International Journal of Current Research and Academic Review |
Int.J.Curr.Res.Aca.Rev. 2014.2(1): 137-147
|
A Study on Effective Intrusion Detection Model (IDM) for Security Threats
Against Cognitive Radio Networks |
L.Nagarajan1*, V.Jayaraj2 and J.Jagathesh Amalraj3 |
1Prof & Head, Adaikalamatha College, Vallam, Thanjavur, Tamilnadu, India
2Associate Professor, Informatic Centre, Bharathidasan University, Trichy, Tamilnadu, India
3Bharathidasan University, Trichy, Tamilnadu India |
A B S T R A C T |
Cognitive radios hold tremendous promise for increasing spectral efficiency
in wireless systems. A cognitive radio as an intelligent wireless
Communication device that exploits side information about its environment to
improve spectrum utilization. Spectrum shortage was born the idea for
cognitive radios. These devices utilize advanced radio and signal processing
technology along with novel spectrum allocation policies to support new
wireless users operating in the existing crowded spectrum, without degrading
the performance of entrenched users. While cognitive radio networks (CRNs)
present a promising solution to solve the scarcity of the radio spectrum, they
are still susceptible to security threats. Until now, only a few researchers
considered the use of intrusion detection systems (IDMs) to combat these
threats against CRNs. In this article we describe a CRN based on IEEE
wireless regional area network (WRAN) and describe some of the security
threats against it. For the secondary users in the CRN to quickly detect
whether they are being attacked, a simple yet effective IDM is then presented.
Our proposal uses non-parametric cumulative sum (cusum) as the change
point detection algorithm to discover the abnormal behavior due to attacks.
This proposed IDM adopts an anomaly detection approach and it profiles the
CRN system parameters through a learning phase. So, our proposal is also
able to detect new types of attacks. As an example, we present the case of
detection of a jamming attack, which was not known to the IDM beforehand.
The proposed IDM is evaluated through computer based simulations, and the
simulation results clearly indicate the effectiveness of our proposal. |
Keywords |
Cognitive Radio;
Spectrum Sensing;
Spectrum Decision;
Spectrum Mobility;
Primary Users and
Secondary Users. |