Defending Primary User Emulation Attack in Cognitive Radio Networks
Abstract
In cognitive radio network, an un-licensed user can use a
vacant channel in a spectrum band of licensed user.
Spectrum sensing is one of the critical function in
spectrum management. Cognitive radio is the promising
technology to solve the problem of spectrum scarcity in
which the secondary users can sense the spectrum and
utilize the licensed bands when the spectrum is not being
utilized by the primary user. Many malicious secondary
users can generate the signals similar to primary
transmitter to confuse the good secondary users into
thinking that a primary transmission is in progress. The
good secondary users then will vacate the spectrum
unnecessarily. The malicious users would then use the
evacuated white space for themselves. This attack by
malicious secondary users is called as primary user
emulation attack (PUEA) and it considerably increase the
spectrum access failure probability. In this paper we
analyze the probability density function (PDF) at both
good and malicious users. We also considered the cooperation
between the secondary users to detect primary
user emulation attack.
Full Text:
PDFReferences
Radio, Ph.D. thesis, KTH Royal Institute of Technology,
E. Hossain, D. Niyato, and Z. Han, "Dynamic Spectrum
Access in Cognitive Radio Networks", Cambridge
University Press, 2009.
S. Haykin, “Cognitive radio: Brain empowered wireless
communications,” IEEE Jl. on Sel. Areas in
Communication, vol. 23, no. 2, pp. 201–220, Feb. 2005.
I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty,
“NeXt generation/dynamic spectrum access/cognitive
radio wireless networks: A survey,” Computer Networks,
vol. 50, 2006, pp. 2127-2159.
T. Yucek and H. Arslan, “A survey of spectrum sensing
algorithms for cognitive radio applications,” IEEE
Communications Surveys & Tutorials, vol. 11, no. 1,
D. Cabric, S. Mishra, and R. Brodersen, “Implementation
issues in spectrum sensing for cognitive radios,” in
Signals, Systems and Computers, 2004. Conference
Record of the Thirty-Eighth Asilomar Conference on,
vol. 1. Ieee, 2005, pp. 772–776.
R. Chen, J. M. Park, and J. H. Reed, "Defense against
primary user emulation attacks in cognitive radio
networks, IEEE Jl. on Sel. Areas in Communications.:
Spl. Issue on Cognitive Radio Theory and Applications,
vol. 26, no. 1, pp. 25-37, Jan. 2008.
R. Chen, and M. J. Park ,"Ensuring Trustworthy
Spectrum Sensing in Cognitive Radio Networks",Proc.,
IEEE workshop on Networking Technol. For Software
Defined Radio Networks (SDR) 2006, Sep. 2006, pp.
-119.
Lianfen Huang, Liang Xie, Han Yu, Wumei Wang and
Yan Yao, "Anti-PUE Attack Based on Joint Position
Verification in Cognitive Radio Networks", International
Conference on Communications and Mobile Computing
(CMC), Vol.2, Shenzhen, China, April, 2010, pp.169-
O. Richard Afolabi, Kiseon Kim and Aftab Ahmad, "On
Secure Spectrum Sensing in Cognitive Radio Networks
Using Emitters Electromagnetic Signature", Proceedings
of 18th International Conference on Computer
Communications and Networks (ICCCN 2009), San
Francisco, CA, August, 2009, pp.1-5.
T. Clancy, and N. Goergen, "Security in Cognitive Radio
Networks: Threats and Mitigation", International
Conference on Cognitive Radio Oriented Wireless
Networks and communications, CrownCom 2008.
Y. Liu, P. Ning, H. Dai, "Authenticating Primary Users
Signals in Cognitive Radio 1209 networks via integrated
cryptographic and wireless link signatures", in: Proc. Of
IEEE Symposium on Security and Privacy, 2010,
pp. 286–301.
Z. Chen, T. Cooklev, C. Chen, and C. Pomalaza-Raez,
“Modeling primary user emulation attacks and defenses
in cognitive radio networks,” Proceedings, IEEE
International Performance Computing and
Communications Conference (IPCCC’2009), Dec.2009,
pp. 208–215.
R. W. Thomas, R. S. Komali, B. J. Borghetti, and P.
Mahonen "A Bayesian game analysis of emulation
attacks in dynamic spectrum access networks",
Proceedings, IEEE International Symposium of New
Frontiers in Dynamic Spectrum Access Networks
(DySPAN2010), Apr. 2010.
S. Anand, Z. Jin, and K. P. Subbalakshmi, "An Analytical
Model for Primary User Emulation Attacks in Cognitive
Radio Networks", Proceedings, IEEE Symposium of
New Frontiers in Dynamic Spectrum Access Networks
(DySPAN) 2008.
Z. Jin, S. Anand, and K. P. Subbalakshmi, "Mitigating
Primary User Emulation Attacks in Dynamic Spectrum
Access Networks using Hypothesis Testing" Mobile
Computing and communication IEEE transactions on
communications, vol. 60, No.4Sept 2012.
Caidan Zhao, Wumei Wang, Lianfen Huang and Yan
Yao, "Anti-PUE Attack Base on the Transmitter
Fingerprint Identification in Cognitive Radio", 5th
International Conference on Wireless Communications,
Networking and Mobile Computing (WiCom ‘09),
Beijing, China, September, 2009, pp.1-5.
Z. Jin, S. Anand, and K. P. Subbalakshmi, “Detecting
primary user emulation attacks in dynamic spectrum
access networks,” Proceedings, IEEE International
Conference on Communications (ICC’2009), Jun. 2009.
“IEEE Standards for information technology-
Telecommunications and information exchange between
systems- Wireless Regional Area Networks-Specific
Requirements- Part 22- Cognitive wireless RAN medium
access control (MAC) and physical layer (PHY)
specifications: Policies and procedures for operation in
the TV bands,” Jun. 2006.
T. S. Rappaport, "Wireless Communications: Principles
and Practice". Prentice Hall Inc., New Jersey, 1996.
D. Cabric, S. Mishra, R. Brodersen, Implementation
issues in spectrum sensing for cognitive radios, in: Proc.
of Asilomar Conf.on Signals, Systems, and Computers,
vol. 1, 2004, pp. 772–776.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology