Skip to main content

Active Anti-jamming Solutions in CRNs

  • Chapter
  • First Online:
Anti-Jamming Transmissions in Cognitive Radio Networks

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 701 Accesses

Abstract

Cognitive radio nodes are motivated to perform jamming attacks, if the illegal gains exceed the payment due to the attacking cost and the loss from the resulting punishment. In this chapter, we present active anti-jamming solutions in CRNs, based on reciprocity principles, social norms and reinforcement learning techniques. We investigate how to apply reciprocity principles to exploit the requirement of network services by SUs to suppress the motivation of insider jammers. With a properly designed social norm and reputation updating process, rational secondary users choose not to block the ongoing transmissions for their own interests. In dynamic CRNs, reinforcement learning algorithms such as Q-learning and WoLF-Q can be applied to improve the anti-jamming performance of secondary users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, K., Wang, B.: Cognitive Radio Networking and Security: A Game Theoretical View. Cambridge University Press, Cambridge (2011)

    MATH  Google Scholar 

  2. Chiang, J., Hu, Y.: Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Networking 19(1), 286–298 (2011)

    Article  Google Scholar 

  3. Lu, Z., Wang, W., Wang, C.: Modeling, evaluation and detection of jamming attacks in time-critical wireless applications. IEEE Trans. Mobile Comput. 13(8), 1746–1759 (2014)

    Article  Google Scholar 

  4. Giustiniano, D., Lenders, V., Schmitt, J., Spuhler, M., Wilhelm, M.: Detection of reactive jamming in DSSS-based wireless networks. In: Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 43–48 (2013)

    Google Scholar 

  5. Liu, Z., Liu, H., Xu, W., Chen, Y.: An error-minimizing framework for localizing jammers in wireless networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 508–517 (2014)

    Article  Google Scholar 

  6. Chen, X., Chen, T., Cheng, W., Zhang, H.: Reciprocity inspired learning for opportunistic spectrum access in cognitive radio networks. In: Proceedings of IEEE International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM), pp. 202–207 (2013)

    Google Scholar 

  7. Chen, Y., Liu, K.: Indirect reciprocity game modelling for cooperation stimulation in cognitive networks. IEEE Trans. Commun. 59(1), 159–168 (2011)

    Article  MathSciNet  Google Scholar 

  8. Sun, Y., Han, Z., Liu, K.: Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46(2), 112–119 (2008)

    Article  Google Scholar 

  9. Sun, Y., Han, Z., Yu, W., Liu, K.: A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: Proceedings of IEEE INFOCOM, pp. 1–13 (2006)

    Google Scholar 

  10. Yu, W., Liu, K.: Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Trans. Mobile Comput. 6(5), 459–473 (2007)

    Article  Google Scholar 

  11. Zhang, N., Yu, W., Fu, X., Das, S.: Maintaining defender’s reputation in anomaly detection against insider attacks. IEEE Trans. Syst. Man Cybern. B Cybern. 40(3), 597–611 (2010)

    Article  Google Scholar 

  12. Niu, B., Zhao, H., Jiang, H.: A cooperation stimulation strategy in wireless multicast networks. IEEE Trans. Signal Process. 59(5), 2355–2369 (2011)

    Article  MathSciNet  Google Scholar 

  13. Ayday, E., Lee, H., Fekri, F.: Trust management and adversary detection for delay tolerant networks. In: Proceedings of IEEE Military Communication Conference, pp. 1788–1793 (2010)

    Google Scholar 

  14. Xiao, L., Chen, Y., Lin, W., Liu, K.: Indirect reciprocity security game for large-scale wireless networks. IEEE Trans. Inf. Forensics Secur. 7(4), 1368–1380 (2012)

    Article  Google Scholar 

  15. Chen, T., Liu, J., Xiao, L., Huang, L.: Anti-jamming transmissions with learning in heterogenous cognitive radio networks. In: Proceedings of IEEE Wireless Communication and Networking Conference, pp. 235–240 (2015)

    Google Scholar 

  16. Sun, Y., Yu, W., Han, Z., Liu, K.: Information theoretic framework of trust modelling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2), 305–317 (2006)

    Article  Google Scholar 

  17. Fisher, R.: The Genetical Theory of Natural Selection. Cambridge University Press, Cambridge (1930)

    Book  MATH  Google Scholar 

  18. Watkins, C., Dayan, P.: Q-learning. Mach. Learn. 8(3–4), 279–292 (1992)

    MATH  Google Scholar 

  19. Bowling, M., Veloso, M.: Multiagent learning using a variable learning rate. Artif. Intell. 136(2), 215–250 (2002)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 The Author(s)

About this chapter

Cite this chapter

Xiao, L. (2015). Active Anti-jamming Solutions in CRNs. In: Anti-Jamming Transmissions in Cognitive Radio Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-24292-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24292-7_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24290-3

  • Online ISBN: 978-3-319-24292-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics