdoctoral in Chinese Academe Sciences. His research interests include ubiquitous services and trustworthiness analysis. (Email:linjunyu.hrb@gmail.com)
  • Received Date: 2016-06-20
  • Rev Recd Date: 2016-11-28
  • Publish Date: 2018-07-10
  • We study the problem of defense strategy against Objective function attack (OFA) in Cognitive networks (CNs), where the network can be operated at the optimal state by adapting the parameters of its objective function. An OFA attacker can disrupt the parameter adaptation by interfering measures, which results in some operating parameters of the objective function deviating from their optimal settings. We first model the interactive process between the OFA attacker and defense system using differential game theory, and propose a defense strategy by introducing a new metric, namely, threat factor. Then, we obtain the optimal defense strategy by proving the existence of the saddle point of the proposed model. Moreover, this defense strategy is scale-free such that it can conquer a large number of OFAs in a decentralized way. Finally, we conduct extensive simulations to show that the proposed approach is effective.
  • loading
  • R.W. Thomas, D.H. Friend, L.A. Dasilva, et al., "Cognitive networks:adaptation and learning to achieve end-to-end performance objectives", IEEE Communications Magazine, Vol.44, No.12, pp.51-57, 2006.
    H. ElSawy, H. Dahrouj, T.Y. Al-Naffouri, et al., "Virtualized cognitive network architecture for 5G cellular networks", IEEE Communications Magazine, Vol.53, No.7, pp.78-85, 2015.
    A.H. Sakr and E. Hossain, "Cognitive and energy harvestingbased D2D communication in cellular networks:stochastic geometry modeling and analysis", IEEE Transactions on Communications, Vol.63, No.5, pp.1867-1880, 2015.
    F.H. Tseng, L.D. Chou, H.C. Chao, et al., "Ultra-dense small cell planning using cognitive radio network toward 5G", IEEE Wireless Communications, Vol.22, No.6, pp.76-83, 2015.
    C. Fortuna and M. Mohorcic, "Trends in the development of communication networks:Cognitive networks", Computer Networks, Vol.53, No.9, pp.1354-1376, 2009.
    L.T. Tan and L.B. Le, "Design and optimal configuration of fullduplex MAC protocol for cognitive radio networks considering self-interference", IEEE Access, No.3, pp.2715-2729, 2015.
    O. Lé on, J. Hernandez-Serrano and Soriano M, "A new crosslayer attack to TCP in cognitive radio networks", Proc. of IEEE Second International Workshop on Cross Layer Design, Palma de Mallorca, Spain, pp.1-5, 2009.
    Q. Pei, H. Li, J. Ma, et al., "Defense against objective function attacks in cognitive radio networks", Chinese Journal of Electronics, Vol.20, No.4, pp.138-142, 2011.
    S. Parvin, F.K. Hussain, O.K. Hussain, et al., "Cognitive radio network security:A survey", Journal of Network and Computer Applications, Vol.35, No.6, pp.691-1708, 2012.
    Y. Reddy, "Security Issues and Threats in Cognitive Radio Networks", Proc. of the Ninth Advanced International Conference on Telecommunications, Bangkok, Thailand, pp.84-89, 2013.
    J. Li, Z. Feng, P. Zhang, et al., "A survey of security issues in cognitive radio networks", China Communications, Vol.12, No.3, pp.132-150, 2015.
    T.C. Clancy and N. Goergen, "Security in cognitive radio networks:Threats and mitigation", Prof of the 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Singapore, pp.1-8, 2008.
    O. Lé on, J. Hernández-Serrano and M. Soriano, "Securing cognitive radio networks", International journal of communication systems, Vol.23, No.5, pp.633-652, 2010.
    S. Anand, Z. Jin and K. Subbalakshmi, "An analytical model for primary user emulation attacks in cognitive radio networks", Proc. of the 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, Chicago, USA, pp.1-6, 2008.
    A. Alahmadi, M. Abdelhakim and J. Ren, "Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard", IEEE Transactions on Information Forensics and Security, Vol.9, No.5, pp.772-781, 2014.
    B. Wang, Y. Wu, K. Liu, et al., "An anti-jamming stochastic game for cognitive radio networks", IEEE Journal on Selected Areas in Communications, Vol.29, No.4, pp.877-899, 2011.
    F. Yu, H. Tang, M. Huang, et al., "Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios", Proc. of the 2009 IEEE Military Communications Conference, Boston, USA, pp.1-7, 2009.
    R. Chen, J.M. Park and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks", Proc. of the INFOCOM 2008, Phoenix, USA, pp.1876-1884, 2008.
    D. Hlavacek and J.M. Chang, "A layered approach to cognitive radio network security:A survey", Computer Networks, No.75, pp.414-436, 2014.
    R.K. Sharma and D.B. Rawat, "Advances on security threats and countermeasures for cognitive radio networks:A survey", IEEE Communications Surveys & Tutorials, Vol.17, No.2, pp.1023-1043, 2015.
    Z. Shu, Y. Qian and S. Ci, "On physical layer security for cognitive radio networks", IEEE Network, Vol.27, No.3, pp.28-33, 2013.
    L. Ding, O. Savas and G.S. Ahn, "Securing cognitive radio networks with distributed trust management against belief manipulation attacks", Proc. of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, pp.1-6, 2015.
    S. Senthilkumar and C.G. Priya, "A review of channel estimation and security techniques for CRNS", Automatic Control and Computer Sciences, Vol.50, No.3, pp. 187-210, 2016.
    X. Liao, D. Hao and K. Sakurai, "Classification on attacks in wireless ad hoc networks:A game theoretic view", Proc. of the 20117th International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, pp.144-149, 2011.
    M. Liu and I. Traore, Empirical relation between coupling and attack ability in software systems:a case study on DOS, Proc. of the 2006 workshop on Programming languages and analysis for security, Ottawa, Canada, pp.57-64, 2006.
  • 加载中


    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (170) PDF downloads(169) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint