csc774 - ncsu advanced network security mitigation of primary user emulation attack using time of...
TRANSCRIPT
![Page 1: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/1.jpg)
CSC774 - NCSU ADVANCED NETWORK SECURITY
Mitigation of Primary User Emulation Attack
using Time of Emission
Estimation
Natraj Jaganmohan (njaganm)Sandeep A Rao (sarao)
1
![Page 2: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/2.jpg)
2
Agenda of the presentation:Background about Cognitive Radio NetworksPrimary User Emulation Attack (PUEA)Existing approaches to solve PUEA.PUEA attack model with Directional antennas. Attack mitigation using TOE estimation.Simulation results.Limitations of the approach.Future directions of research.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 3: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/3.jpg)
3
It all started here:“All consumers . . . deserve a new
spectrum policy paradigm that is rooted in modern-day technologies and markets. We are living in a world where demand for spectrum is driven by an explosion of wireless technology and the ever-increasing popularity of wireless services. Nevertheless, we are still living under a spectrum 'management' regime that is 90 years old. It needs a hard look, and in my opinion, a new direction.”
Michael K. Powell (Chairman FCC Spectrum Policy Task Force)
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 4: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/4.jpg)
4
Spectrum Scarcity:Cognitive Networks help us solve the
problem.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 5: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/5.jpg)
5
Background: Cognitive Radio Networks.
Wireless spectrum is very scarce leading to spectrum crisis.
FCC recommends use of opportunistic or cognitive networks to increase spectrum utilization.
This technology would put unused and under-used spectrum assets to work – without impacting primary users within those bands. It is a bold, yet workable solution.
CSC774 ADVANCED NETWORK SECURITY
![Page 6: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/6.jpg)
6
Background: Cognitive Radio Networks.
“A Cognitive Radio is a radio frequency transmitter/receiver that is designed to intelligently detect whether a particular segment of the radio spectrum is currently in use, and to jump into (and out of, as necessary) the temporarily-unused spectrum very rapidly, without interfering with the transmissions of other authorized users.”
http://www.ieeeusa.org/forum/POSITIONS/cognitiveradio.html
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 7: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/7.jpg)
7
Cognitive Radio networks operation:
PU-Tx
PU-RX
PU-RX
PU-RX
SU SU
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 8: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/8.jpg)
8
What makes Cognitive Networks possible?
Key enablers of CRNs:
Radio manufacturers have started to create flexible software-defined radios.
Research funding and support for spectrum re-use.
Support for Dynamic Channel selection, channel scanning and adjustable transmission power.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 9: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/9.jpg)
9
Some terminologies used in this presentation:
CRN: Cognitive Radio NetworkPU: Primary User (licensed user)SU: Secondary user (CRN node)PUEA: Primary User Emulation AttackFC: Fusion CenterTOE: Time of EmissionTOA: Time of Arrival.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 10: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/10.jpg)
CSC774 ADVANCED NETWORK SECURITY
10
Most important attacks on CRNs
Spectrum data falsification attacks: In this case, one or more SUs are compromised and hence report wrong sensing values to FC. This makes the FC make incorrect decision about the presence of PU.
The most preferred way to mitigate the attack is to collect sensing values from a group of SUs and remove the outlier values.
![Page 11: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/11.jpg)
11
Primary User Emulation Attack:
PU1
Primary Transmitter
PU2
PU3
SU1SU2
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 12: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/12.jpg)
12
Primary User Emulation Attack:
PU1
Primary Transmitter
PU2
PU3
SU1
SU2
Attacker
CSC774 - NCSU ADVANCED NETWORK SECURITY
SUs cannot access channel as they think PU is transmitting
![Page 13: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/13.jpg)
13
Why are we facing this attack :Secondary users cannot
authenticate the PU transmission.
FCC states that PU cannot be modified to support security. Hence regular authentication schemes don’t work.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 14: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/14.jpg)
14
General approaches to defeat this attack: Solution 1RSSI based PU localization:
(x,y)
FC
CSC774 - NCSU ADVANCED NETWORK SECURITY
RSSI values are measured at all SUs and calculate the location of PU.
Decision is made based on all received sensing reports
Ideal case of a PU transmitting, all RSSI values will be correct w.r.t distance
![Page 15: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/15.jpg)
15
Solution 1 proposed by:Zhou Yuan et al, suggested the use of
localization schemes to estimate and authenticate the location of PU.
Scheme based on Received signal power.
Pr = Pt + a 10 log (do/d) + w
It can be defeated by attacker by using Antenna arrays with different power levels.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 16: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/16.jpg)
16
General approaches to defeat this attack: Solution 2 Dr. Peng Ning et al proposed
integrating cryptographic signatures and wireless link signatures to enable primary user detection. Essential to the approach is a helper node placed physically close to a primary user.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 17: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/17.jpg)
17
General approaches to defeat this attack: Solution 2Working with helper nodes.
(x,y)
Helper Node
CSC774 - NCSU ADVANCED NETWORK SECURITY
Helper node transmits signals identical to PU
SUs can try to verify the PU authenticity by verifying the Wireless Link signature of Helper node
![Page 18: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/18.jpg)
18
General approaches to defeat this attack: Solution 2This technique is very effective in
terms of authenticating primary user. We exploit the proximity of Helper node with PU.
Problem is the authentication of wireless link signature of the helper node. Also if attackers are placed near helper nodes, then it causes problems.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 19: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/19.jpg)
19
General approaches to defeat this attack: Solution 3IRIS model proposed by Alexander et
al, has a secure attack detection by verifying the consistency of system state (Transmit power and path loss).
