You are currently on the new version of our website. Access the old version .
SustainabilitySustainability
  • Article
  • Open Access

3 March 2022

Entice to Trap: Enhanced Protection against a Rate-Aware Intelligent Jammer in Cognitive Radio Networks

,
,
,
,
,
and
1
Department of Electrical Engineering, Faculty of Engineering and Technology, International Islamic University, Islamabad 44000, Pakistan
2
Department of Electrical and Computer Engineering, COMSATS University Islamabad, Wah Campus, Wah 47040, Pakistan
3
Department of Information Technology, College of Computer, Qassim University, Buraydah 51452, Saudi Arabia
4
Department of Electrical Engineering, College of Engineering and Information Technology, Onaizah 2053, Saudi Arabia
This article belongs to the Special Issue Applications of Machine Learning and Big Data Analytics for Environmental Sustainability

Abstract

Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniques in the domains of frequency, coding, power and rate. Jamming is a major threat to CRN because it can cause severe performance damage such as network isolation, network application interruption and even physical damage to infrastructure simple radio devices. With the improvement in communication technologies, the capabilities of adversaries are also increased. The intelligent jammer knows the rate at which users transmit data, which is based on the attractiveness factor of each user. The higher the data rate for a secondary user, the more attractive it is to the rate-aware jammer. In this paper, we present a dummy user in the network as a honeypot of the jammer to get the jammer’s attention. A new anti-jamming deceiving theoretical method based on rate modifications is introduced to increase the bandwidth efficiency of the entire cognitive radio-based communication system. We employ a defensive anti-jamming deception mechanism of the Pseudo Secondary User (PSU) to as an entice to trap the attacker by providing thus enhanced protection for the rest of the network from the impact of the attacker. Our analytical simulation results show a significant improvement in performance using the proposed solution. The utility of the proposed intelligent anti-jamming algorithm lies in its applications to support the secondary wireless sensor nodes.

1. Introduction

Cognitive Radio (CR) is a promising technology for dealing with the scarcity of the electromagnetic spectrum, a natural resource. Conventional wireless radio communication operates on fixed frequency slots, causing the spectrum to become crowded in certain parts of the electromagnetic spectrum while not being utilized elsewhere. CR is aware of the surrounding radio frequency (RF) environment. It learns, reasons, decides and adapts to external conditions with the goal of efficiently using the spectrum and making reliable and uninterrupted wireless communication.
CR would give opportunistic access to spectrum gaps, allowing machine learning techniques to address intermittent use of the spectrum. To prevent jamming, the CR’s flexibility may provide intelligence in spectrum detection and spectrum decisions [1]. On the other hand, the enemy can proactively use the same attributes to cause more damage to the cognitive radio network (CRN)-based communication system [2,3].
As a result, ensuring network security is critical to the successful deployment of a CRN. Attacks on cognitive radio networks include primary user emulation (PUEA), denial of service, jamming, common control channel security, spectrum sensing data falsification attack (SSDFA), and collaborative jamming [4].
Jamming is an hostile attack in a CRN, in which jammers, by emitting high-power noise, impede wireless transmission causing narrow-band interference on one sub-channel at a time near the transmitting and receiving nodes. Highly intensive jamming noise may result in either complete Denial of Service (DoS) in the channel or a significant drop in Signal to Noise Ratio (SNR) that does not allow the SUs to communicate successfully. In traditional wireless communication systems, frequency hopping spread spectrum (FHSS) and direct sequence spread spectrum (DSSS) are commonly used to prevent the jammers from accomplishing their attacks. Because of dynamic spectrum hopping, these techniques can not be directly applied in cognitive radio technology to combat adverse jammers preventing successful communication.
The modulation schemes are flexible to changing states in the sense that the rate adaptation (RA) schemes of desirable interest usually adjust the physical layer transmission rate according to the channel conditions. Such schemes can be made to optimally choose a high data rate by adopting more robust modulation and coding scheme (MCS) for good SNR channels and lower transmission rates for poor channel conditions [5,6]. Transmitting in a higher data rate modulation scheme will increase the potential for jamming, affecting adversely the performance of communication due to the presence of rate-aware jammers in the network. On the other hand, transmission at low rates increases the robustness and reliability against jamming but reduces system throughput. Therefore, a suitable data rate is required for effective transmission while avoiding the jammer [7,8]. The existing naive jammer mostly rely on high power and frequent transmission of jamming signals which is impractical for power constraint jammer. Moreover this kind of high power and frequent transmission jammers also make jamming easy to be detected.
We consider a more powerful intelligent jammer which targets users based on the attraction factor of each user. The attraction factor is proportional to the rate at which the communication is made. Hence targeting the highest-impact communications in cognitive radio networks [8].
Here are the other reasons to consider rate-aware smart jammers by the introduction of an element of intelligence. First, it is easier for an intelligent rate-aware jammer to target a few symbols of higher data rates resulting in highly efficient selective jamming. Second, an effective targeted attack will force the secondary user to communicate at a lower rate by jamming all communication at higher rates as described in [8]. Finally, the lower data rates will saturate the network resulting in a higher collision probability [8].
The game is a mathematical model for an interactive situation in which participants must make strategic decisions based on payoffs. It has the potential to offer an optimal solution under dynamically changing conditions in the form of Nash Equilibrium (NE) as a competitor for an ideal security solution mechanism that does not place a significant pressure on resource restricted nodes in CRNs.
The game theory-based models are to make a logical way to depict hostile and defensive interactions between players. With the Nash equilibrium concept, both the defenders and the attackers seek optimal tactics, and neither has the incentive to deviate from their equilibrium strategies despite their conflict with security objectives [9].
Game theory is widely used in wireless communications to solve many communication problems such as resource allocation [10], packet relaying [1], anti-jamming communication [2,3,11,12]. Very recently, Zhu et al. in [13] has presented state of the art survey on game’s theoretic defensive deception.

