byzantine attack & defense in cognitive radio network

20
A Seminar on Byzantine Attack & Defence in Conginitive Radio Network August 25, 2015 [email protected] Guided By Presented By Dr. Sandip Chakraborty Chandra Mohan Sharma Assitant Professor IIT Kharagpur 15CS60D04, M. Tech. Ist Year IIT Kharagpur

Upload: chandra-sharma

Post on 22-Jan-2018

600 views

Category:

Education


3 download

TRANSCRIPT

A

Seminar on

Byzantine Attack & Defence

in

Conginitive Radio Network

August 25, 2015 [email protected]

Guided By Presented By

Dr. Sandip Chakraborty Chandra Mohan Sharma

Assitant Professor IIT Kharagpur 15CS60D04, M. Tech. Ist Year

IIT Kharagpur

August 25, 2015 [email protected]

Outline

1. Cognitive Radio 2. Evolution of radios 3. Cognitive Radio Network 4. Congnitive Radio Key Terms 5. Byzantine Attack 6. Byzantine Attack Models 7. Byzantine Defence 7. Byzantine Defence Models 8. Conclusion

IIT Kharagpur

COGNITIVE RADIO

A Cognitive Radio is an intelligent radio which is aware of its environment, adapt its own parametes according to environment to optimise communication. A conginitve radio Detect/Sense Adapt/Reconfigure Use Cooperate A congnitive radio function as autonomous unit in the communication environment, exchage information about the environment with the network it access and other CR in the network.

August 25, 2015 [email protected] IIT Kharagpur

EVOLUTION OF RADIO

1. Hardware driven radios: Transmit & Recieve frequencies, modulation & demodulation type and other radio frequency (RF) parameters are determined by hardware and cannot be changed. Recieve frequencies can be tuned/changed within the range using electro-mechanical tuner. 2. Digital radios: Digital radios are able to performs part of the signal processing or transmission electronically, but these are not configurable in the field. 3. Software Defined Radios: All transmitter & reciever parameters, modes and applications can be configured and reconfigured by Software. But these cannot adapt according to environment 4. Congnitive radios: These radios are able to sense their environment & can adapt accordingly to perform operations.

August 25, 2015 [email protected] IIT Kharagpur

COGNITIVE RADIO NETWORK

August 25, 2015 [email protected]

In some licensed bands such as GSM bands there is a large number of user, spectrum is highly utilized & now they cannot support more users. While in some licensed dedicated bands such TV, defense bands there is low utilization. So the cognitive radios (Secondary User) can be deployed to use licensed bands in cooperation with the Primary User (PU)

IIT Kharagpur

COGNITIVE RADIO TERMINOLGY

1. Primary User (PU): Primary User is the user of the spectrum which have obtained regulatory permission/license to operate in that spectrum band. 2. Secondary User (SU): Secondary user is the unlicensed user which uses the spectrum band in cooperation with the primary user. 3. Spectrum Sensing: Spectrum sensing is the term associated with detection of all wireless channel that are available to use in the vicinity of secondary user. 4. Cooperative Spectrum Sensing (CSS): It is the spectrum sensing scheme in which CRs shares spectrum information with each other. 5. Data Falsification: Data Falsification means reporting of wrong data about the different parameters by a CR in the network.

August 25, 2015 [email protected] IIT Kharagpur

BYZANTINE ATTACK

Byzantine Attack means Spectrum Sensing Data Falsification Attack (SSDF) Byzantine Attack Insider attack on Physical layer Occurs in process of CSS Objective of Byzantine attacker Vandalism Objective: Interference to primary user Exploitation Objective: Exclusion of idle channel

August 25, 2015 [email protected] IIT Kharagpur

BYZANTINE ATTACK PARAMETERS

Characterstic of Byzantine attack is the flexibility and diversity

August 25, 2015 [email protected]

Byzantine attack classified on the basis of four parameters 1. Attack Scenario: where to attack? 2. Attack Basis: how to attack? 3. Attack Oppurtunity: when to attack? 4. Attack Population: who to attack?