This technique is very effective and it defeats both Data Falsification attacks and PUEA. But, it fails in the case of attacker with antenna arrays and directional antenna.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 20: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/20.jpg)
20
Attack model: Assumptions :
All nodes are loosely time synchronized.
Location of PU is fixed and known to all SUs.
Fusion Center is used to make decision about presence of PU.
All SUs are connected to FC using a secure link.
There is a LOS path between every SU and PU.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 21: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/21.jpg)
21
Attack model : MotivationThis attack model fails all the
localization based solutions for PUEA which have been proposed previously.
Attacker uses a multi antenna array or MIMO technology with directional antennas to send PU-TX like signals to different SUs with various power levels faking the presence of PU.CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 22: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/22.jpg)
22
Attack model: Representation The power levels at different nodes are expected with
respect to the distance from the PU-TX.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 23: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/23.jpg)
23
Attack model:Antenna array – multiple antenna
transmitter
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 24: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/24.jpg)
24
Attack model:This attack is possible because:1. Antenna arrays are low cost
and easy to setup2. Attacker can manipulate the
power levels in each directional beam from every antenna element to make sure every SU calculates the RSSI equal to the RSSI when PU transmits.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 25: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/25.jpg)
25
Attack model: ValidationWe have simulated the attack
model to verify whether such an attack is really possible.
Modeler: Opnet Network modeler 16
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 26: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/26.jpg)
26
Attack model: Directional Antenna pattern formation in Opnet
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 27: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/27.jpg)
27
Attack model: Directional Antenna pattern formation in Opnet
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 28: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/28.jpg)
28
Attack model: Directional Antenna pattern formation in Opnet
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 29: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/29.jpg)
29
Attack model: A sample scenario proving the possibility of attack
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 30: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/30.jpg)
30
Attack model: Throughput graphs.
PU-TX (antenna 1)
SU-1
SU-2
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 31: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/31.jpg)
31
Attack model: Multiple antenna array simulation.
Ref: http://fens.sabanciuniv.edu/telecom/eng/comnet/cisco/smart.htm
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 32: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/32.jpg)
32
Attack model: ValidationHence if the attacker can
configure each antenna element with the appropriate power levels to produce required RSSI values at each SU, then attack is achieved.
Regular localization based methods cannot defeat this attack. This forms the motivation for our solution.
CSC774 DVANCED NETWORK SECURITYCSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 33: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/33.jpg)
33
Time of Emission Estimation Based Approach : Our solution to PUEA
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 34: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/34.jpg)
34
ModelSU
SU
SU
SU
FusionCenter
PU
PUE
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 35: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/35.jpg)
35
AssumptionsSecondary Users and Fusion
Center ◦are loosely Synchronized◦have secure communication
Fusion Center ◦cannot be compromised◦knows locations of all users
(secondary as well as primary)◦has good computational power and
storageCSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 36: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/36.jpg)
36
Attacker CapabilitiesCan use antenna array
◦But transmitting with a beam formation at different locations at different times is restricted.
Multiple Attackers can coordinate ◦They can be synchronized among
themselvesAttacker knows location of all
nodesSU may be compromised
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 37: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/37.jpg)
37
Proposed ApproachSensors measure Time of ArrivalFusion Center estimates Time of
EmissionRobust against,
◦Multiple, coordinated attackers◦Multiple compromised secondary
users◦Node with Antenna Array!
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 38: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/38.jpg)
38
Design
SU
FusionCenter
PU
Estimate TOA!
TOA
Estimate TOE!
TOE estimated for every sensor must be almost same in an ideal scenario
In the presence of an attack there will be deviations in some TOE estimations
SU
Estimate TOA!TOA
PUEA result
PUEA result
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 39: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/39.jpg)
39
Intuition
Time
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 40: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/40.jpg)
40
ProcedureFC
TOA
TOATOATOA
TOA
FOR EACH NODE MEASURE TOE!
TOEi = TOAi – Dist/c + ξ
COMPUTE MEAN TOEmean
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 41: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/41.jpg)
41
Procedure
FOR EACH NODE, MEASURE DEVIATION!
δi = TOEAVG ~ TOEi
If δi > μ Increment C μ -> Maximum allowable deviation!C -> number of deviated values
If C > k then PUEA!k -> Maximum no. of allowable deviated reports
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 42: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/42.jpg)
42
Parameters!Determining μ
◦ The maximum deviation in the measurement by a node under a non-attack scenario!
Determining k ◦Too small? Increase in false negative!◦Too large? Increase in false alarm!◦Tradeoff needed!
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 43: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/43.jpg)
43
Simulation Results
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 44: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/44.jpg)
44
LimitationIf an attacker is capable of
compromising almost every node! ◦Attacker too powerful!
◦Note: We have a threshold which is used to tolerate certain number of configured node compromises. But, if almost all nodes in network are compromised, then the network is not useful.
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 45: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/45.jpg)
45
Future workFCC may relax rule “no
modification to the incumbent (primary) system should be required to accommodate opportunistic use of the spectrum by secondary users”◦Already relaxed for wireless
microphones Removing Fusion Center
◦May decrease latency and increase performance of system.CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 46: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/46.jpg)
46
SummaryAn Attack Model against the
approaches using RSSI is proposed and simulated
A Novel approach to mitigate PUEA is proposed using Time of Emission Estimation and simulated
Approach is compared with a similar RSSI based approach
CSC774 - NCSU ADVANCED NETWORK SECURITY
![Page 47: CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep](https://reader031.vdocuments.net/reader031/viewer/2022032200/56649c3a5503460f948e4b29/html5/thumbnails/47.jpg)
47
Thank you!
CSC774 - NCSU ADVANCED NETWORK SECURITY