3. System and Adversary Model

The system model is related to modelling system, channel, Jammer, and cognitive Base Station model consisting of Secondary user and PSU models.

3.1. System Model

For CRN, the interweave paradigm is adopted, with SU accessing the spectrum only if it is not in use by the primary users (PU). After finding a white space, each user searches the available sub-channels and starts its transmission. We assume the network contains H PUs, N secondary users (SU), and M jammers. The channel’s total used bandwidth is W , and the whole bandwidth is split into L independent sub-channels of equal bandwidth W / L . However, the channel capacity C l ( a n , c j m ) of each sub-channel may differ, depending on the SNR of the received signal strength.
The jamming attack is assumed to be the only source of channel degradation in in the network and we ignore any other source of interference including the effects of multi-path fading, etc.

3.2. Channel Model

The idle state and the busy state are the two possible states for each sub-channel. If there is no PU currently using the sub-channel, it is considered idle. Any sub-channel that is in the idle state is available to the SU and the jammer. If the PU is using the channel, it is considered busy. Sub-channels occupied by SU or jammer are not allowed to be used. Prior to the sensing process, the channel states (idle or occupied) are unknown.
  • IDLE STATE: If no PU is using the sub-channel, it is considered idle. This area is open to both the SU and the jammer. The idle channel’s state is indicated by P = 1 .
  • BUSY STATE: If any PU is using the sub-channel, it is deemed busy. Both the SU and the jammer are prohibited from transmitting on occupied sub-channels. The busy state of the sub-channel is represented by P = 0 .
A triangular anti-jamming deception game is presented between SU, PSU and the jammer in the absence of PU as shown in Figure 2, indicating a cooperation in the form of light green arrow between all SUs and the PSUs.
Figure 2. A triangular anti-jamming deception game is presented between SU, PSU and the jammer in the absence of PU.
We considered L sub-channels where the quality of each sub-channel is different from the other sub-channels. Based on the received signal to noise ratio (SNR), each sub-channel has an upper capacity limit, which is given by,
C l ( a n , c j m ) = W L log 2 ( 1 + SNR l n ( a n , c j m ) ) , n N , m M
where C l ( a n , c j m ) stands for the capacity of the n t h SU at l t h sub-channel against the m t h jammer decision of c j m , W / L is the identical bandwidth in Hz for all L sub-channel and SNR l n ( a n , c j m ) is the received SNR of the n t h SU at l t h sub-channel. Let us first consider the case when there is no jammer in the system, and the communication link between SU and CBS is an Additive White Gaussian Noise (AWGN) sub-channel with fixed noise variance, then the SNR is defined as
SNR l n ( a n , c j m ) = P r , l n N w · W / L , n N , m M
where P r , l n is the signal power received by n t h SU at l t h sub-channel and N w is the noise power spectral density (PSD) of Additive White Gaussian Noise (AWGN). The higher the SNR l n ( a n , c j m ) , the more will be the sub-channel capacity C l ( a n , c j m ) , and higher will be the sub-channel quality. The sub-channel capacity of n t h SU at l t h sub-channel becomes,
C l ( a n , c j m ) = W L log 2 ( 1 + P r , l N w · W / L ) , 1 i L .
Moreover, the communication link deteriorates due to the additive jammer, which transmits strong radio signals to degrade the sub-channel’s capacity. Therefore, the SNR in the presence of jammer is given by:
SNR l n ( a n , c j m ) = P r , l n N w · W / L + N j , l B j , n N , m M where N j , l and B j are the Power Spectral Density (PSD) and bandwidth of the jammed sub-channel respectively. Since all sub-channels have identical bandwidths of B j = W L , so the SNR in the presence of jammer becomes,
SNR l n ( a n , c j m ) = P r , l n N w . W / L + N j , l W L , n N , m M .
We get (4) only when a n = c j m . The goal of SU is to carefully transition to the available high-capacity sub-channel in order to optimize spectral efficiency by avoiding possible jamming.

3.3. Jammer Model

Objective of the jammer: The Jammer attempts to reduce the average CBS bandwidth efficiency by injecting noise for users with a high-impact connection. The effect of a jamming attack on the communication sub-channel is to minimise the signal-to-noise ratio (SNR) of the receiver and thus reduce the channel capacity as a result. We assume a powerful jammer with the following characteristics.
  • Level I: Reactive jammer
  • Level II: Intelligent jammer with Rate-aware compliance features
The basic assumptions about the jammer model are:
  • It is assumed that the jammer is at the physical layer, where the jammer hinders the radio communication by producing high-power noise in the target sub-channel.
  • Similar to other secondary users, an intelligent jammer is in essence a secondary user with sensing, perception, and adaptive capabilities as assumed by [12,16,32]. As we already know that the secondary user has the lower priorities to access the spectrum as compared to the primary users, therefore a secondary user has to use its sensing ability to sense its environment for the availability of free spectrum to continue its transmission and to avoid interference to the primary user. In a very similar fashion, a jammer needs to sense its RF environment for the presence of a primary user. Then the jammer will avoid the primary user if detected as the primary user due to the risk of a high penalty. On the other hand, the jammer targets users other than primary users.
    We are combating against intelligent jammer in CRN in interview paradigm, where the spectrum hole is accessed by secondary user on opportunistic spectrum access (OSA) bases. The intelligent jammer has the cognitive capabilities, means that it is capable of sensing the presence of primary user in the network. The intelligent jammer is deemed as a secondary users with negative intentions to disrupt the communication of other secondary users. In the initial sensing time of a time slotted system, intelligent jammer do also listen to the presence/absence of primary user just as the other secondary users do. So, the intelligent jammer is capable of sensing the RF environment and based on the sensing results it transmit the noise signals on the frequencies vacated by a primary user and utilized by secondary user to jam the communication of secondary users. The jammer can not jam the primary user due to heavy penalty imposed by the law-enforcement agencies.
  • Due to the possibility of severe penalty, the jammer does not target the PU communication [2,36]. The jammer monitors the RF environment for a predetermined period of time before transmitting its jamming signals according to the sub-channel conditions and the SU’s strategy. If a PU is identified in one of the sub-channels, the jammer will switch to another sub-channel and starts detecting another SU.
  • Jammer uses attraction factor δ , 0 δ i 1 , i N to target HIC, which is defined as
    δ i = R i j = 1 N R j , i N s . t . i = 1 N δ i = 1
    where R i is the data rate based on the modulation schemes adapted by the i t h SU/PSUs. The intelligent jammer may acquire the rate/code/modulation information of SU/PSU either using explicit rate information or modulation and code guessing [6]. Moreover, the rate information of a transmission is vulnerable in many communication protocols. In IEEE 802.11 networks, for example, the rate is specified explicitly in the SIGNAL field of the physical layer’s frames. An intruder can easily coordinate with two parties’ communication, evaluate data frames, and derive the rate. As demonstrated in [8], this attack is quite practical. The adversary can evaluate the received signal in complicated I/Q form even if the rate information is not explicitly supplied inside the packet header. The attacker can trace the received constellation pattern and determine the modulation in use after performing carrier synchronization, frequency, and phase offset correction. The frame structure of the protocol is not required for this method. The guessing strategy on USRP can be shown by creating a modulation detector that can identify the modulation of a transmission in real time. It may readily be modified to create a practical rate-aware jammer that jams high-rate packets selectively. An attacker could employ more sophisticated techniques to determine not only the modulation of the message, but also the codes used. One such method is to follow the sequence of received symbols in order to predict the codes based on the fact that various codes cause distinct transitions from one coded symbol to the next. For the attacker, guessing through matching and trial-and-error is efficient since most communication protocols specify a finite variety of modulations and codes [6].
  • Jammer calculates δ , 0 δ 1 for each detected signal in its environment according to (5), and target the SU with the highest attraction factor.
We consider a jammer with multiple intelligence levels.
  • Level-I intelligence/Reactive/Infant jammer is an intelligent jammer with cognitive skills is expected to choose the optimal approach in response to the dynamics of sub-channels and SU strategies. It scans its own RF environment and only sends jamming signals if it finds a SU, hence saving its power.
  • Level-II Intelligence/Smart/Baby jammer Intelligent jammer targets the highest impact communication (HIC) sub-channels by targeting specific transmission characteristics of the SU, For example, it can target the highest transmission rate R , which may be the case in multimedia communications, highest transmission power P , the sub-channel with highest bandwidth B , packet inter arrival time, and frequency shift etc. [36]. Highest impact communication is quantitatively measured by jammer using attraction factors in (5). We assume the jammer perceives highest impact communication as the communication with highest transmission rate R , which is the case for multimedia communications.
With the level-I intelligence, the jammer scans the environment and learns the characteristics of the sub-channel and SUs. While using the level-II intelligence, the jammer determines the highest impact communication of the secondary network using attraction factor in (5).

3.4. Cognitive Base Station (CBS)

The secondary network consists of one central unit called fusion center (FC)/Cognitive Base Station (CBS), several SUs and a PSU.
Objective of CBS: The goal of CBS is to improve overall system’s average throughput through the successful deployment of a deception mechanism using a PSU in the presence of intelligent jammer.

3.4.1. Secondary User Model

  • The SUs are forced through Dynamic Spectrum Access (DSA) implemented in CBS to periodically stop its transmission and to sense PU’s activity, to protect the incumbent PU services.
  • During the sensing time, the SU senses its environment before starting to transmit any data. Throughout the sensing time, each SU would try to detect the the presence of any PU in the accessible sub-channels. On the other hand, the SU will not be able to determine the existence of an adversary at the beginning of the time slot. Regarding the detection of jamming, the interested readers may see for more details reference [38]. At the end of each time period, the SU will know if its connection was successful or it was jammed by a malicious jammer.
  • The SU will receive a positive payoff if the transmission is successful, while a jammed transmission on the other hand, would result in a negative payoff. The utility of the SU denoted as U i in the i t h sub-channel can be derived as:
    U i = C i ( ( 1 δ i ) G δ i J ) .
    where C i and δ i are defined in Equations (3) and (5), respectively. While G and J are the gain of secondary user and gain of the jammer, respectively. Combining (3) with (6) yields (7).
U i = ( W / L ) log 2 ( 1 + P r N w · W / L ) ( 1 δ i ) G δ i J ,
In other words, the SU utility function as detailed in (7) allows us to incorporate the condition of a practical sub-channel in terms of sub-channel capacity and jamming situations. In the presence of a jammer, the SU’s objective is expected to achieve the sum of the discounted payoff by selecting a good quality sub-channel.