Fig: Taxonomy of Byzantine Attack

IIT Kharagpur

BYZANTINE ATTACK MODELS

August 25, 2015 [email protected]

1. Centralized Independent Probabilistic Small-Scale (CIPS) Attack P( X'

m = X

m + ∆|X

m < η) = α

0 P( X'

m = X

m - ∆|X

m > η) = α

1

2. Centralized Dependent Probabilistic Small-Scale (CDPS)Attack

Fig: CIPS

Fig: CDPS

IIT Kharagpur

BYZANTINE ATTACK MODELS

August 25, 2015 [email protected]

1. Centralized Dependent Non Probabilistic Small-Scale (CDNS) Attack 2. Decentralized Independent Probabilistic Small-Scale (DIPS)Attack

Fig: CDNS

Fig: DIPS

IIT Kharagpur

BYZANTINE DEFENCE

August 25, 2015 [email protected]

Byzantine Defence Objective – Find out Byzantine attackers – Mitigate negative effect of falsified sensing report

Byzantine Defence is based on wireless channel characterstic Byzantine Defence Algorithm can be classified as

– Homogeneous Sensing Scenario • Global Decision • Mean • Underlying Distribution • Utility

– Heterogenous Sensing Scenario • Propogation Model Based • Likelyhood Detection Based

IIT Kharagpur

BYZANTINE DEFENCE

August 25, 2015 [email protected]

Global Decision Based Defence: In this, the fusion center(FC) uses deviation of global decision and local decision of SUs to detect attackers from the honest ones

δi(t) = deviation between global & local decision Ao = null hypothesis that there exists no malicious user A1 = alternate hypothesis K = Number of SU PB, PH = probability of inconsistency of Byzantine or honest SU

IIT Kharagpur

BYZANTINE DEFENCE

August 25, 2015 [email protected]

Mean-Based Defence: In this, mean value of SU reports are used to find out the outliers with large deviations.

Robust statistics is essential for the success of this method. Different techniques are used to find consistent statistics. The below mention method take advantage of fluctions in the robust statistics.

K is the sensing slot

IIT Kharagpur

BYZANTINE DEFENCE

August 25, 2015 [email protected]

Underlying Distribution-Based Defence: This scheme uses the fact that in homogenous environment, the report of SU must obey the same distribution. So some metric representing the distribution may be extracted from the SU reports. Assuming that the true spectrum is Markovian, some metrics are derived to detect the malicious users.

are metrics of honest users

IIT Kharagpur

BYZANTINE DEFENCE

August 25, 2015 [email protected]

Utility-Based Defence: In this scheme, instead of identifying the attacker, all SU are guided to report honest reports by use of penalties and incentives of the system.

U = utility before the attack Û = utility after the attack

IIT Kharagpur

BYZANTINE DEFENCE

August 25, 2015 [email protected]

Propogation Model-Based Defence: In Propogation Model-Based Defence, deviations in the SUs sensing result can be mapped using difference in channel characterstics. But falsified reports can deviates from this mapping. This relation is used to find the malicious users.

β = fading factor of channel d = distance between PU and SU

degree of similarity in SU reports is proportional to the distance gap |di - dj|, i ≠ j

IIT Kharagpur

BYZANTINE DEFENCE

August 25, 2015 [email protected]

Likelihood Detection-Based Defence: The FC use prior knowledge to calculate probability of SU being malicious using hisotry reports of SU. The Bayesian approach is used to find the probability.

To find mutiple malicious users, the onion peeling and belief propogation approach is used. In an alternate approach, SUs are divided into classes based on detection & false alarm probabilties Class parameters are estimated using iterative expectation maximization algorithm Malicious users are detected using the class parameters Likelihood Detection is powerful against CIPS attacks

Tn = M denotes n-th SU is malicious and Ft is all observation of t sensing slots

IIT Kharagpur

BYZANTINE DEFENCE

August 25, 2015 [email protected]

Fig: Depicts deferent defence algorithms usefulness against the model of attack

IIT Kharagpur

Conclusion

August 25, 2015 [email protected]

CRN is the new rodio technology that can provide optimum utilization of the scarce spectrum resource Spectrum Sensing is essential for existense of the CRN CRN cannot be successfully adopted till there are robust alogrithms are available for mitigating the risk of Byzantine attacks Byzantine attack and defence is like an interactive game of Spear & Shield between the different stakeholders.

Ref: Linyuan Zhang, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han & Jinlong Wang, “Byzantine Attack and Defense in Cognitive Radio Networks: A Survey” IEEE Communication Surveys & Tutorials, 2015

IIT Kharagpur

August 25, 2015 [email protected]

Thank You...

IIT Kharagpur