Elsevier

Ad Hoc Networks

Volume 25, Part A, February 2015, Pages 237-250
Ad Hoc Networks

Turning foes to allies in cognitive radio networks

https://doi.org/10.1016/j.adhoc.2014.10.015Get rights and content

Abstract

We study a class of problems in Cognitive Radio Networks where multiple half-duplex unlicensed (secondary) users can eavesdrop and jam the communications of licensed (primary) users unless granted access to communicate over the same spectrum band. The problem is to characterize the optimal rule for the primary system that grants spectrum access to selected secondary users and the optimal resource allocation for the secondary users. We model the problem as a Stackelberg game with the primary system as the leader. The equilibrium analysis shows that it is not always optimal to grant access to the strongest eavesdroppers. In addition, it is shown that transmitting secondary users can limit the eavesdropping capabilities of other secondary users, possibly leading to improved primary secure transmission data rate. Thus, interestingly, the outcome reveals a recruiting process that turns selected eavesdroppers into helping jammers under certain conditions. Finally, we propose a low complexity algorithm to select a subset of secondary users for transmission and evaluate the performance of the primary system when different number of secondary users are granted access through simulations.

Introduction

In this paper, we study a kind of unregulated cognitive radio networks in which unlicensed (secondary) users can possibly compromise confidentiality or disrupt the transmission of licensed primary users (PUs) by eavesdropping or jamming. Specifically, the eavesdropping secondary users (ESUs) may threaten the primary system by either eavesdropping primary traffic or jamming the primary receiver when they cannot transmit their own information. Since ESUs have half-duplex transceivers, they can either transmit or eavesdrop at any given time. Thus, granting spectrum access to selected ESUs to transmit their own information on the same spectrum band will neutralize their eavesdropping threat and may improve the secrecy of the transmission of PUs.

The novel idea of “threaten-to-access” in Cognitive Radio Networks (CRNs) was recently introduced in [1], [2]. In this work, ESUs that wish to transmit their own information to a base station owned by the primary system and primarily serving PUs (e.g., a mobile network operator), may pose secrecy threats to PUs by eavesdropping the primary transmitted signals and hence decreasing primary secure transmission data rates.1 The main goal, however, for ESUs is communicating their own information to the primary base station, which then serves as the common destination for both the primary and secondary users in this model. This is in contrast to most of the works in the literature on security [3], where the only objective of attackers is to minimize the achievable confidential rates of PUs. The scenario studied in this paper can model cases when sensitive PU traffic is to be transmitted (e.g., banking information) in the presence of untrusted nodes willing to access spectrum. Our goal is to study fundamental performance and thus physical layer secrecy is considered as a measure of transmission privacy.

Physical layer secrecy is a notion introduced in information theory to measure confidentiality of data transmission with respect to unauthorized eavesdroppers. As defined originally by Shannon [4], perfect secrecy is achieved when the received signals at the eavesdropper are independent from the transmitted signals. The research in physical layer secrecy is largely motivated by Wyner’s seminal work [5]. The main idea is to exploit the physical characteristics of the wireless channel (such as noise or fading) to confuse the eavesdroppers, in contrast to classical cryptographic techniques relying on secret keys [6], [7]. Through means of artificial noise forwarding (also called cooperative jamming), achievable secrecy rates of legitimate transmitters can be improved [8], [9]. In our work, transmitting ESUs can cause interference on the receivers at eavesdropping ESUs and thus can improve the secure rate of PUs.

In this paper, we seek to answer the following questions:

  • 1.

    When is it optimal for the primary system to grant an eavesdropping secondary user (ESU) access to licensed spectrum?

  • 2.

    When multiple ESUs exist, which subset of ESUs does the primary system select to grant spectrum access so that the primary secrecy rate is improved?

  • 3.

    For each ESU, what is the optimal resource allocation?

To this end, we develop static non-cooperative games [10] that model interactions between half-duplex ESUs wishing to transmit their own information to a common destination (e.g., base station in a cellular system or access point in WiFi network) and a PU, which is interested in maximizing its secure rate. We adopt the information theoretic secrecy notion [11], [12] as a measure of the confidentiality of the transmission of PU. In information theoretic secrecy schemes, security can be proven mathematically without imposing any restriction on the computational ability of the eavesdroppers, which is not possible in conventional cryptography. Its results are thus fundamental and independent on the state of technology. When an ESU is granted spectrum access and starts transmitting its own information, it is no longer an eavesdropper. In addition, when multiple ESUs exist, the transmission of a selected ESU causes interference on other receiving ESUs and therefore may limit their eavesdropping capabilities. Thus, selected ESUs may be considered as allies in this case. In this paper, we analyze equilibria of the strategic games and discuss their uniqueness properties. Moreover, we present interesting observations about some special cases and then provide a discussion on how our model can be implemented in cellular networks.

In [1], [2], transmission coordination is employed between PU and ESUs (during transmission of ESU) where an optimal multiple access coding scheme [13] is used. In this paper, we consider more practical level of coordination between PUs and ESUs, where the decoder treats signals other than the intended ones as noise. Moreover, we consider the case when multiple ESUs exist in the cognitive radio network and characterize the optimal ESU spectrum access rule the primary system should employ to improve secure rate of the PU. We also show that this model bridges the gap between coordination models considered in [2] and conventional CRN models [14], where there is minimal interaction between PUs and SUs. Specifically, the scheme developed in this paper only requires changes to the admission control algorithms at the base station and the channel state feedback algorithm at PUs.

The rest of this paper is organized as follows. Section 2 presents our system model and our assumptions. In Section 3, we formulate a 2-player game, characterize equilibria in different cases of channel conditions and study their uniqueness. In Section 4, we extend the game to multiple ESUs. In Section 5, we discuss interesting observations on the outcome of the games considered. Finally, we evaluate the performance of the primary system through simulations in Section 6 and conclude the paper in Section 7.

Section snippets

Preliminaries and network model

In this section, we review results and definitions from information theory and game theory that are essential to our analysis. Then, we introduce our network model and the assumptions we make in the paper.

Single ESU game

In this section, we analyze the scenario when only one ESU is present in the network. We characterize the cases when it is beneficial for the primary system to allow the ESU to transmit its own information. The results in this section are then used in the more interesting scenario with multiple ESUs, which is discussed in Section 4.

Here, the strategy of the base station is either to allow the ESU to transmit its own information, by choosing sP=1, or block ESU traffic by choosing sP=0. When sP=1

The multiple-ESU game

In this section, we extend the game in Section 3.1 to multiple ESUs. Here, we consider the case when only one ESU can be granted spectrum access. We study a 3-player static game with the base station and two ESUs (nodes 1 and 2) as shown in Fig. 1. It can be seen that the extension to the game with larger number of ESUs is straightforward. We also discuss the extension to grant spectrum to multiple ESUs in Sections 5 Discussion, 6 Performance evaluation. In addition, in the remaining parts of

Discussion

In this section, we present some interesting observations on the outcome of the multiple-ESU game and also discuss extensions to the model considered.

Performance evaluation

In this section, we evaluate the performance of the primary network for different ESU spectrum access schemes. First, we study the case where at most one ESU is granted spectrum access. Then we move to the case when multiple ESUs can be granted spectrum simultaneously.

Conclusion

We presented a non-cooperative game theoretical formulation that models eavesdropping and jamming threats of secondary users to primary systems. In the presented games, the primary system allows a subset of ESUs to transmit their information to the common destination, simultaneously with the primary user’s transmission, to improve its secure rate. Equilibria of the game, in which the base station is the leader and ESUs are the followers, were characterized, where we showed that discrete

Karim Khalil received the B.S. degree in electronics and communications engineering from Cairo University, Cairo, Egypt, in 2007, and the M.S. degree in wireless communications from Nile University, Cairo, Egypt, in 2009. He received the Ph.D. degree in electrical and computer engineering from The Ohio State University, Columbus, OH, in 2014. From February 2013 to August 2013, he was with Wireless Communications group, Fujitsu Laboratories of America, Sunnyvale, CA, as a research intern. In

References (17)

  • I.F. Akyildiz et al.

    NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey

    Comput. Netw.

    (2006)
  • K. Khalil, E. Ekici, Multiple access game with a cognitive jammer, in: Proceedings of the 46th Asilomar Conference on...
  • K. Khalil, E. Ekici, Multiple Access Games with a Cognitive Eavesdropper, arXiv preprint...
  • K.J.R. Liu et al.

    Cognitive Radio Networking and Security

    (2011)
  • C.E. Shannon

    Communication theory of secrecy systems

    Bell Syst. Tech. J.

    (1949)
  • A.D. Wyner

    The wire-tap channel

    Bell Syst. Tech. J.

    (1974)
  • M. Bloch et al.

    Physical-Layer Security: From Information Theory to Security Engineering

    (2011)
  • R. Liu et al.

    Securing Wireless Communications at the Physical Layer

    (2009)
There are more references available in the full text version of this article.

Cited by (0)

Karim Khalil received the B.S. degree in electronics and communications engineering from Cairo University, Cairo, Egypt, in 2007, and the M.S. degree in wireless communications from Nile University, Cairo, Egypt, in 2009. He received the Ph.D. degree in electrical and computer engineering from The Ohio State University, Columbus, OH, in 2014. From February 2013 to August 2013, he was with Wireless Communications group, Fujitsu Laboratories of America, Sunnyvale, CA, as a research intern. In Summer 2014, he was with the Wireless Development group, Cisco Systems, Richfield, OH, as a Hardware Engineering intern. His research interests are wireless communications, cognitive radio networks, information-theoretic security, and game theory. He has three pending patents. He is the recipient of the Ohio State University Fellowship Award.

Eylem Ekici has received his BS and MS degrees in Computer Engineering from Bogazici University, Istanbul, Turkey, in 1997 and 1998, respectively. He received his Ph.D. degree in Electrical and Computer Engineering from Georgia Institute of Technology, Atlanta, GA, in 2002. Currently, he is an associate professor in the Department of Electrical and Computer Engineering of The Ohio State University, Columbus, OH. He is an associate editor of IEEE/ACM Transactions on Networking, Computer Networks Journal (Elsevier), and ACM Mobile Computing and Communications Review. He also served as the general co-chair of ACM MobiCom 2012. He is the recipient of 2008 and 2014 Lumley Research Award of the College of Engineering at OSU. His current research interests include wireless sensor networks, vehicular communication systems, and next generation wireless systems, with a focus on routing and medium access control protocols, resource management, and analysis of network architectures and protocols. He is a Senior Member of IEEE and a member of ACM.

View full text