Abstract
Cognitive radio nodes are motivated to perform jamming attacks, if the illegal gains exceed the payment due to the attacking cost and the loss from the resulting punishment. In this chapter, we present active anti-jamming solutions in CRNs, based on reciprocity principles, social norms and reinforcement learning techniques. We investigate how to apply reciprocity principles to exploit the requirement of network services by SUs to suppress the motivation of insider jammers. With a properly designed social norm and reputation updating process, rational secondary users choose not to block the ongoing transmissions for their own interests. In dynamic CRNs, reinforcement learning algorithms such as Q-learning and WoLF-Q can be applied to improve the anti-jamming performance of secondary users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, K., Wang, B.: Cognitive Radio Networking and Security: A Game Theoretical View. Cambridge University Press, Cambridge (2011)
Chiang, J., Hu, Y.: Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Networking 19(1), 286–298 (2011)
Lu, Z., Wang, W., Wang, C.: Modeling, evaluation and detection of jamming attacks in time-critical wireless applications. IEEE Trans. Mobile Comput. 13(8), 1746–1759 (2014)
Giustiniano, D., Lenders, V., Schmitt, J., Spuhler, M., Wilhelm, M.: Detection of reactive jamming in DSSS-based wireless networks. In: Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 43–48 (2013)
Liu, Z., Liu, H., Xu, W., Chen, Y.: An error-minimizing framework for localizing jammers in wireless networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 508–517 (2014)
Chen, X., Chen, T., Cheng, W., Zhang, H.: Reciprocity inspired learning for opportunistic spectrum access in cognitive radio networks. In: Proceedings of IEEE International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM), pp. 202–207 (2013)
Chen, Y., Liu, K.: Indirect reciprocity game modelling for cooperation stimulation in cognitive networks. IEEE Trans. Commun. 59(1), 159–168 (2011)
Sun, Y., Han, Z., Liu, K.: Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46(2), 112–119 (2008)
Sun, Y., Han, Z., Yu, W., Liu, K.: A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: Proceedings of IEEE INFOCOM, pp. 1–13 (2006)
Yu, W., Liu, K.: Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Trans. Mobile Comput. 6(5), 459–473 (2007)
Zhang, N., Yu, W., Fu, X., Das, S.: Maintaining defender’s reputation in anomaly detection against insider attacks. IEEE Trans. Syst. Man Cybern. B Cybern. 40(3), 597–611 (2010)
Niu, B., Zhao, H., Jiang, H.: A cooperation stimulation strategy in wireless multicast networks. IEEE Trans. Signal Process. 59(5), 2355–2369 (2011)
Ayday, E., Lee, H., Fekri, F.: Trust management and adversary detection for delay tolerant networks. In: Proceedings of IEEE Military Communication Conference, pp. 1788–1793 (2010)
Xiao, L., Chen, Y., Lin, W., Liu, K.: Indirect reciprocity security game for large-scale wireless networks. IEEE Trans. Inf. Forensics Secur. 7(4), 1368–1380 (2012)
Chen, T., Liu, J., Xiao, L., Huang, L.: Anti-jamming transmissions with learning in heterogenous cognitive radio networks. In: Proceedings of IEEE Wireless Communication and Networking Conference, pp. 235–240 (2015)
Sun, Y., Yu, W., Han, Z., Liu, K.: Information theoretic framework of trust modelling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2), 305–317 (2006)
Fisher, R.: The Genetical Theory of Natural Selection. Cambridge University Press, Cambridge (1930)
Watkins, C., Dayan, P.: Q-learning. Mach. Learn. 8(3–4), 279–292 (1992)
Bowling, M., Veloso, M.: Multiagent learning using a variable learning rate. Artif. Intell. 136(2), 215–250 (2002)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 The Author(s)
About this chapter
Cite this chapter
Xiao, L. (2015). Active Anti-jamming Solutions in CRNs. In: Anti-Jamming Transmissions in Cognitive Radio Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-24292-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-24292-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24290-3
Online ISBN: 978-3-319-24292-7
eBook Packages: Computer ScienceComputer Science (R0)