Skip to main content

A Distributed Strategy for Defensing Objective Function Attack in Large-scale Cognitive Networks

  • Conference paper
Intelligent Computation in Big Data Era (ICYCSEE 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 503))

  • 1974 Accesses

Abstract

Most of existed strategies for defending OFA (Objective Function Attack)are centralized, only suitable for small-scale networks and stressed on the computation complexity and traffic load are usually neglected. In this paper, we pay more attentions on the OFA problem in large-scale cognitive networks, where the big data generated from the network must be considered and the traditional methods could be of helplessness. In this paper, we first analyze the interactive processes between attacker and defender in detail, and then a defense strategy for OFA based on differential game is proposed, abbreviated as DSDG. Secondly, the game saddle point and optimal defense strategy have proved to be existed simultaneously. Simulation results show that the proposed DSDG has a less influence on network performance and a lower rate of packet loss.More importantly, it can cope with the large range OFA effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Thomas, R.W., Friend, D.H., Dasilva, L.A., Mackenzie, A.B.: Cognitive networks: adaptation and learning to achieve end-to-end performance objectives. IEEE Communications Magazine 44(12), 51–57 (2006)

    Article  Google Scholar 

  2. Fortuna, C., Mohorcic, M.: Trends in the development of communication networks: Cognitive networks. Computer Networks 53(9), 1354–1376 (2009)

    Article  Google Scholar 

  3. Parvin, S., Hussain, F.K., Hussain, O.K., Han, S., Tian, B., Chang, E.: Cognitive radio network security: A survey. Journal of Network and Computer Applications 35(6), 1691–1708 (2012)

    Article  Google Scholar 

  4. Pei, Q., Li, H., Ma, J., Fan, K.: Defense against objective function attacks in cognitive radio networks. Chinese Journal of Electronics 20(4), 138–142 (2011)

    Google Scholar 

  5. Le, N.O., Hern, N.S.J., Soriano, M.: Securing cognitive radio networks. International Journal of Communication Systems 23(5), 633–652 (2010)

    Google Scholar 

  6. Reddy, Y.: Security Issues and Threats in Cognitive Radio Networks. In: The Ninth Advanced International Conference on Telecommunications(AICT 2013), Bangkok, Thailand, pp. 84–89 (2013)

    Google Scholar 

  7. El-Hajj, W., Safa, H., Guizani, M.: Survey of security issues in cognitive radio networks. Journal of Internet Technology 12(2), 181–198 (2011)

    Google Scholar 

  8. Feng, G., Zhao, X., Wang, H., et al.: A Game-Theoretic View on Objective Function Attack and ITS Defense. In: 4th IEEE Conference on Communication Systems and Network Technologies (CSNT), pp. 1152–1156 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Feng, G., Lin, J., Wang, H., Zhao, X., Lv, H., Zhao, Q. (2015). A Distributed Strategy for Defensing Objective Function Attack in Large-scale Cognitive Networks. In: Wang, H., et al. Intelligent Computation in Big Data Era. ICYCSEE 2015. Communications in Computer and Information Science, vol 503. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46248-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46248-5_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46247-8

  • Online ISBN: 978-3-662-46248-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics