Abstract
Background: In a cognitive radio network, the cognitive transmitter senses the medium to detect spectrum opportunities and transmits its own data if the channel is sensed to be idle. A jammer can also sense the medium and identify the slots of successful transmission. The jammer’s main objective is to reduce the throughput of the cognitive transmitter.
Methods: Towards this objective, the jammer builds a deep learning classifier in which the most recent sensing results of acknowledgments (ACKs) sent by the receiver are used to predict the slots of successful transmissions of the cognitive transmitter. This allows the attacker to reliably predict the successful transmissions and can effectively jam these transmissions. The deep learning classification soft decision probabilities are used by the jammer for power control subject to a certain power budget. A receiverbased defense mechanism is developed against jamming attacks. The receiver purposely takes some wrong actions, i.e., sends ACK when the transmission is not successful and vice versa, to poison the training process of the attacker.
Results: We show that our receiver’s defense mechanism effectively enhances the throughput of the cognitive transmitter by about 25% when compared to the transmitter’s defense mechanism, where the transmitter takes some wrong decisions when it accesses the medium.
Conclusion: A novel defense mechanism against jamming attacks in cognitive radio networks is introduced.
Keywords: Cognitive radio, deep learning, throughput, jammer, defense mechanisms, ACK.
Graphical Abstract
[http://dx.doi.org/10.1109/JSAC.2004.839380]
[http://dx.doi.org/10.1109/JSTSP.2010.2093210]
[http://dx.doi.org/10.1145/1062689.1062697]
[http://dx.doi.org/10.1007/s11036-011-0340-4]
[http://dx.doi.org/10.1109/MILCOM.2018.8599832]
[http://dx.doi.org/10.1109/TCCN.2018.2884910]
[http://dx.doi.org/10.1109/ACSSC.2017.8335483]
[http://dx.doi.org/10.1109/TVT.2019.2891291]
[http://dx.doi.org/10.1109/LWC.2017.2757490]
[http://dx.doi.org/10.1007/s00500-018-3102-4]
[http://dx.doi.org/10.1504/IJBIC.2018.093328]
[http://dx.doi.org/10.1504/IJBIC.2016.081335]
[http://dx.doi.org/10.1016/j.knosys.2015.07.006]