Escolar Documentos
Profissional Documentos
Cultura Documentos
I. Introduction
As a limited natural resource, wireless spectrum becomes
increasingly scarce with the ever-increasing number of users,
and the utilization ratio is a critical problem in wireless applications, then cognitive radio appears. In cognitive radio
networks, CR can adapt to parameters by checking the state
of dynamic spectrum without causing any interference to primary users and make full use of the limited amount of spectrum so that the spectrum utilization ratio can be increased
and the Cognitive radio networks (CRNs) can reach the optimum condition. Compared with traditional wireless radios,
CR can provide data for later decision-making by learning[1] .
Similar to traditional wireless networks, CRNs also have
security problems. These threats such as dynamic spectrum
access threats (spectrum sensing threats, spectrum management threats, spectrum mobility threats[7] and spectrum shar-
II. Background
1. Basic PSO algorithm
PSO is inspired by observing the bird ocking or sh
schooling. Scientists found that the synchrony of ocking behavior was by maintaining optimal distances between individual members and their neighbors. Scientists perceived that in
order to nd food the individual members determined their
velocities by two factors, their own best previous experience
and the best experience of all other members, called pbest and
gbest. The formula is as follows:
v[] =v[] + c1 rand() (pbest[] present[])
+ c2 Rand() (gbest[] present[])
present[] =present[] + v[]
Manuscript Received Dec. 2009; Accepted Jan. 2010. This work is supported by the National Natural Science Foundation of China
(No.60803150, No.60803151), the National High Technology Research and Development Program of China (No.2008AA01Z411), the Key
Program of NSFC-Guangdong Union Foundation (No.U0835004), China Postdoctoral Science Foundation (No.20090451) and the Planned
Science and Technology Project of Shannxi Province (No.2009K08-38).
s.t.
G(x, y) 0
min fi (x, yi )
y1
s.t.
gi (x, yi ) 0,
i = 1, 2, , m
139
process is secure. Fig.2 shows the state under assault: attackers tamper data before CR optimize all parameters, and as a
result CR can not reach the set objective, and these behaviors
lead to worse parameter setting of CR systems.
Objective function attacks are that attackers prevent CR
from adaptive change by tampering data[9] . Suppose a simple
cognitive radio system only has three goals, low-power, highrate, and secure communication, then the total objective function is as follows: f = 1 P + 2 R + 3 S, where i , i = 1, 2, 3
are the weights and P, R, and S represent the three goals of
power, rate, and security. Imagine an attacker wishes to force
a radio to use some security level s1 rather than the more secure version s2 , where s1 < s2 . Whenever the cognitive engine
tries using s2 , the attacker can articially decreasing R from
r2 to r1 with r1 < r2 . In particular, an attacker would need
to cause sucient interference such that
1 P + 2 r 2 + 3 s1 > 1 P + 2 r 1 + 3 s2
3
or solving for r1 : r1 < r2
(s2 s1 ). Thus, once CR
2
wants to change S, the total objective function will change,
and this leads to bad setting of parameters. Attackers get all
parameters in every way and they could prevent CR manipulating only by computing r1 . This is called Objective function
attack[4] . Attackers reach their goals as Fig.3 shows.
The signicant dierence between cognitive radio and traditional wireless radio is that CR can adapt to parameters itself
by sensing and learning from around, especially from memory.
However, with objective function attacks, CR can not adapt
to parameters, leading to worse performance. How to defend
objective function attacks? We propose a scheme as follows.
In objective function attacks, attackers tamper parameters to prevent CR from adjusting parameters. How can we
detect the tampered parameter and correct it in order to
make CR setting perfect? According to the form of objective
function attacks, we assume CR has n sub-objectives, fi (x),
i = 1, 2, , n, then the total objective function is:
f=
n
i fi (x)
i=1
n
i=1
n
i = 1.
i=1
140
n
(t) (t)
i fi (x).
i=1
n
(t)
(t1)
i fi (x) fi
(x)k
(1)
i=1
i=j
min
n
(t1)
fi
(x)k
(2)
i=1
i=j
V. Simulations
max
n
(7)
Generally speaking, attackers can only tamper a few subobjective functions. For their own benets, they often tamper one parameter with a large margin. At this moment,
CR detects the wave range of every sub-objective function
(t) (t)
and searches for wave radius R, R = max i fi (x)
(t1) (t1)
fi
(x). Then CR compares sub-objective function
i
around R with tness value by response to the external environment. If these sub-objective functions deviate from tness
values, we consider it as attackers behavior. After this, CR
redistributes every parameter to make the system state optimal.
