Illegitimate User

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 732 Experts worldwide ranked by ideXlab platform

Zhu Han - One of the best experts on this subject based on the ideXlab platform.

  • Spectrum Sensing Under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective
    IEEE Transactions on Information Forensics and Security, 2018
    Co-Authors: Linyuan Zhang, Guoru Ding, Zhu Han
    Abstract:

    Spectrum misuse behaviors, brought either by Illegitimate access or by rogue power emission, endanger the legitimate communication and deteriorate the spectrum usage environment. In this paper, our aim is to detect whether the spectrum band is occupied, and if it is occupied, recognize whether the misuse behavior exists. One vital challenge is that the legitimate spectrum exploitation and misuse behaviors probabilistically coexist and the Illegitimate User may act in an intermittent and fast-changing manner, which brings about much uncertainty for spectrum sensing. To tackle it, we first formulate the spectrum sensing problems under Illegitimate access and rogue power emission as a uniform ternary hypothesis test. Then, we develop a novel test criterion, named the generalized multi-hypothesis Neyman–Pearson (GMNP) criterion. Following the criterion, we derive two test rules based on the generalized likelihood ratio test and the Rao test, respectively, whose asymptotic performances are analyzed and an upper bound is also given. Furthermore, a cooperative spectrum sensing scheme is designed based on the global GMNP criterion to further improve the detection performances. In addition, extensive simulations are provided to verify the proposed schemes’ performance under various parameter configurations.

  • Spectrum Sensing under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective
    arXiv: Signal Processing, 2017
    Co-Authors: Linyuan Zhang, Guoru Ding, Zhu Han
    Abstract:

    Spectrum misuse behaviors, brought either by Illegitimate access or by rogue power emission, endanger the legitimate communication and deteriorate the spectrum usage environment. In this paper, our aim is to detect whether the spectrum band is occupied, and if it is occupied, recognize whether the misuse behavior exists. One vital challenge is that the legitimate spectrum exploitation and misuse behaviors coexist and the Illegitimate User may act in an intermittent and fast-changing manner, which brings about much uncertainty for spectrum sensing. To tackle it, we firstly formulate the spectrum sensing problems under Illegitimate access and rogue power emission as a uniform ternary hypothesis test. Then, we develop a novel test criterion, named the generalized multi-hypothesis N-P criterion. Following the criterion, we derive two test rules based on the generalized likelihood ratio test and the R-test, respectively, whose asymptotic performances are analyzed and an upper bound is also given. Furthermore, a cooperative spectrum sensing scheme is designed based on the global N-P criterion to further improve the detection performances. In addition, extensive simulations are provided to verify the proposed schemes' performance under various parameter configurations.

Linyuan Zhang - One of the best experts on this subject based on the ideXlab platform.

  • Spectrum Sensing Under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective
    IEEE Transactions on Information Forensics and Security, 2018
    Co-Authors: Linyuan Zhang, Guoru Ding, Zhu Han
    Abstract:

    Spectrum misuse behaviors, brought either by Illegitimate access or by rogue power emission, endanger the legitimate communication and deteriorate the spectrum usage environment. In this paper, our aim is to detect whether the spectrum band is occupied, and if it is occupied, recognize whether the misuse behavior exists. One vital challenge is that the legitimate spectrum exploitation and misuse behaviors probabilistically coexist and the Illegitimate User may act in an intermittent and fast-changing manner, which brings about much uncertainty for spectrum sensing. To tackle it, we first formulate the spectrum sensing problems under Illegitimate access and rogue power emission as a uniform ternary hypothesis test. Then, we develop a novel test criterion, named the generalized multi-hypothesis Neyman–Pearson (GMNP) criterion. Following the criterion, we derive two test rules based on the generalized likelihood ratio test and the Rao test, respectively, whose asymptotic performances are analyzed and an upper bound is also given. Furthermore, a cooperative spectrum sensing scheme is designed based on the global GMNP criterion to further improve the detection performances. In addition, extensive simulations are provided to verify the proposed schemes’ performance under various parameter configurations.

