On Distribution-Preserving Mitigation Strategies for Communication under Cognitive Adversaries (2307.03105v1)
Abstract: In wireless security, cognitive adversaries are known to inject jamming energy on the victim's frequency band and monitor the same band for countermeasures thereby trapping the victim. Under the class of cognitive adversaries, we propose a new threat model wherein the adversary, upon executing the jamming attack, measures the long-term statistic of Kullback-Leibler Divergence (KLD) between its observations over each of the network frequencies before and after the jamming attack. To mitigate this adversary, we propose a new cooperative strategy wherein the victim takes the assistance for a helper node in the network to reliably communicate its message to the destination. The underlying idea is to appropriately split their energy and time resources such that their messages are reliably communicated without disturbing the statistical distribution of the samples in the network. We present rigorous analyses on the reliability and the covertness metrics at the destination and the adversary, respectively, and then synthesize tractable algorithms to obtain near-optimal division of resources between the victim and the helper. Finally, we show that the obtained near-optimal division of energy facilitates in deceiving the adversary with a KLD estimator.
- Catherine Meadows, “A formal framework and evaluation method for network denial of service”, Proceedings 12th IEEE Computer Security Foundations Workshop, pp. 4-13, June 1999.
- K. Pelechrinis, C. Koufogiannakis, and S. V. Krishnamurthy, “On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks,” IEEE Trans. Wireless Communication, vol. 9, no. 10, pp. 3258–3271, Oct. 2010.
- S. M. Khattab, D. Mosse and R. G. Melhem, “Jamming mitigation in multi-radio wireless networks: Reactive or proactive?,” Proceedings 4th Int. Conf. Security Privacy Communication Network, pp. 1-10, 2008.
- Z. Zhang, K. Long, A. V. Vasilakos and L. Hanzo, “Full-Duplex Wireless Communications: Challenges, Solutions, and Future Research Directions,” in Proceedings of the IEEE, vol. 104, no. 7, pp. 1369-1409, July 2016.
- K. Ibrahim, S. X. Ng, I. M. Qureshi, A. N. Malik and S. Muhaidat, “Anti-Jamming Game to Combat Intelligent Jamming for Cognitive Radio Networks,” in IEEE Access, vol. 9, pp. 137941-137956, 2021.
- V. Chaudhary and J. Harshan, “Fast-Forward Relaying Scheme to Mitigate Jamming Attacks by Full-Duplex Radios,” 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, 2020, pp. 1-7.
- V. Chaudhary and H. Jagadeesh, “Constellation Design for Non-Coherent Fast-Forward Relays to Mitigate Full-Duplex Jamming Attacks,” in IEEE Transactions on Communications, vol. 70, no. 7, pp. 4755-4770, July 2022.
- Y. Liao, T. Wang, L. Song, and Z. Han, “Listen-and-talk: Protocol design and analysis for full-duplex cognitive radio networks,” IEEE Transaction Vehicular Technology, vol. 66, no. 1, pp. 656–667, Jan. 2017.
- D. Li, J. Cheng, and V. C. M. Leung, “Adaptive spectrum sharing for half-duplex and full-duplex cognitive radios: From the energy efficiency perspective,” IEEE Transaction Communication, vol. 66, no. 11, pp. 5067–5080, Nov. 2018.
- V. Towhidlou and M. Shikh-Bahaei, “Adaptive full-duplex communications in cognitive radio networks,” IEEE Transaction Vehicular Technology, vol. 67, no. 9, pp. 8386–8395, Sep. 2018
- Q. Wang, S. R. Kulkarni and S. Verdu, “Divergence Estimation for Multidimensional Densities Via k -Nearest-Neighbor Distances,” in IEEE Transactions on Information Theory, vol. 55, no. 5, pp. 2392-2405, May 2009.