Académique Documents
Professionnel Documents
Culture Documents
ISBN:987-1-4799-3999-2
I.
INTRODUCTION
64
978-1-4799-3999-2/14/$31.002014 IEEE
reliability of transmitting sensing results for SU; nonrepudiation: agreement between the PU and the SU;
authentication: to assure the credibility of the CR users; and
stability: the ability to come back to equilibrium state after
being hindered by a physical disturbance [4].
The attacks generally follow a layered approach [4]. The
attacks such as Primary User Emulation (PUE) [5], Jamming
[6], and the Objective Function [4] occur in the Physical
Layer. The attacks such as Spectrum Sensing Data
Falsification (SSDF) [18] and the Control Channel Saturation
DoS [7-8] occur in the Link Layer. The attacks such as
Sinkhole [4], HELLO Flood [11] and Sybil attack [9] occur at
the Network Layer. The attacks such as the Lion Attack [10]
and Key Depletion Attack [11] occur at the Transport Layer.
Some attacks, such as Jamming Attack, might target one layer
and have influences and consequences over other layers, these
attacks are known as cross-layer attacks.
The rest of this paper is organized as follows: in Section II,
we show a general overview of cognitive. Section III presents
the general security requirements. The different attacks with
their mitigation techniques over physical layer are shown in
Section IV. Data link layer attacks as well as their mitigation
techniques are demonstrated in Section V. Section VI and VII
show the network layer attacks and transport layer attacks with
their mitigation techniques respectively. In Section VIII we
provide some few future directions that need to be addressed
by researchers. We conclude this paper in Section IX.
II.
ISBN:987-1-4799-3999-2
65
ISBN:987-1-4799-3999-2
66
ISBN:987-1-4799-3999-2
67
A. Hello Attack
An adversary broadcasts a message to all node of a
network stating that it is the best route to a specific destination
node in the network. The attacker use high power level to send
the broadcast message to convince all the other nodes that this
attacking node (adversary) is their neighbor. When the
attacker uses a high power level to send the broadcast
message, the other nodes will receive this message with good
signal strength and they assume that this attacking node is
very close to them while it is not in reality. The network nodes
will forward their packet destined to a particular node through
this attacking node with regular signal power level, but the
messages will be lost due to the far distance of the attacking
node (the forwarding node). Since all nodes of network
forward packets to an attacking node and their packet are lost,
they will find themselves with no neighbors after a while.
Different methods can be used to mitigate this attack. All
links between nodes should be bidirectional and this
functionality could be checked and verified by sending one
message over links and in presence of a trusted node which is
fusion center. The fusion center will initiate and verify the
session keys between any pair of network nodes. Two
purposes sit behind the use of session key which are verifying
the identity of the communication nodes to each other and
providing a ciphered link among them. If one node claims to
be a neighbor to a big number of network nodes, an alarm
should be raised about attacker detection.
B. Sinkhole Attack
In a sinkhole attack, an attacker advertises itself as the best
route to a specific destination, motivating neighboring nodes
to use it to forward their packets [8]. An attacker may use this
way to perform another attack called selective forwarding
where an attacker has the ability to modify or discard packets
from any node in the network. The attack is particularly
effective in the infrastructure and mesh architectures as all
traffic goes through an access point letting the attacker falsely
claim that it is the best route for packet forwarding.
To mitigate this attack, a fusion center is required to
authenticate the different network nodes. If a new node likes
to join the network, an authentication process should be
applied. This authentication process will add new nodes to the
network if and only they are well authenticated and identified.
If the attacker is one of the already authenticated nodes, a
periodic notification messages should be sent by the base
station to all network nodes about any doubt or
communication issues in the forwarded, dropped, and
modified packets, hence the attacker should be excluded and
discarded from the network. Another solution to mitigate the
sinkhole attack is to apply one of the on demand routing
protocols used in wireless sensor or ad hoc networks such as
security-aware ad hoc routing protocol, AODV, or DSR.
In these routing protocols, the source node that wants to send a
packet to another node establishes the path by sending route
request message. This message should contain a security
metric (level) that should be processed by intermediate nodes
to check if this level is satisfied or not. The message will be
68
ISBN:987-1-4799-3999-2
ISBN:987-1-4799-3999-2
Attack
Primary
User
Emulation (PUE)
Attack
Hello Attack
Targeted layer
Physical
Security requirement
Authentication
and
Availability
Physical
Objective
Function Attack
Spectrum Sensing
Data Falsification
Attack
Control Channel
Saturation Attack
Hello
Flood
Attack
Physical
Authentication
Availability
Authentication
Availability
Authentication
Availability
Data Link
Data Link
Network
Authentication
Availability
Authentication,
Availability,
and
and
and
and
Confidentiality
and
Integrity
Sinkhole Attack
Network
Authentication,
Availability,
Confidentiality
and
Integrity
Sybil Attack
Network
Authentication,
Availability,
Confidentiality
and
Integrity
Key
Depletion Transport
Confidentiality
and
Attack
Integrity
Lure Attack
Cross layers
Authentication,
Availability,
Confidentiality
and
Integrity
In general, to mitigate the previous mentioned attacks in CR
networks behaviors, a CR must possess four key
characteristics. First, CR has to possess the ability to make
authentication for the local nodes forming a cognitive radio
network. Second, CR has to be able to exchange information
with other cognitive radios in a strongly secure way. Third,
CR has to validate the information exchanged among the
different cognitive radios in the network. Last and not least,
CR has to be able to analyze the behavior of the different
nodes of one cognitive radio network.
VIII. FUTURE DIRECTIONS
As the security issues in CRN are still getting less attention
by researchers, we show some research directions that need
further investigations to make the CRN more secure.
A. Considering the existing security solutions.
In other types of wireless network such as cellular
networks, ad hoc wireless networks and mish networks,
different existing security protocols can be applied in the
context of CRN. In cellular networks, each user has a unique
identity which is called international mobile user identity
obtained by an access point. A secret key is shared between
the base station and the newly admitted nodes to apply
authentication mechanism.
The same authentication
mechanisms could be used between the secondary users and
the base station of the cognitive radio network.
B. Considering Cross-Layers Attacks
Some attacks might target one layer and have influences
and consequences over other layers, these attacks are known
as cross-layer attacks. In cognitive networks, there is an
inherent need for greater interaction between the different
layers of the protocol stack. Therefore, the cross-layer attacks
need to be given more attention in cognitive networks.
C. Devloping Cryptograohic Algorithms
Malicious node behaves in such a way to convince the
secondary users that it is a primary user and then start its
misbehaving work. Therefore, each primary user has to
provide its identity to other nodes in the network letting them
differentiate between legitimate primary users and malicious
69
ISBN:987-1-4799-3999-2
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
CONCLUSIONS
[16]
[17]
[18]
[19]
[20]
REFERENCES
[1]
[2]
[3]
70
[21]
[22]