DEFENSE AGAINST SPECTRUM SENSING DATA FALSIFICATION ATTACKS IN COGNITIVE RADIO NETWORKS - Chowdhury Sayeed Hyder, Brendan Grebur and Li Xiao Li Xiao Department of Computer Science & Engineering Michigan State University Outline Background ◦ Cognitive Radio Network ◦ The IEEE Standard SSDF Attacks Problem Statement ◦ Attack Model Existing solutions ARC scheme Simulation Results ◦ Error rate ◦ True/ false detection rate Securecomm 2011 2 Background Figure: Current Spectrum Allocation in US Figure: Underutilized Spectrum Ref: Akyildiz, I., W. Lee, M. Vuran, and S. Mohanty, “NeXt Generation/ Dynamic Spectrum Access/ Cognitive Radio Wireless Networks: A Survey”, Computer Networks 2006 Securecomm 2011 3 Background Current Status ◦ Spectrum Scarcity ◦ Underutilized spectrum Cognitive radio (CR) ◦ Adapt its transmission and reception parameters (frequency, modulation rate, power etc.) Securecomm 2011 4 Background Cognitive Radio Network ◦ Two types of user Primary user or licensed user (PU) Secondary user or opportunistic user (SU) ◦ Requirements SU cannot affect ongoing transmission of PUs Must vacant the spectrum if PU arrives ◦ Spectrum Sensing Securecomm 2011 5 Background IEEE 802.22 standard ◦ Centralized, single hop, point to multipoint ◦ Collaborative spectrum sensing Quiet Periods (QP) Sensing period and frequency Must vacant at the arrival of PU False alarm and misdetection rate ◦ Inter cell synchronization Securecomm 2011 6 Background Vulnerable against security threats!! SU PU SU SU BS SU SU PU Figure: 802.22 CRN Architecture Ref: K. Bian and J. Park, “Security vulnerabilities in IEEE 802.22”, Proceedings of the 4th Annual International Conference on Wireless Internet WICON '08 Securecomm 2011 7 SSDF Attacks - Independent Attack - Collaborative Attack PU SU SU SU BS SU SU PU Figure: 802.22 CRN Architecture How can BS defend against the SSDF attack ? Securecomm 2011 8 Problem Statement Network Model ◦ 802.22 Attack Model ◦ Independent Attack Attack randomly ◦ Collaborative Attack Going Against Majority Attack Subgroup Attack Our goal is to minimize the error in deciding about the spectrum availability by BS in addition to detecting the attackers and reducing the false detection rate. Securecomm 2011 9 Problem Statement Detection probability of an honest user (Pd) Detection probability of an independent attacker (Pdm ) Detection probability of collaborative attackers (Qdm) Securecomm 2011 10 Problem Statement Attackers’ goal ◦ Increase the error rate and disguise their intention. ◦ Collaboration makes it easier. BS’s goal ◦ Correct decision making. ◦ Identify attackers and minimize the impact of their collaboration. Solution ◦ Reduce their strength of collaboration. ◦ Differentiate between honest and dishonest nodes. Securecomm 2011 11 Existing Solutions Reputation based [1] ◦ BS fails to take a correct decision for 35% attackers ◦ High misdetection rate K-nearest neighbor [2] ◦ Works well for independent SSDF attack ◦ Threshold selection is critical Ref: [1] A. Rawat, P. Anand, C. Hao and P. Varshney, “Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks”, IEEE Transactions on Signal Processing 2011 [2] H. Li and Z. Han, “Catching Attackers for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach”, DySPAN 2010. Securecomm 2011 12 Adaptive Reputation-based Clustering (ARC) Scheme Collection: BS collects node reports Clustering: k-medoid clustering using PAM Voting: Intra-cluster weighted voting Inter cluster majority voting Feedback: Cluster adjustment Reputation adjustment Securecomm 2011 13 Adaptive Reputation-based Clustering (ARC) Scheme Intra-cluster weighted voting ◦ Further from median, less voting power Majority cluster voting ◦ Decision of majority clusters becomes the final decision Securecomm 2011 14 Adaptive Reputation-based Clustering (ARC) Scheme Clusters with poor reputation removed Number of clusters is adjusted Reputation of nodes is adjusted based on ◦ cluster's vote ◦ distance from median and ◦ node’s current vote Securecomm 2011 15 Results Simulation tool: MATLAB Simulation Parameters ◦ ◦ ◦ ◦ ◦ Number of attackers 10% - 50% Probability of attack 0.1 – 1.0 Number of runs – 10 Prob. of false alarm 0.1 Prob. of miss detection 0.1 Securecomm 2011 16 Results Compared to Rawat et al. reputation-based method (R) Collaborative and Independent SSDF attacks ◦ Number of attackers ◦ Probability of attack ◦ Probability of detection Performance metrics ◦ Probability of error (QE) ◦ Attacker Detection Rate (QD) ◦ Attacker Misdetection Rate (QF) Securecomm 2011 Rawat Reputation Method: 1) Node majority vote for N frames. 2) Remove users with M or more differences. 3) Repeat. 17 Results Collaborative SSDF Attack Figure 1: QD , QE , QF vs # of attackers • Significant improvement in reducing error rate • Moderate true detection rate • Huge improvement in reducing false detection rate Securecomm 2011 18 Results Collaborative SSDF Attack Figure 2: QD , QE , QF vs prob. of attack • Huge improvement in reducing error rate • Significant true detection rate • Huge improvement in reducing false detection rate Securecomm 2011 19 Results Collaborative SSDF Attack Figure 3: QD , QE , QF vs prob. of detection • Significant improvement in reducing error rate • Moderate true detection rate • Huge improvement in reducing false detection rate Securecomm 2011 20 Results Collaborative SSDF Attack (Subgroup attack) Figure 4: QD , QE , QF vs # of attackers • Huge improvement in reducing error rate • Similar true detection rate • Huge improvement in reducing false detection rate Securecomm 2011 21 Results Collaborative SSDF (GAMA) Attack Figure 5: QD , QE , QF vs # of attackers • Significant improvement in reducing error rate • Moderate true detection rate • Significant improvement in reducing false detection rate Securecomm 2011 22 Results Independent SSDF Attack Figure 6: QD , QE , QF vs # of attackers • Similar error rate • Moderate true detection rate • Huge improvement in reducing false detection rate Securecomm 2011 23 Results Independent SSDF Attack Figure 7: QD , QE , QF vs prob. of attack • Slight improvement in reducing error rate • Similar true detection rate • Significant improvement in reducing false detection rate Securecomm 2011 24 Results Independent SSDF Attack Figure 8: QD , QE , QF vs prob. of detection • Slight improvement in reducing error rate • Huge improvement in reducing false detection rate Securecomm 2011 25 Conclusion & Future Work Devised robust decision-making algorithm for CRNs Displays better performance than current schemes ARC can minimize error rate consistently ◦ Low attacker misdetection rates ◦ Does not require any prior knowledge ◦ Applicable to both Independent and Collaborative attacks Future Work ◦ Explore a GA method for determining optimal number of clusters (k values) ◦ Explore different attacking strategies Securecomm 2011 26 Questions ?