Defending Primary User Emulation Attack in Cognitive Radio Networks

Rajesh D. Kadu, Dr. Pravin P. Karde

Abstract


In cognitive radio network, an un-licensed user can use a
vacant channel in a spectrum band of licensed user.
Spectrum sensing is one of the critical function in
spectrum management. Cognitive radio is the promising
technology to solve the problem of spectrum scarcity in
which the secondary users can sense the spectrum and
utilize the licensed bands when the spectrum is not being
utilized by the primary user. Many malicious secondary
users can generate the signals similar to primary
transmitter to confuse the good secondary users into
thinking that a primary transmission is in progress. The
good secondary users then will vacate the spectrum
unnecessarily. The malicious users would then use the
evacuated white space for themselves. This attack by
malicious secondary users is called as primary user
emulation attack (PUEA) and it considerably increase the
spectrum access failure probability. In this paper we
analyze the probability density function (PDF) at both
good and malicious users. We also considered the cooperation
between the secondary users to detect primary
user emulation attack.


Full Text:

PDF

References


Radio, Ph.D. thesis, KTH Royal Institute of Technology,

E. Hossain, D. Niyato, and Z. Han, "Dynamic Spectrum

Access in Cognitive Radio Networks", Cambridge

University Press, 2009.

S. Haykin, “Cognitive radio: Brain empowered wireless

communications,” IEEE Jl. on Sel. Areas in

Communication, vol. 23, no. 2, pp. 201–220, Feb. 2005.

I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty,

“NeXt generation/dynamic spectrum access/cognitive

radio wireless networks: A survey,” Computer Networks,

vol. 50, 2006, pp. 2127-2159.

T. Yucek and H. Arslan, “A survey of spectrum sensing

algorithms for cognitive radio applications,” IEEE

Communications Surveys & Tutorials, vol. 11, no. 1,

D. Cabric, S. Mishra, and R. Brodersen, “Implementation

issues in spectrum sensing for cognitive radios,” in

Signals, Systems and Computers, 2004. Conference

Record of the Thirty-Eighth Asilomar Conference on,

vol. 1. Ieee, 2005, pp. 772–776.

R. Chen, J. M. Park, and J. H. Reed, "Defense against

primary user emulation attacks in cognitive radio

networks, IEEE Jl. on Sel. Areas in Communications.:

Spl. Issue on Cognitive Radio Theory and Applications,

vol. 26, no. 1, pp. 25-37, Jan. 2008.

R. Chen, and M. J. Park ,"Ensuring Trustworthy

Spectrum Sensing in Cognitive Radio Networks",Proc.,

IEEE workshop on Networking Technol. For Software

Defined Radio Networks (SDR) 2006, Sep. 2006, pp.

-119.

Lianfen Huang, Liang Xie, Han Yu, Wumei Wang and

Yan Yao, "Anti-PUE Attack Based on Joint Position

Verification in Cognitive Radio Networks", International

Conference on Communications and Mobile Computing

(CMC), Vol.2, Shenzhen, China, April, 2010, pp.169-

O. Richard Afolabi, Kiseon Kim and Aftab Ahmad, "On

Secure Spectrum Sensing in Cognitive Radio Networks

Using Emitters Electromagnetic Signature", Proceedings

of 18th International Conference on Computer

Communications and Networks (ICCCN 2009), San

Francisco, CA, August, 2009, pp.1-5.

T. Clancy, and N. Goergen, "Security in Cognitive Radio

Networks: Threats and Mitigation", International

Conference on Cognitive Radio Oriented Wireless

Networks and communications, CrownCom 2008.

Y. Liu, P. Ning, H. Dai, "Authenticating Primary Users

Signals in Cognitive Radio 1209 networks via integrated

cryptographic and wireless link signatures", in: Proc. Of

IEEE Symposium on Security and Privacy, 2010,

pp. 286–301.

Z. Chen, T. Cooklev, C. Chen, and C. Pomalaza-Raez,

“Modeling primary user emulation attacks and defenses

in cognitive radio networks,” Proceedings, IEEE

International Performance Computing and

Communications Conference (IPCCC’2009), Dec.2009,

pp. 208–215.

R. W. Thomas, R. S. Komali, B. J. Borghetti, and P.

Mahonen "A Bayesian game analysis of emulation

attacks in dynamic spectrum access networks",

Proceedings, IEEE International Symposium of New

Frontiers in Dynamic Spectrum Access Networks

(DySPAN2010), Apr. 2010.

S. Anand, Z. Jin, and K. P. Subbalakshmi, "An Analytical

Model for Primary User Emulation Attacks in Cognitive

Radio Networks", Proceedings, IEEE Symposium of

New Frontiers in Dynamic Spectrum Access Networks

(DySPAN) 2008.

Z. Jin, S. Anand, and K. P. Subbalakshmi, "Mitigating

Primary User Emulation Attacks in Dynamic Spectrum

Access Networks using Hypothesis Testing" Mobile

Computing and communication IEEE transactions on

communications, vol. 60, No.4Sept 2012.

Caidan Zhao, Wumei Wang, Lianfen Huang and Yan

Yao, "Anti-PUE Attack Base on the Transmitter

Fingerprint Identification in Cognitive Radio", 5th

International Conference on Wireless Communications,

Networking and Mobile Computing (WiCom ‘09),

Beijing, China, September, 2009, pp.1-5.

Z. Jin, S. Anand, and K. P. Subbalakshmi, “Detecting

primary user emulation attacks in dynamic spectrum

access networks,” Proceedings, IEEE International

Conference on Communications (ICC’2009), Jun. 2009.

“IEEE Standards for information technology-

Telecommunications and information exchange between

systems- Wireless Regional Area Networks-Specific

Requirements- Part 22- Cognitive wireless RAN medium

access control (MAC) and physical layer (PHY)

specifications: Policies and procedures for operation in

the TV bands,” Jun. 2006.

T. S. Rappaport, "Wireless Communications: Principles

and Practice". Prentice Hall Inc., New Jersey, 1996.

D. Cabric, S. Mishra, R. Brodersen, Implementation

issues in spectrum sensing for cognitive radios, in: Proc.

of Asilomar Conf.on Signals, Systems, and Computers,

vol. 1, 2004, pp. 772–776.


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology