4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications

Research Article

Security threats to signal classifiers using self-organizing maps

  • @INPROCEEDINGS{10.1109/CROWNCOM.2009.5189050,
        author={T. Charles  Clancy and Awais Khawar},
        title={Security threats to signal classifiers using self-organizing maps},
        proceedings={4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications},
        publisher={IEEE},
        proceedings_a={CROWNCOM},
        year={2009},
        month={8},
        keywords={},
        doi={10.1109/CROWNCOM.2009.5189050}
    }
    
  • T. Charles Clancy
    Awais Khawar
    Year: 2009
    Security threats to signal classifiers using self-organizing maps
    CROWNCOM
    IEEE
    DOI: 10.1109/CROWNCOM.2009.5189050
T. Charles Clancy1,*, Awais Khawar1,*
  • 1: Department of Electrical and Computer Engineering, University of Maryland, College Park.
*Contact email: tcc@umd.edu, awais@umd.edu

Abstract

Spectrum sensing is required for many cognitive radio applications, including spectral awareness, interoperability, and dynamic spectrum access. Previous work has demonstrated the ill effects of primary user emulation attacks, and pointed out specific vulnerabilities in spectrum sensing that uses feature-based classifiers. This paper looks specifically at the use of unsupervised learning in signal classifiers, and attacks against self-organizing maps. By temporarily manipulating their signals, attackers can cause other secondary users to permanently mis-classify them as primary users, giving them complete access to the spectrum. In the paper we develop the theory behind manipulating the decision regions in a neural network using self-organizing maps. We then demonstrate through simulation the ability for an attacker to formulate the necessary input signals to execute the attack. Lastly we provide recommendations to mitigate the efficacy of this type of attack.