Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks
In this paper, the authors investigate a new type of denial-of-service attack in dynamic spectrum access networks - Sybil-enabled attack. In this attack, the attacker not only launches the Primary User Emulation (PUE) attacks but also creates and infiltrates multiple Sybil identities to compromise the decision making process of the secondary network via Byzantine attacks. They implement this attack in their cognitive radio test-bed to show its feasibility and attack impact. They further analyze the optimal attack strategy from the perspective of the malicious attacker, i.e., the optimal allocation of Sybil interfaces for different attacks, to maximize the impact on the secondary network. The attack models are analyzed under two different scenarios: with and without a reputation system in the network fusion center.