3.4.2. Pseudo Secondary User (PSU) Model

The so-called pseudo secondary user (PSU) is assumed to mimic the legitimate SU characteristics of the jammer’s attraction. The PSU entices the jammer by sending in a higher higher data rate to invite the jammer to attack the PSU. A group of SUs take on the services of a PSU to trick the smart jammer, acting like a honeycomb for jamming.
  • The PSU does not send a legitimate signals instead it transmit a garbage data at a greater rate than the other SUs to deceive the jammer. That is why the utility of PSU is not counted in the calculations of CBS throughput.
  • The wireless communication system is designed to achieve a defined BER line in an BER-SNR (dB) curve. One has to follow this line for a reliable communication. Moreover, according to the Shannon capacity theorem a certain data rate can tolerate a certain level of jamming power (received SNR) to achieve a reliable communication. If the jamming power is greater than the threshold, the corresponding data transfer rate may exceed the capacity of the sub-channel. The packets are lost resulting in lower system throughput. However, this does not apply to the proposed PSU based deception mechanism, in which the PSU transmits garbage values with a rate higher than the rate of SUs in the vicinity. Since the PSU transmits garbage data, it does not care about packets losses. Hence, the data rate/capacity of PSU is not accounted for in the system throughput.
  • A variable called attraction factor δ ( 0 , 1 ) is introduced to attract the jammer by attracting the rate-aware jammer towards itself. Our proposed scheme is implemented in such a way that the jammer gets an impression of PSU as the highest impact communication. It plays the role of the Achilles heel in a jammer.
  • Since we are focusing on rate adaptation based anti-jamming solution against an intelligent jammer, we assume perfect time and frequency synchronization between all SUs and PSUs.

4. Game Formulation

In this section, a game theoretic problem formulation is presented after giving a brief overview of game theory.

4.1. Preliminaries

Game theory can be described as the science of strategy, in which competing independent players make the optimal decision in strategic situations. Players, strategies, payoffs, information, rationality and Nash Equilibrium (NE) are the key elements of the game theory, which are defined below.
Players are two interacting parties, which in our case are SU and jammer players.
Strategies are rules or plan of action of each player to play the game.
Payoffs/Utility are actually gained by the players after adopting certain strategies, and the optimal strategy is the one that increases the player’s earnings.
Information relates to what the players are supposed to know. Complete information is one in which each player knows every aspect of the game while in perfect information, the player also knows the previous actions of all the other players.
Rationality refers to when the players are assumed to be rational to take best alternative in the set of possible choices. It helps narrow down the range of possible decisions.
Nash Equilibrium (NE) is an action vector from which no player can profitably unilaterally deviate.
Definition 1.
If the following two inequalities are fulfilled, a set of strategies ( i * , j * ) {i for row player, and j for column player} result in a non-cooperative Nash equilibrium solution to a bimatrix game ( A = { A i j } , B = { B i j } ), where A and B are reward matrices for each player, for all i = 1 , 2 , 3 , . . . , N and j = 1 , 2 , 3 , . . . , N states.
A i * j * A i j * , i , j = 1 , 2 , 3 , . . . , N B i * j * B i j * , i , j = 1 , 2 , 3 , . . . , N
Furthermore, the pair ( A i * j * , B i * j * ) is regarded as the bimatrix game’s non-cooperative Nash equilibrium outcome. Where A i j represents the payoff matrix for Player I and B i j is payoff matrix for Player II. The payoff matrix of standard matrix game represent the objective of each player.

4.2. Utility Functions with and without PSU

Utility without PSU: The utility function of SU network can be written as the overall gain of the secondary network, which is being controlled by Cognitive Base Station (CBS) having a number of SUs in the network, and is determined by
U CBS = i = 1 N U i
where U i = C i ( ( 1 δ i ) G δ i J ) , 1 i N and C i = W / L log 2 ( 1 + P r , i / ( N w · W / L ) ) , 1 i N which satisfy the requirements given in Equation (9)
δ i = R i / j = 1 N R j , i N i = 1 N δ i = 1 0 δ i 1
Utility with PSU: The utility function of secondary network in the presence of PSU can be written as the overall gain of the secondary network, which is being controlled by Cognitive Base Station (CBS) having a few SUs and a PSU, and is determined by U CBS = i = 1 N 1 U i + U PSU . Since the PSU does not take part in the useful communication, so the utility of PSU is not counted for the calculations of throughput. Therefore, the ultimate utility of CBS is as given by Equation (10)
U CBS = i = 1 N 1 U i ,
where U i = C i ( ( 1 δ i ) G δ i J ) , 1 i N , and satisfies,
δ i = R i / ( j = 1 N 1 R j + R p ) , i N δ p = R p / ( j = 1 N 1 R j + R p ) , i = 1 N 1 δ i + δ p = 1 0 δ i , δ p 1
where δ i is the attraction factor for i t h user in the presence of PSU in the network and R p is the data rate of deceptive PSU transmission. The attraction factor δ p of a PSU is kept slightly higher than all other legitimate SUs in the network. i.e., δ i i < δ p , so that the jammer is more attracted towards PSU as compared to legitimate SU. In general, the probability of the attacker to fall in the trap of PSU is given by δ p = 1 i = 1 N 1 δ i .
The objective of the secondary network is to maximize the network utility by successfully deploying PSU to deceive the jammer while increasing the throughput of the system. We get throughput of the system by adding the throughput of every individual successful user i.e.,
U CBS = U 1 + U 2 + U 3 + + U N 1
Using the values from (7) and rearranging will give
U CBS = G i = 1 N 1 C i ( G + J ) δ 1 C 1 + ( G + J ) δ 2 C 2 + ( G + J ) δ 3 C 3 + + ( G + J ) δ N 1 C N 1
which further reduces to
U CBS = G i = 1 N 1 C i ( G + J ) i = 1 N 1 δ i C i .
The problem can be formulated as an optimization problem. The optimal strategy of the CBS is the maximizer of the following problem
max U CBS = G i = 1 N 1 C i ( G + J ) i = 1 N 1 δ i C i .
subject to
δ i = R i / ( j = 1 N 1 R j + R p ) , i N δ p = R p / ( j = 1 N 1 R j + R p ) , i = 1 N 1 δ i + δ p = 1 0 δ i , δ p 1