  • Spectrum Sensing under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective
    arXiv: Signal Processing, 2017
    Co-Authors: Linyuan Zhang, Guoru Ding, Zhu Han
    Abstract:

    Spectrum misuse behaviors, brought either by Illegitimate access or by rogue power emission, endanger the legitimate communication and deteriorate the spectrum usage environment. In this paper, our aim is to detect whether the spectrum band is occupied, and if it is occupied, recognize whether the misuse behavior exists. One vital challenge is that the legitimate spectrum exploitation and misuse behaviors coexist and the Illegitimate User may act in an intermittent and fast-changing manner, which brings about much uncertainty for spectrum sensing. To tackle it, we firstly formulate the spectrum sensing problems under Illegitimate access and rogue power emission as a uniform ternary hypothesis test. Then, we develop a novel test criterion, named the generalized multi-hypothesis N-P criterion. Following the criterion, we derive two test rules based on the generalized likelihood ratio test and the R-test, respectively, whose asymptotic performances are analyzed and an upper bound is also given. Furthermore, a cooperative spectrum sensing scheme is designed based on the global N-P criterion to further improve the detection performances. In addition, extensive simulations are provided to verify the proposed schemes' performance under various parameter configurations.

Guoru Ding - One of the best experts on this subject based on the ideXlab platform.

  • Spectrum Sensing Under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective
    IEEE Transactions on Information Forensics and Security, 2018
    Co-Authors: Linyuan Zhang, Guoru Ding, Zhu Han
    Abstract:

    Spectrum misuse behaviors, brought either by Illegitimate access or by rogue power emission, endanger the legitimate communication and deteriorate the spectrum usage environment. In this paper, our aim is to detect whether the spectrum band is occupied, and if it is occupied, recognize whether the misuse behavior exists. One vital challenge is that the legitimate spectrum exploitation and misuse behaviors probabilistically coexist and the Illegitimate User may act in an intermittent and fast-changing manner, which brings about much uncertainty for spectrum sensing. To tackle it, we first formulate the spectrum sensing problems under Illegitimate access and rogue power emission as a uniform ternary hypothesis test. Then, we develop a novel test criterion, named the generalized multi-hypothesis Neyman–Pearson (GMNP) criterion. Following the criterion, we derive two test rules based on the generalized likelihood ratio test and the Rao test, respectively, whose asymptotic performances are analyzed and an upper bound is also given. Furthermore, a cooperative spectrum sensing scheme is designed based on the global GMNP criterion to further improve the detection performances. In addition, extensive simulations are provided to verify the proposed schemes’ performance under various parameter configurations.

  • Spectrum Sensing under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective
    arXiv: Signal Processing, 2017
    Co-Authors: Linyuan Zhang, Guoru Ding, Zhu Han
    Abstract:

    Spectrum misuse behaviors, brought either by Illegitimate access or by rogue power emission, endanger the legitimate communication and deteriorate the spectrum usage environment. In this paper, our aim is to detect whether the spectrum band is occupied, and if it is occupied, recognize whether the misuse behavior exists. One vital challenge is that the legitimate spectrum exploitation and misuse behaviors coexist and the Illegitimate User may act in an intermittent and fast-changing manner, which brings about much uncertainty for spectrum sensing. To tackle it, we firstly formulate the spectrum sensing problems under Illegitimate access and rogue power emission as a uniform ternary hypothesis test. Then, we develop a novel test criterion, named the generalized multi-hypothesis N-P criterion. Following the criterion, we derive two test rules based on the generalized likelihood ratio test and the R-test, respectively, whose asymptotic performances are analyzed and an upper bound is also given. Furthermore, a cooperative spectrum sensing scheme is designed based on the global N-P criterion to further improve the detection performances. In addition, extensive simulations are provided to verify the proposed schemes' performance under various parameter configurations.

Mohammad Reza Aref - One of the best experts on this subject based on the ideXlab platform.

  • Private Authentication: Optimal Information Theoretic Schemes
    arXiv: Information Theory, 2019
    Co-Authors: Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref
    Abstract:

    The main security service in the connected world of cyber physical systems necessitates to authenticate a large number of nodes privately. In this paper, the private authentication problem is considered, that consists of a certificate authority, a verifier, many legitimate Users (prover) and any arbitrary number of Illegitimate Users. Each legitimate User wants to be authenticated (using his personal key) by the verifier, while simultaneously wants to stay completely anonymous (even to the verifier and the CA). On the other hand, an Illegitimate User must fail to authenticate himself. We analyze this problem from an information theoretical perspective. First, we propose a general interactive information-theoretic model for the problem. As a metric to measure the reliability, we consider the authentication key rate whose rate maximization has a trade-off with establishing privacy. Then, we analyze the problem in two different regimes: finite size regime (i.e., the variables are elements of a finite field) and asymptotic regime (i.e., the variables are considered to have large enough length). For both regimes, we propose schemes that satisfy the completeness, soundness and privacy properties. In finite size regime, the idea is to generate the authentication keys according to a secret sharing scheme. In asymptotic regime, we use a random binning based scheme which relies on the joint typicality to generate the authentication keys. Moreover, providing the converse proof, we show that our scheme achieves capacity in the asymptotic regime. For finite size regime our scheme achieves capacity for large field size.

