Efficient attack strategy for legitimate energy-powered eavesdropping in tactical cognitive radio networks
- 183 Downloads
The cognitive radio network (CRN) is not only considered a useful medium for users, but it is also an environment vulnerable to proactive attackers. This paper studies an attack strategy for a legitimate energy-constrained eavesdropper (e.g., a government agency) to efficiently capture the suspicious wireless communications (i.e., an adversary communications link) in the physical layer of a CRN in tactical wireless networks. Since it is powered by an energy harvesting device, a full-duplex active eavesdropper constrained by a limited energy budget can simultaneously capture data and interfere with the suspicious cognitive transmissions to maximize the achievable wiretap rate while minimizing the suspicious transmission rate over a Rayleigh fading channel. The cognitive user operation is modeled in a time-slotted fashion. In this paper, we formulate the problem of maximizing a legitimate attack performance by adopting the framework of a partially observable Markov decision process. The decision is determined based on the remaining energy and a belief regarding the licensed channel activity in each time slot. Particularly, in each time slot, the eavesdropper can perform an optimal action based on two functional modes: (1) passive eavesdropping (overhearing data without jamming) or (2) active eavesdropping (overhearing data with the optimal amount of jamming energy) to maximize the long-term benefit. We illustrate the optimal policy and compare the performance of the proposed scheme with that of conventional schemes where the decision for the current time slot is only considered to maximize its immediate reward.
KeywordsCognitive radio networks Physical layer Proactive eavesdropper Energy harvesting Jamming attack POMDP
This work has supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (NRF-2018R1A2B6001714).
- 2.Valenta, V., Maršálek, R., Baudoin, G., Villegas, M., Suarez, M., & Robert, F. (2010). Survey on spectrum utilization in Europe: Measurements, analyses and observations. In 2010 Proceedings of the fifth international conference on cognitive radio oriented wireless networks and communications (pp. 1–5). Cannes.Google Scholar
- 3.Federal Communications Commission-Spectrum Policy Task Force Group, Washington, DC, USA, Tech. Rep. ET Docket No. 02-135 (2002).Google Scholar
- 16.Tang, X., Ren, P., Wang, Y., Du, Q., & Sun, L. (2015). Securing wireless transmission against reactive jamming: A Stackelberg game framework. In 2015 IEEE global communications conference (GLOBECOM) (pp. 1–6). San Diego, CA.Google Scholar
- 20.Tang, X., Ren, P., & Han, Z. (2016). Combating full-duplex active eavesdropper: A game-theoretic perspective. In 2016 IEEE international conference on communications (ICC), Kuala Lumpur (pp. 1-6).Google Scholar
- 31.Bhowmick, A., Roy, S. D., & Kundu, S. (2015). Performance of secondary user with combined RF and non-RF based energy-harvesting in cognitive radio network. In 2015 IEEE international conference on advanced networks and telecommunications systems (ANTS), Kolkata (pp. 1–3).Google Scholar
- 41.IEEE Standard for Information technology—Local and metropolitan area networks—Specific requirements—Part 22: Cognitive wireless RAN medium access control (MAC) and physical layer (PHY) specifications: Policies and procedures for operation in the TV Bands. In: IEEE Std 802.22-2011 (pp. 1-680), 1 July 2011.Google Scholar