請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/70867
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 張時中 | |
dc.contributor.author | Alessandro Galeazzi | en |
dc.contributor.author | 葛艾德 | zh_TW |
dc.date.accessioned | 2021-06-17T04:41:38Z | - |
dc.date.available | 2018-08-07 | |
dc.date.copyright | 2018-08-07 | |
dc.date.issued | 2018 | |
dc.date.submitted | 2018-08-06 | |
dc.identifier.citation | [1] Cisco White Paper. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016-2021. Tech. rep. Mar. 2017.
[2] M. Khasawneh and A. Agarwal. “A survey on security in Cognitive Radio networks”. In: 2014 6th International Conference on Computer Science and Information Technology (CSIT). Mar. 2014, pp. 64–70. [3] Ahmed Khattab, Dmitri Perkins, and Magdy Bayoumi. Cognitive Radio Networks: From Theory to Practice. Springer, Jan. 2013. [4] Olga Le´on and K. P. Subbalakshmi. “Cognitive Radio Network Security”. In: Handbook of Cognitive Radio. Ed. by Wei Zhang. Singapore: Springer Singapore, 2017, pp. 1–30. [5] J. M. Peha. “Approaches to spectrum sharing”. In: IEEE Communications Magazine 43.2 (Feb. 2005), pp. 10–12. [6] Joint Research Centre Ministero dello Sviluppo Economico. LSA pilot Sharing analysis in a live LTE network in the 2.3-2.4 GHz band Test configuration and results. Tech. rep. Sept. 2016. [7] D. Cabric, S. M. Mishra, and R.W. Brodersen. “Implementation issues in spectrum sensing for cognitive radios”. In: Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004. Vol. 1. Nov. 2004, 772–776 Vol.1. [8] A. S. Rawat et al. “Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks”. In: IEEE Transactions on Signal Processing 59.2 (Feb. 2011), pp. 774–786. [9] National Institute of Standards Computer Security Division Information Technology Laboratory and Technology. Minimum Security Requirement for Federal Information and Information System. Tech. rep. [10] Andrea Goldsmith. Wireless communications. Cambridge university press, 2005. [11] International Telecommunication Union. Radio Regulations. Tech. rep. 2016. [12] Chengqi Song and Qian Zhang. “Achieving Cooperative Spectrum Sensing in Wireless Cognitive Radio Networks”. In: SIGMOBILE Mob. Comput. Commun. Rev. 13.2 (Sept. 2009), pp. 14–25. ISSN: 1559-1662. [13] T. Yucek and H. Arslan. “A survey of spectrum sensing algorithms for cognitive radio applications”. In: IEEE Communications Surveys Tutorials 11.1 (2009), pp. 116–130. [14] Bell Lab. Bell Labs Consulting report. Tech. rep. 2016. [15] Luigi Atzori, Antonio Iera, and Giacomo Morabito. “The internet of things: A survey”. In: Computer networks 54.15 (2010), pp. 2787–2805. [16] M. R. Akdeniz et al. “Millimeter Wave Channel Modeling and Cellular Capacity Evaluation”. In: IEEE Journal on Selected Areas in Communications 32.6 (June 2014), pp. 1164–1179. [17] Y. c. Liang et al. “Guest Editorial - Advances in cognitive radio networking and communications (I)”. In: IEEE Journal on Selected Areas in Communications 29.2 (Feb. 2011), pp. 273–275. [18] S. Maleki, A. Pandharipande, and G. Leus. “Energy-Efficient Distributed Spectrum Sensing for Cognitive Sensor Networks”. In: IEEE Sensors Journal 11.3 (Mar. 2011), pp. 565–573. [19] Z. Ji and K. J. R. Liu. “COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS – Dynamic Spectrum Sharing: A Game Theoretical Overview”. In: IEEE Communications Magazine 45.5 (May 2007), pp. 88–94. [20] Haiyun Tang. “Some physical layer issues of wide-band cognitive radio systems”. In: First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. Nov. 2005, pp. 151–159. [21] J. Lunden et al. “Spectrum Sensing in Cognitive Radios Based on Multiple Cyclic Frequencies”. In: 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications. Aug. 2007, pp. 37–43. [22] Al-Sakib Khan Pathan, Hyung-Woo Lee, and Choong Seon Hong. “Security in wireless sensor networks: issues and challenges”. In: Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference. Vol. 2. IEEE. 2006, 6–pp. [23] Tao Qin et al. “Towards a trust aware cognitive radio architecture”. In: ACM SIGMOBILE Mobile Computing and Communications Review 13.2 (2009), pp. 86–95. [24] Muhammad Waseem Akram et al. “A review: Security challenges in cognitive radio networks”. In: Automation and Computing (ICAC), 2017 23rd International Conference on. IEEE. 2017, pp. 1–6. [25] Keith A. Stouffer, Joseph A. Falco, and Karen A. Scarfone. SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations Such As Programmable Logic Controllers (PLC). Tech. rep. Gaithersburg, MD, United States, 2011. [26] S. Anand, Z. Jin, and K. P. Subbalakshmi. “An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks”. In: 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks. Oct. 2008, pp. 1–6. [27] M. Gupta, A. Jain, and A. Soni. “A survey: Render of PUE attack in cognitive radio compressed by software defined radio”. In: 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). Mar. 2016, pp. 4029–4034. [28] X Huang et al. “Coalition based optimization of resource allocation with malicious user detection in cognitive radio networks”. In: KSII Transactions on Internet and Information Systems 10 (Oct. 2016), pp. 4661–4680. [29] Z. Qin, Y. Gao, and M. D. Plumbley. “Malicious User Detection Based on Low-Rank Matrix Completion in Wideband Spectrum Sensing”. In: IEEE Transactions on Signal Processing 66.1 (Jan. 2018), pp. 5–17. [30] Tao Qin et al. “Towards a Trust Aware Cognitive Radio Architecture”. In: SIGMOBILE Mob. Comput. Commun. Rev. 13.2 (Sept. 2009), pp. 86–95. ISSN: 1559-1662. [31] C. S. Hyder et al. “ARC: Adaptive Reputation based Clustering Against Spectrum Sensing Data Falsification Attacks”. In: IEEE Transactions on Mobile Computing 13.8 (Aug. 2014), pp. 1707–1719. [32] M. Najimi et al. “Energy-Efficient Sensor Selection for Cooperative Spectrum Sensing in the Lack or Partial Information”. In: IEEE Sensors Journal 15.7 (July 2015), pp. 3807–3818. [33] M. Ghaznavi and A. Jamshidi. “A Reliable Spectrum Sensing Method in the Presence of Malicious Sensors in Distributed Cognitive Radio Network”. In: IEEE Sensors Journal 15.3 (Mar. 2015), pp. 1810–1816. [34] L. Ma et al. “Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel”. In: IEEE Transactions on Vehicular Technology 67.5 (May 2018), pp. 3950–3963. [35] H. Lin et al. “A Secure Collaborative Spectrum Sensing Strategy in Cyber-Physical Systems”. In: IEEE Access 5 (2017), pp. 27679–27690. [36] F. F. Digham, M. S. Alouini, and M. K. Simon. “On the Energy Detection of Unknown Signals Over Fading Channels”. In: IEEE Transactions on Communications 55.1 (Jan. 2007), pp. 21–24. [37] Steven Tadelis. Game Theory an Introduction. Princeton University Press, 2013. [38] Ariel Rubinstein. “Equilibrium in Supergames with the Overtaking Criterion”. In: Journal of Economic Theory 21.1 (1979), pp. 1–9. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/70867 | - |
dc.description.abstract | Cognitive Radio Network appears to be one of the suitable technologies to realize shared accesses of licensed spectrum by secondary users for increasing spectrum efficiency. One main advantage of Cognitive Radio Network is the possibility to implement a distributed cooperative spectrum sensing mechanism. Although it has been proven that the distributed sensing paradigm has many advantages respect to a centralized approach, it leaves rooms for new security threats such as Spectrum Sensing Data Falsification attack, where malicious users inject fake spectrum information to disrupt spectrum sharing. This can lead to missing transmission opportunities and cause interferences to the licensed users. In this thesis we consider a Cognitive Radio Network with three entities: Primary Users (PUs), Secondary Users (SUs) and Fusion Center (FC). PU is the licensed user that has transmission priority over the spectrum, SUs sense the spectrum and opportunistically transmit through channels unused by the PU. FC collects the sensing results from SUs, takes decision about spectrum occupancy and coordinates the spectrum access of SUs. In this CRN, there is the need to mitigate the falsification attacks by malicious secondary users (MSUs) so that FC decisions on channel occupancy are resilient to fake reports. There are two prominent research problems:
I How to mitigate negative impacts by MSUs on FC decisions through non-MSUs’ sensing and assessment? II How to achieve Non-Repudiation of non-Malicious users so that non-Malicious users are not banned from the network? In this research thesis, we look at the two problems from a prospective that is missing in most of the previous approaches. First, we consider the whole scenario as a multi-agent system in which two different types of users pursue different objectives. From this point of view, we design an Effective Reputation Mechanism for Security, called ERMeS. This data fusion mechanism is based on the concept of reputation and exploits local sensing information. The first innovation of this research work is the exploitation