Detection of Jamming Attack in Cognitive Radio Networks: C Manogna, K Bhaskar Naik
Detection of Jamming Attack in Cognitive Radio Networks: C Manogna, K Bhaskar Naik
Detection of Jamming Attack in Cognitive Radio Networks: C Manogna, K Bhaskar Naik
________________________________________________________________________________________________
Cognitive
Radio
I. INTRODUCTION
Recently, the explosive growth of wireless services and
how the
primary
shows a
and the
_______________________________________________________________________________________________
ISSN (Online): 2347 - 2812, Volume-2, Issue -6,7 2014
70
B. Detection phase
The proposed IDS detection phase relies on nding the
point of change in the CRN operation as quickly as
possible under an attack. First, let us present a physical
layer jamming attack a follows. When a malicious user
jams a secondary users connection, the following
observations can be made. While the SS measured at
that secondary user remains high, his PDR usually
drops. This happens because the secondary user never
receives some/all of the packets sent to him. Our point
of interest is how to detect the change point in the PDR
behavior of a secondary user (targeted by a jamming
attacker).
In other words, how can the IDS find when the PDR of
the Secondary user is dropping significantly enough to
reflect the impact of a jamming attack? In the following,
our proposed IDS with cusum based anomaly detection
is presented to deal with this issue.
Assume that the IDS operates over equal time-rounds,
n (Where n = 1, 2, 3, ...). Let the mean of Fn during
the profiling period (i.e., no or low jamming attack
scenario) be represented by m. The idea is that the IDS
continues to monitor a significant change in the value of
m that can be considered as the influence of the
jamming attack. m remains close to one until an
anomaly occurs (which is later shown in Fig. 3).
However, an assumption of the nonparametric cusum
algorithm suggests that the mean value of the random
sequence should be negative during the normal
conditions and becomes positive upon a change.
Therefore, a new sequence Gn = Fn is obtained
where is the average of the minimum/negative peak
values of Fn during the profiling period (as shown in
Fig. 4). During a jamming attack, the increase in the
mean of Gn can be lower bounded by h = (2). Then, the
cusum sequence Yn is expressed as follows.
_______________________________________________________________________________________________
ISSN (Online): 2347 - 2812, Volume-2, Issue -6,7 2014
71
V. CONCLUSIONS
Jamming attack is one of the most dangerous attacks in
CRNs. In this paper, proposed a simple yet effective
detection method, which can be easily implemented in
the secondary users cognitive radio software. The
proposed method uses non-parametric cusum algorithm,
which offers anomaly detection. By learning the normal
mode of operations and system parameters of a CRN,
the proposed IDS is able to detect suspicious (i.e.,
anomalous or abnormal) behavior arising from a
jamming attack. In future, this work will perform further
investigations on how to enhance the detection
sensitivity of the IDS.
[4]
[5]
[6]
[7]
[8]
REFERENCES
[1]
[2]
[3]
_______________________________________________________________________________________________
ISSN (Online): 2347 - 2812, Volume-2, Issue -6,7 2014
72