  • ITW - Private Authentication: Optimal Information Theoretic Schemes
    2019 IEEE Information Theory Workshop (ITW), 2019
    Co-Authors: Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref
    Abstract:

    The main security service in the connected world of cyber physical systems necessitates to authenticate a large number of nodes privately. In this paper, the private authentication problem is considered, that consists of a certificate authority, a verifier, many legitimate Users (prover) and any arbitrary number of Illegitimate Users. Each legitimate User wants to be authenticated (using his personal key) by the verifier, while simultaneously wants to stay completely anonymous (even to the verifier and the CA). On the other hand, an Illegitimate User must fail to authenticate himself. We analyze this problem from an information theoretical perspective. First, we propose a general interactive information-theoretic model for the problem. As a metric to measure the reliability, we consider the authentication key rate whose rate maximization has a trade-off with establishing privacy. Then, we analyze the problem in two different regimes: finite size regime (i.e., the variables are elements of a finite field) and asymptotic regime (i.e., the variables are considered to have large enough length). For both regimes, we propose schemes that satisfy the completeness, soundness and privacy properties. In finite size regime, the idea is to generate the authentication keys according to a secret sharing scheme. In asymptotic regime, we use a random binning based scheme which relies on the joint typicality to generate the authentication keys. Moreover, providing the converse proof, we show that our scheme achieves capacity in the asymptotic regime. For finite size regime our scheme achieves capacity for large field size.

Ali Karimi - One of the best experts on this subject based on the ideXlab platform.

  • smart traffic aware primary User emulation attack and its impact on secondary User throughput under rayleigh flat fading channel
    IEEE Transactions on Information Forensics and Security, 2020
    Co-Authors: Ali Karimi, Abbas Taherpour, Danijela Cabric
    Abstract:

    In this paper, an agile smart attacker model in spectrum sensing of cognitive radio network (CRN) is introduced. This smart attacker does not make the channel busy all the time, instead it senses spectrum and when a primary User leaves, it occupies the spectrum by mimicking the signal characteristics of the primary Users. To model such a smart attacker, we use a dependent Markov chain to model the primary User and primary User emulation attacker activities, simultaneously. We derive the transition probabilities for the assumed dependent Markov model. Then, the effect of the primary User and attacker traffic on a secondary User’s throughput under Rayleigh flat fading channel is investigated and closed form expressions are derived for the average probability of detection and false alarm. Furthermore, the impact of this attacker on the performance of a CRN and the throughput of the secondary User network is studied analytically. We also derive a test rule based on the generalized likelihood ratio test, to detect the legitimate User from smart Illegitimate User. In addition, launching primary User emulation attacker in the conventional and proposed smart attacking procedures are compared, where the results demonstrate that by using smart attacking, the deterioration in throughput of the secondary User’s network is considerable. In fact, it is shown that under proper selection of the traffic parameters, the secondary User’s network throughput may tend toward zero. Finally, the accuracy of the obtained results are analyzed and verified by the simulation results.

  • IST - Trusted Throughput-Efficient Spectrum Sensing Against Intelligent Malicious Behaviors in Cognitive Radio Networks
    2018 9th International Symposium on Telecommunications (IST), 2018
    Co-Authors: Ali Karimi, Abbas Taherpour
    Abstract:

    In this paper, a new model for a smart primary User emulation attacker is proposed and spectrum sensing in the presence of such an attacker, is studied. Markov chain is used to model the primary User and smart attacker activities, simultaneously. Then, we derive closed form expressions for the average probability of detection and false alarm and from there, the effect of the primary User and attacker traffic on a secondary User’s throughput is investigated. In addition, launching attacker in the conventional and proposed smart attacking procedures are compared. The numerical results show in the smart attacking, the deterioration in throughput of the secondary User’s network is considerable and under proper selection of the attacker’s traffic parameters, it may tend toward zero. To combat the harmful impact of smart attacker, we derive a test rule based on the generalized likelihood ratio test to detect the legitimate from smart Illegitimate User. Finally, the accuracy of the obtained results are analyzed and verified by simulation results.