of devices’ cognitive capability to build reputations indexes among clustered neighboring second users. Reputation i) is built on the comparison between user’s and neighbor’s sensed spectrum occupancy information and ii) is updated according to neighbors’ assessments and past reputation history. For each user we then propose a general framework, based on oneself and neighbors sensing and reputation data, to model the reputations updating. The second innovation is the design of ERMeS, a fusion mechanism to combine the distributed reputations assessed by users and obtain a unique reputation value for each neighbor device. More precisely, from all the reputations a user got from its neighbors, we obtain a value that represent its global reputation in the network. The FC then exploits these values as the weights for users’ spectrum reports during the final decision. The third innovation is the proof of a Nash equilibrium of the system in presence of only non-malicious users and perfect correlation among spectrum sensed data. We analyze the interaction among non-malicious users as a Nash Game and find requirements on the non-malicious users reputation updating policy to induce a Nash equilibrium with desirable properties. Under these assumption, we also provide a bound on the maximum percentage of malicious users that the mechanism can mitigate. The forth innovation is the analysis of imperfect sensing and malicious users impact on mechanism performance. In particular we address how uncorrelated sensing and malicious users can affect the reputation among non-malicious users and how this can impact the mechanism error rate. The fifth innovation is the design and analysis of a strategy for non-malicious users resilient to noise and malicious users presence that is still able to satisfy the condition of the Nash equilibrium in perfect case. For our scenario, we consider two types of secondary users: Honest (HSU) and Malicious (MSU). We assume that HSUs aim to increase their transmission opportunity and do not lie on spectrum reports, but we do admit that they can change their reputation indexes. Opposite, MSUs aim to disrupt the sensing mechanism and lie systematically on spectrum data and reputation, but they do not care about transmission resources. Under this scenario, in case of noisy sensing numerical simulation on the mechanism behavior has been performed to find the following: F1. A noise tolerant, malicious user resilient strategy for non-malicious users based on a probabilistic analysis on noise level and channel numbers. F2. Maximum level of noise tolerable by the noise tolerant strategy for non-malicious user. More precisely, we use both probabilistic analysis to find the best value for the error tolerance threshold and the verify it by simulating the mechanism. Then we focus on the noise level and make simulation to understand how this impacts the mitigation capability of this strategy. We considered a scenario with 10 channels and 12 users and simulate 100 sensing rounds 100 times. Our simulations show that in this case if the sensing mismatch probability is lower than 0.1, our mechanism can effectively reduce the FC decision error rate also in the presence of 5 malicious users. | en |
dc.description.provenance | Made available in DSpace on 2021-06-17T04:41:38Z (GMT). No. of bitstreams: 1 ntu-107-R06942124-1.pdf: 4445083 bytes, checksum: b768ea129000a0aefd2481bec9ba03db (MD5) Previous issue date: 2018 | en |
dc.description.tableofcontents | 1 Introduction 1
1.1 Motivation: Cognitive Radio Network and Spectrum Sensing Falsification Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Scope of the Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2.1 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2.2 Research Methodology . . . . . . . . . . . . . . . . . . . . . . . 3 1.3 Organization of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 Security threats in Cognitive Radio Networks 5 2.1 Introduction to wireless network . . . . . . . . . . . . . . . . . . . . . . 5 2.1.1 Wireless Network Environment . . . . . . . . . . . . . . . . . . 6 2.1.2 Frequency allocation . . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.3 Traffic Forecast and Spectrum Efficiency . . . . . . . . . . . . . 7 2.2 Spectrum Sharing in Cognitive Radio Network . . . . . . . . . . . . . . 8 2.2.1 Sensing Techniques . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.2.2 Dynamical Spectrum Access . . . . . . . . . . . . . . . . . . . . 12 2.3 Security Threats in Cognitive Radio Network . . . . . . . . . . . . . . . 13 2.3.1 Overwiev of Security threats . . . . . . . . . . . . . . . . . . . . 14 2.3.2 Cognitive Radio Network security threats . . . . . . . . . . . . . 15 2.3.3 Spectrum Sensing Data Falsification Attack . . . . . . . . . . . . 16 2.3.4 Selfish Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.3.5 Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3 Security Mechanism Design for SSDF Attack Mitigation in CRN 20 3.1 CRN with Cooperative Sensing and Centralized Decision . . . . . . . . . 21 3.1.1 Primary User . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 3.1.2 Fusion Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 3.1.3 Secondary Users . . . . . . . . . . . . . . . . . . . . . . . . . . 22 3.1.4 Neighbors’ Reputation . . . . . . . . . . . . . . . . . . . . . . . 24 3.1.5 System Dynamics . . . . . . . . . . . . . . . . . . . . . . . . . 26 3.2 Channel model and detection probabilities . . . . . . . . . . . . . . . . . 27 3.2.1 PU Transmission Detection Probability . . . . . . . . . . . . . . 28 3.2.2 False Alarm Probability . . . . . . . . . . . . . . . . . . . . . . 29 3.3 Data Collection and Fusion . . . . . . . . . . . . . . . . . . . . . . . . . 29 3.3.1 Sensing Data Processing and Fusion . . . . . . . . . . . . . . . . 31 3.3.2 Reputation Indexes Updating . . . . . . . . . . . . . . . . . . . . 32 3.3.3 Channel Occupancy Decision . . . . . . . . . . . . . . . . . . . 33 3.4 Summary of SSDF attack Mitigation Mechanism . . . . . . . . . . . . . 34 3.4.1 Mechanism work flow . . . . . . . . . . . . . . . . . . . . . . . 34 3.4.2 Mechanism Rationale . . . . . . . . . . . . . . . . . . . . . . . . 35 3.4.3 HSU Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 3.4.4 MSU Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 4 Reputation Report as assessed by HSU under Perfect Correlation Scenario 39 4.1 Nash Game formulation of Reputation Report among HSUs . . . . . . . 40 4.2 Analysis of Unilateral Deviation by a HSU . . . . . . . . . . . . . . . . . 41 4.2.1 Two Stage Deviation . . . . . . . . . . . . . . . . . . . . . . . . 42 4.2.2 Multi stage Deviation . . . . . . . . . . . . . . . . . . . . . . . . 48 4.2.3 Infinite stage deviation . . . . . . . . . . . . . . . . . . . . . . . 50 4.3 Reputation Report as Assessed a Nash Equilibrium . . . . . . . . . . . . 52 4.3.1 HSU perfect sensing equilibrium . . . . . . . . . . . . . . . . . . 52 5 Impact Analysis and HSU Strategy Design under Imperfect Correlation and MSU Presence 55 5.1 MSU Tolerance under Perfect Correlation . . . . . . . . . . . . . . . . . 55 5.1.1 MSU Falsification Strategy . . . . . . . . . . . . . . . . . . . . . 55 5.1.2 MSU tolerance . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 5.2 Probability distributions between two reports . . . . . . . . . . . . . . . 59 5.2.1 Sensing Mismatch probability . . . . . . . . . . . . . . . . . . . 59 5.2.2 Distribution of Hamming distance between HSU and MSU reports 62 5.3 HSU Reputation Assessment Strategy Design . . . . . . . . . . . . . . . 63 5.4 Simulation Study of Impacts on ERMeS by Noise level and Percentage of MSUs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 5.4.1 Final Remarks . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 6 Conclusions and Future work 73 6.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 6.2 Future works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 References 76 | |
dc.language.iso | en | |
dc.title | 基於名譽與頻譜感知資料融合以減輕認知無線電網路偽造攻擊之機制設計 | zh_TW |
dc.title | Reputation and Spectrum Sensing Data Fusion Mechanism for Mitigating a Falsification Attack in Cognitive Radio Network | en |
dc.type | Thesis | |
dc.date.schoolyear | 106-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 魏學文,曾文方,張文熙,Nicola Laurenti(Nicola Laurenti),Nicola Laurenti(Michele Zorzi) | |
dc.subject.keyword | 頻譜共享,認知無線電網路安全性,合作式頻譜感知,頻譜感知偽造攻擊,賽局理論, | zh_TW |
dc.subject.keyword | Spectrum Sharing,Cognitive Radio Network Security,Cooperative Spectrum Sensing,Spectrum Sensing Data Falsification Attack,Game Theory, | en |
dc.relation.page | 79 | |
dc.identifier.doi | 10.6342/NTU201802335 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2018-08-06 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電信工程學研究所 | zh_TW |
顯示於系所單位: | 電信工程學研究所 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-107-1.pdf 目前未授權公開取用 | 4.34 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。