5. Simulations and Results

The simulation results are shown in bandwidth efficiency. The bandwidth efficiency can be calculated in bits per second per Hertz (bps/Hz) as follows:
η n = C l , t n ( a n , c j m ) W L = log 2 1 + P l , t n N o · W / L , n N
We compare our results with and without the PSU in the network i.e., the comparison is made for N SUs against the N 1 SUs plus 1 PSU. For simplicity, the sub-channel conditions are considered in ascending order i.e., SNR 1 < SNR 2 < SNR 3 < < SNR l < < SNR L . Alternatively, it means that the L t h sub-channel is the best sub-channel among all.
Figure 3 depicts the impact of increasing data rate of the PSU against a rate-aware intelligent jammer. It is shown that increasing the data rate of a PSU results in increasing its attraction factor and becomes more attractive target for an intelligent jammer. Hence it helps in protecting the other SUs from being jammed. The successful communication of the rest of N 1 SUs increase the overall utility of the system. Specifically, it is shown that the utility almost remains constant after the data rate exceeds 1000 bps. Moreover, data rate of PSU-based system should be at least greater than 15 bps to get higher utility as compared to the system without PSU.
Figure 3. Impact of increasing PSU data rate against a rate ware jammer.
In Figure 4 the impact of increasing jamming probabilities of PSU is studied against a rate-aware intelligent jammer. It is shown that increasing the jamming probability of the PSU will secure the overall system by increasing the overall utility of the CBS. More precisely, it is evident that the jamming probability of PSU should be at least 0.18 to get the benefit of deploying PSU in the system. It should be kept in mind that the curve with PSU is considered for N 1 users. The N t h user excluded being PSU itself, because it does not transmit legitimate signal and does not take part in overall throughput of the system as mentioned in (11). It is to be noted that the straight line of utility of the CBS without PSU (blue rectangles) is due to the fact that it is independent of PSU probabilities.
Figure 4. Impact of increasing PSU data rate and attraction factor against a rate ware jammer.
If we assume equal resource utilization for SU/PSU, then the network with one SU and one PSU is consuming 50 % of its resources to protect the one SU. Similarly, when we have seven SUs and one PSU, the 1 / 8 = 12.5 % resources are wasted. It is better to use PSU for a bigger network of larger number of SUs.
In Figure 5 the curves for different values of N are shown. It has been demonstrated that when N increases, bandwidth efficiency is improved. Similarly, the curves in Figure 6 show an improvement in bandwidth efficiency as N increases from 3 to 5. The similar behaviour can be also observed for N greater than 5.
Figure 5. Comparison of data rate of PSU in terms of average bandwidth efficiency for different values of N.
Figure 6. Comparison of attraction factor δ of PSU in terms of average bandwidth efficiency for different values of N.
The change in the position of PSU is portrayed in Figure 7 and Figure 8. Figure 7 shows the curves for bandwidth efficiency when the position of PSU is changed from 1 to L. For simplicity, L = N . Keep in mind the assumption that the SNR1 of sub-channel 1 is minimum while SNRL is maximum. The overall bandwidth efficiency of the CBS is highest when PSU is deployed at the sub-channel with lowest sub-channel quality as shown by the solid line for l = 1. Furthermore, from the Figure 8 it is evident that for l = 1 the PSU is effective only after the attraction factor exceeds 0.15 probability. However from both Figure 7 and Figure 8 it is visible that when the PSU moves to the next sub-channel with higher sub-channel qualities, it may result in wasting its resources to deceive the jammer resulting in less bandwidth efficiency. For total of L = 5 sub-channels, when PSU is at l = 3 the bandwidth efficiency curve of PSU crosses the curve without PSU at around 0.43 probability with lowest productive bandwidth efficiency. The PSU at l = 4 and l = 5 , the bandwidth efficiency gets even worse, which decreases with increase in data rate.
Figure 7. Comparison of data rate of PSU in terms of bandwidth efficiency for different locations of PSU from 1 to L.
Figure 8. Comparison of attraction factor δ of PSU in terms of bandwidth efficiency for different locations of PSU from 1 to L.

5.1. Cost Analysis

The cost is paid in terms of bandwidth loss which is incurred by adopting a fake user called as a pseudo secondary user (PSU). The loss is higher when the PSU occupies a sub-channel with higher SNR values, further reducing throughput reduction as shown in Figure 7 and Figure 8 and the discussion hereafter. Since the PSU does not participate in the bandwidth efficiency of CBS, therefore, as the PSU transitions to the high-quality sub-channel, the data rate that would otherwise be utilised is wasted by adopting the PSU to deceive the jammer.

5.2. Comparison with the Previous Work

We compare our results with [17,25] to show the bandwidth efficiency of our proposed approach as listed in Table 3. Since the work presented previously have used FH and FH + RA, respectively, using reinforcement learning to maximize bandwidth efficiency of the system, therefore, for the fair analysis of the result we tabulate the result for easy comparison of the three papers.
Table 3. Comparison of performance evaluations of our proposed scheme.
As depicted in Table 3, all other parameters are the same except for jammer type. The jammer type used in [17,25] are a reactive jammer, which commences its transmission upon the detection of SU activity in the cognitive radio enabled network. We call this type of jammer as Level I jammer in Section 3.3. In our proposed work, we consider a more challenging jammer which is not only a reactive jammer but also targets the SU based on the attraction factor of each user making, it more harmful to the highest impact communication.
Moreover, the bandwidth efficiency comparison results demonstrate that employing the deception-based anti-jamming technique proposed in our study has an advantage over the work in [17]. The bandwidth efficiency of our suggested approach is more than 3 times that of [17]. The bandwidth efficiency of our proposed approach is more than 4 times that of [25]. To be very accurate the results in [25] show bandwidth of 21 bps for 5 number of sub-channels (see Figure 7 in [25]). To get bandwidth efficiency for each sub-channel we divide 21 by 5 to get the bandwidth efficiency equal to 4.2 bps/Hz. Furthermore, all results were obtained with the help of the MATLAB simulation environment.

6. Conclusions and Future Works

In this study, we have presented a unique game-theoretic deception anti-jamming strategy to improve the overall bandwidth efficiency of a cognitive radio-based communication system. To deceive the attacker and protect the remainder of the network from hostile influences, we have used a defensive deception anti-jamming method based on rate adjustments. To lure the jammer, we have introduced a counterfeit user within the network as a trap for the attacker. The higher a secondary user’s data rate is, the more attractive it is to a rate-aware intelligent jammer.
Simulation results show that the bandwidth efficiency of the network adopting the proposed deception strategy crosses the bandwidth efficiency curve of the network without PSU at around attraction factor of 0.16. Which is consistent with our claim that the CBS with the PSU perform well even with the attraction factor of 0.20 compared to a system without deception strategy. Moreover, compared to a system that does not use the deception method, our proposed solution can increase bandwidth efficiency by up to 1.7 times. Similarly, since the PSU does not participate in the legitimate communication, allocating the PSU a highest-quality sub-channel will reduce the bandwidth efficiency hence demanding an optimal sub-channel selection for better bandwidth efficiency which is evident from the results shown.
The research presented in this paper can be extended as future work in the following three ways. Firstly, the deception strategy can be improved further if we change the role of a secondary user, keeping it dynamically adjustable. Maintaining the secondary user role constant will make the jammer conscious of the PSU, and will lead to the counter-deception strategy by the intelligent jammer. Inspired by the changing of the guard ceremony with the transition between SU and PSU will lead to more confusion for the jammer. Secondly, a dynamic assignment of PSU based on the current dynamics of the environment will lead to more complexity in the deception mechanism. Thirdly, using FH with RA for decoy mechanism used for attracting the jammer will enhance the deception further. Enabling PSUs to hop to other available sub-channels along with rate adaption will give the PSU freedom of efficient spectrum utilization while deceiving jammer. Finally, a PSU with higher attraction factor can also be used to detect the jammer and to predict the level of intelligence from guessing its fingerprints.

Author Contributions

Conceptualization, K.I. and A.N.M.; methodology, K.I., A.N.M. and S.K.; writing-original draft preparation, K.I., A.N.M. and A.W.; writing-review and editing, K.I., A.W., A.M.A. and S.K.; project administration, A.M.A., S.A., M.I. and S.K.; supervision, A.N.M. and S.K.; funding acquisition, A.M.A., S.A., S.K. and M.I. All authors have read and agreed to the published version of the manuscript.

Funding

The authors gratefully acknowledge Onaizah College of Engineering and Information Technology for funding the publication charges.

Data Availability Statement

Not applicable.

Acknowledgments

The authors extend their appreciation to the Higher Education Commission (Pakistan) and Deputy-ship for Research & Innovation, Ministry of Education (Saudi Arabia) for supporting this research work. The authors acknowledge receiving the technical support from International Islamic University Islamabad (Pakistan), and Onaizah College of Engineering and Information Technology (Saudi Arabia).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AWGNAdditive white Gaussian noise
BSBack Scattering
CRCognitive Radio
CRNCognitive Radio Networks
DoSDenial of Service
DSSSDirect sequence spread spectrum
EHEnergy Harvesting
FHFrequency hopping
FHSSFrequency hopping spread spectrum
GSGGeneral sum game
HICHighest Impact Communication
HLAHierarchical Learning Algorithm
ILIndependent Learner
JALJoint Action Learner
MCSModulation and Coding Scheme
MDPMarkov Decision Process
MARLMulti-Agent Reinforcement Learning
MLEMaximum Likelihood Estimation
NENash Equilibrium
OLOFSOne Leader One Follower Stackelberg Game
PCPower Control
PSDPower Spectral Density
PSUPseudo Secondary User
PUPrimary User
PUEAPrimary User Emulation Attack
RARate Adaptation
RFRadio Frequency
SSDFASpectrum Sensing Data Falsification Attack
SUSecondary User
SGStochastic Game
SLMFSSingle Leader Multiple Follower Stochastic Game
SEStackelberg Equilibrium
SNRSignal to Noise Ratio
TSTransmission Scheduling
WSNWireless Sensor Network

References

  1. Bastami, A.H.; Kazemi, P. Cognitive Multi-Hop Multi-Branch Relaying: Spectrum Leasing and Optimal Power Allocation. IEEE Trans. Wirel. Commun. 2019, 18, 4075–4088. [Google Scholar] [CrossRef]
  2. Wang, B.; Wu, Y.; Liu, K.R.; Clancy, T.C. An anti-jamming stochastic game for cognitive radio networks. IEEE J. Sel. Areas Commun. 2011, 29, 877–889. [Google Scholar] [CrossRef] [Green Version]
  3. Aref, M.A.; Jayaweera, S.K.; Yepez, E. Survey on cognitive anti-jamming communications. IET Commun. 2020, 14, 3110–3127. [Google Scholar] [CrossRef]
  4. Salahdine, F.; Kaabouch, N. Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey. Phys. Commun. 2020, 39, 101001. [Google Scholar] [CrossRef]
  5. Zhang, J.; Tan, K.; Zhao, J.; Wu, H.; Zhang, Y. A practical SNR-guided rate adaptation. In Proceedings of the IEEE INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, Arizona, 13–18 April 2008; pp. 2083–2091. [Google Scholar]
  6. Vo-Huu, T.D.; Noubir, G. Mitigating rate attacks through crypto-coded modulation. In Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hangzhou, China, 22–25 June 2015; Association for Computing Machinery: New York, NY, USA, 2015; pp. 237–246. [Google Scholar]
  7. Hanawal, M.K.; Abdel-Rahman, M.J.; Krunz, M. Game theoretic anti-jamming dynamic frequency hopping and rate adaptation in wireless systems. In Proceedings of the 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Hammamet, Tunisia, 12–16 May 2014; pp. 247–254. [Google Scholar]
  8. Noubir, G.; Rajaraman, R.; Sheng, B.; Thapa, B. On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming. In Proceedings of the Fourth ACM Conference on Wireless Network Security, Hamburg, Germany, 14–17 June 2011; pp. 97–108. [Google Scholar]
  9. Zhu, Q.; Rass, S. Game theory meets network security: A tutorial. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 2163–2165. [Google Scholar]
  10. Ahmad, A.; Ahmad, S.; Rehmani, M.H.; Hassan, N.U. A Survey on Radio Resource Allocation in Cognitive Radio Sensor Networks. IEEE Commun. Surv. Tutor. 2015, 17, 888–917. [Google Scholar] [CrossRef]
  11. Ahmed, I.K.; Fapojuwo, A.O. Stackelberg Equilibria of an Anti-Jamming Game in Cooperative Cognitive Radio Networks. IEEE Trans. Cognit. Commun. Netw. 2018, 4, 121–134. [Google Scholar] [CrossRef]
  12. Wu, Y.; Wang, B.; Liu, K.J.R.; Clancy, T.C. Anti-jamming games in multi-channel cognitive radio networks. IEEE J. Sel. Areas Commun. 2012, 30, 4–15. [Google Scholar] [CrossRef] [Green Version]
  13. Zhu, M.; Anwar, A.H.; Wan, Z.; Cho, J.H.; Kamhoua, C.; Singh, M.P. A survey of defensive deception: Approaches using game theory and machine learning. IEEE Commun. Surv. Tutor. 2021, 23, 2460–2493. [Google Scholar] [CrossRef]
  14. Yu, L.; Wu, Q.; Xu, Y.; Ding, G.; Jia, L. Power control games for multi-user anti-jamming 543 communications. Wirel. Netw. 2019, 25, 2365–2374. [Google Scholar] [CrossRef]
  15. Chen, Q.; Hao, X.; Kong, Z.; Yan, X. Anti-Sweep-Jamming Method Based on the Averaging of Range Side Lobes for Hybrid Modulation Proximity Detectors. IEEE Access 2020, 8, 33479–33488. [Google Scholar] [CrossRef]
  16. Ibrahim, K.; Ng, S.X.; Qureshi, I.M.; Malik, A.N.; Muhaidat, S. Anti-Jamming Game to Combat Intelligent Jamming for Cognitive Radio Networks. IEEE Access 2021, 9, 137941–137956. [Google Scholar] [CrossRef]
  17. Ibrahim, K.; Qureshi, I.M.; Malik, A.N.; Ng, S.X. Bandwidth-Efficient Frequency Hopping based Anti-Jamming Game for Cognitive Radio assisted Wireless Sensor Networks. In Proceedings of the 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), Helsinki, Finland, 25–28 April 2021; pp. 1–5. [Google Scholar]
  18. Ding, K.; Ren, X.; Quevedo, D.E.; Dey, S.; Shi, L. Defensive deception against reactive jamming attacks in remote state estimation. Automatica 2020, 113, 108680. [Google Scholar] [CrossRef]
  19. Anwar, A.H.; Atia, G.; Guirguis, M. Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach. J. Netw. Comput. Appl. 2018, 121, 44–58. [Google Scholar] [CrossRef]
  20. Jia, L.; Xu, Y.; Sun, Y.; Feng, S.; Anpalagan, A. Stackelberg game approaches for anti-jamming defence in wireless networks. IEEE Wirel. Commun. 2018, 25, 120–128. [Google Scholar] [CrossRef] [Green Version]
  21. Lichtman, M.; Poston, J.D.; Amuru, S.; Shahriar, C.; Clancy, T.C.; Buehrer, R.M.; Reed, J.H. A communications jamming taxonomy. IEEE Secur. Priv. 2016, 14, 47–54. [Google Scholar] [CrossRef]
  22. Yang, D.; Xue, G.; Zhang, J.; Richa, A.; Fang, X. Coping with a smart jammer in wireless networks: A Stackelberg game approach. IEEE Trans. Wirel. Commun. 2013, 12, 4038–4047. [Google Scholar] [CrossRef]
  23. Namvar, N.; Saad, W.; Bahadori, N.; Kelley, B. Jamming in the internet of things: A game-theoretic perspective. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  24. Guan, S.; Wang, J.; Yao, H.; Jiang, C.; Han, Z.; Ren, Y. Colonel blotto games in network systems: Models, strategies, and applications. IEEE Trans. Netw. Sci. Eng. 2019, 7, 637–649. [Google Scholar] [CrossRef]
  25. Hanawal, M.K.; Abdel-Rahman, M.J.; Krunz, M. Joint adaptation of frequency hopping and transmission rate for anti-jamming wireless systems. IEEE Trans. Mob. Comput. 2015, 15, 2247–2259. [Google Scholar] [CrossRef]
  26. Gao, Y.; Xiao, Y.; Wu, M.; Xiao, M.; Shao, J. Game theory-based anti-jamming strategies for frequency hopping wireless communications. IEEE Trans. Wirel. Commun. 2018, 17, 5314–5326. [Google Scholar] [CrossRef]
  27. Garnaev, A.; Petropulu, A.P.; Trappe, W.; Poor, H.V. A jamming game with rival-type uncertainty. IEEE Trans. Wirel. Commun. 2020, 19, 5359–5372. [Google Scholar] [CrossRef]
  28. Yao, Y.; Zhou, W.; Kou, B.; Wang, Y. Dynamic spectrum access with physical layer security: A game-based jamming approach. IEEE Access 2018, 6, 12052–12059. [Google Scholar] [CrossRef]
  29. d’Oro, S.; Galluccio, L.; Morabito, G.; Palazzo, S.; Chen, L.; Martignon, F. Defeating jamming with the power of silence: A game-theoretic analysis. IEEE Trans. Wirel. Commun. 2014, 14, 2337–2352. [Google Scholar] [CrossRef] [Green Version]
  30. Altman, E.; Avrachenkov, K.; Garnaev, A. A jamming game in wireless networks with transmission cost. In Proceedings of the International Conference on Network Control and Optimization, Avignon, France, 5–7 June 2007; Springer: Avignon, France, 2007; pp. 1–12. [Google Scholar]
  31. Jia, L.; Xu, Y.; Sun, Y.; Feng, S.; Yu, L.; Anpalagan, A. A multi-domain anti-jamming defense scheme in heterogeneous wireless networks. IEEE Access 2018, 6, 40177–40188. [Google Scholar] [CrossRef]
  32. Chen, C.; Song, M.; Xin, C.; Backens, J. A game-theoretical anti-jamming scheme for cognitive radio networks. IEEE Netw. 2013, 27, 22–27. [Google Scholar] [CrossRef]
  33. La, Q.D.; Quek, T.Q.; Lee, J.; Jin, S.; Zhu, H. Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things. IEEE Internet Things J. 2016, 3, 1025–1035. [Google Scholar] [CrossRef]
  34. Nan, S.; Brahma, S.; Kamhoua, C.A.; Leslie, N.O. Mitigation of Jamming Attacks via Deception. In Proceedings of the 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, London, UK, 31 August–3 September 2020; pp. 1–6. [Google Scholar]
  35. Hoang, D.T.; Nguyen, D.N.; Alsheikh, M.A.; Gong, S.; Dutkiewicz, E.; Niyato, D.; Han, Z. “Borrowing Arrows with Thatched Boats”: The Art of Defeating Reactive Jammers in IoT Networks. IEEE Wirel. Commun. 2020, 27, 79–87. [Google Scholar] [CrossRef]
  36. Bhunia, S.; Sengupta, S.; Vázquez-Abad, F. Performance analysis of CR-honeynet to prevent jamming attack through stochastic modeling. Pervasive Mob. Comput. 2015, 21, 133–149. [Google Scholar] [CrossRef]
  37. Firouzbakht, K.; Noubir, G.; Salehi, M. On the performance of adaptive packetized wireless communication links under jamming. IEEE Trans. Wirel. Commun. 2014, 13, 3481–3495. [Google Scholar] [CrossRef] [Green Version]
  38. Osanaiye, O.; Alfa, A.; Hancke, G. A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks. Sensors 2018, 18, 1691. [Google Scholar] [CrossRef] [Green Version]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.