We can calculate the tness of the ith sub-objective in time
k+1 according to velocity calculating in PSO. The tness value
of the ith sub-objective in time k + 1 is:
vik+1 = vik + c1 rand(pbest vik ) + c2 Rand(gbest vik )
1
(t)
i fi (x)
2011
(t)
(t1)
i fi (x) fi
(x)k
< mj
(3)
i=1
i=j
mj is a xed value:
(t)
(t1)
mj = j fj (x) fj
(x)
f = max n
(4)
i=1 i fi (x)
s.t.
k
n
(t)
(t1)
k
i fi (x) fi
(x)
(5)
min
i=1
i
=
j
s.t.
k
n
(t)
(t1)
k
f
(x)
f
(x)
< mj
(6)
max
i
i
i
i=1
i=j
(t)
(t1)
mj = j fj (x) fj
(x), j = 1, 2, , n
Eq.(4) indicates the optimum total objection function with
the restriction of Eqs.(5) and (6). From Eq.(5) we can see the
uctuation should be as small as possible except the jth parameter. Besides, the uctuation has an upper limit in Eq.(6).
We can decide whether attackers behavior work according to
Eq.(6). If Eq.(6) still holds, even if attackers have tampered
some parameters, the attack will be meaningless. If Eq.(6)
doesnt hold, the attack will be eective. Therefore, CR should
nd out the tampered parameter and x it to make the system
state perfect.
In order to illustrate the performance of the bilevel programming model, we choose 5 common sub-objectives to analyze adaptivity(A), learning capacity(L), security(S), sensitivity(Se) and transmission rate(V) respectively. Table 1 shows
the optimal state in time t 1:
Table 1. Parameter
A
Sub-objective
0.7
weight
0.4
Total objective
setting in time t 1
L
S
Se
V
0.5
0.4
0.8
0.3
0.3
0.15
0.1
0.05
0.585
parameter in time t
L
S
Se
V
0.5
0.9
0.7
0.28
0.3
0.15
0.1
0.05
0.529
max
n
(t)
(t1)
i fi (x) fi
(x)k
> mj
i=1
i=j
141
S
0.500
Table 5. Weights
1
2
3
4
0.3
0.1
0.2
0.4
To improve communication security, both sides need to alter security level next time. So they set s4 lager, s4 = 0.8. At
this moment, the malicious node jam the channel, articially
decreasing sub-objective from s1 to s1 , s.t.
s = 1 s1 + 2 s2 + 3 s3 + 4 s4 < s
Fig. 5. One parameter tampered
VI. Conclusion
pering, parameters become dierent shown as (b). The malicious tampering leads to the result that CR keeps settings in
last time t 1 perpetually. With our bilevel programming, we
can detect and control parameters, and then adapt them to
surroundings as is shown in (d).
The results show that no matter how many parameters are
tampered by attackers, our bilevel programming works. This
bilevel programming can defend objective function attacks effectively.
Let simple communication parameters be sub-objectives,
To defend Objective Function Attacks in cognitive radios, we propose an appropriate proposal called MOP (Multiobjective programming model). After attackers obtain all parameters, CRs detect them and compare them with tness
value with MOP to decide whether attackers exist. If so, then
CR readjusts the tampered parameters to optimal settings. All
these ensure that CR adapts to surroundings intelligently. Besides using MOP repeatedly (this will increase computation),
if CR needs to change two or more parameters, we propose a
rough scheme above. The details will be our future work.
142
References
2011
PEI Qingqi
received B.E., M.E.
and Ph.D. degrees in computer science and
cryptography from Xidian University, in
1998, 2005 and 2008, respectively. He
is now an associate professor and a vicedirector of CNIS Laboratory, also a Professional Member of ACM and Japan IEICE, Senior Member of Chinese Institute
of Electronics and China Computer Federation. His research interests focus on digital contents protection and wireless networks and security. (Email:
qqpei@mail.xidian.edu.cn)
LI Hongning received B.S. degree
in information and computing science from
Xidian University, China, in June 2007 and
now she is a M.S. degree candidate in cryptography. Her research interests include
wireless networks security and cognitive radios.