Collaborative Adversarial Modeling for Spectrum Aware IoT Communications

In order to cater the growing spectrum demands of large scale future 5G Internet of Things (IoT) applications, Dynamic Spectrum Access (DSA) based networks are being proposed as a high-throughput and cost-effective solution. However the lack of understanding of DSA paradigm's inherent security...

Full description

Saved in:
Bibliographic Details
Published in2018 International Conference on Computing, Networking and Communications (ICNC) pp. 447 - 451
Main Authors Samanta, Priyanka, Kelly, Elizabeth, Bashir, Amina, Debroy, Saptarshi
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.03.2018
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In order to cater the growing spectrum demands of large scale future 5G Internet of Things (IoT) applications, Dynamic Spectrum Access (DSA) based networks are being proposed as a high-throughput and cost-effective solution. However the lack of understanding of DSA paradigm's inherent security vulnerabilities on IoT networks might become a roadblock towards realizing such spectrum aware 5G vision. In this paper, we make an attempt to understand how such inherent DSA vulnerabilities in particular Spectrum Sensing Data Falsification (SSDF) attacks can be exploited by collaborative group of selfish adversaries and how that can impact the performance of spectrum aware IoT applications. We design a utility based selfish adversarial model mimicking collaborative SSDF attack in a cooperative spectrum sensing scenario where IoT networks use dedicated environmental sensing capability (ESC) for spectrum availability estimation. We model the interactions between the IoT system and collaborative selfish adversaries using a leaderfollower game and investigate the existence of equilibrium. Using simulation results, we show the nature of adversarial and system utility components against system variables. We also explore Pareto-optimal adversarial strategy design that maximizes the attacker utility for varied system strategy spaces.
DOI:10.1109/ICCNC.2018.8390289