Mitigating selfish primary user emulation attacks in multi-channel cognitive radio networks: A surveillance game
نویسندگان
چکیده
Primary User Emulation Attack (PUEA), in which attackers emulate primary user signals causing restriction of secondary access on the attacked channels, is a serious security problem in Cognitive Radio Networks (CRNs). An user performing a PUEA for selfishly occupying more channels is called a selfish PUEA attacker. Network managers could adopt a surveillance process on disallowed channels for identifying illegal channel occupation of selfish PUEA attackers and hence mitigating selfish PUEA. Determining surveillance strategies, particularly in multichannel context, is necessary for ensuring network operation fairness. In this paper, we formulate a game, called multi-channel surveillance game, between the selfish attack and the surveillance process in multi-channel CRNs. The sequence-form representation method is adopted to determine the Nash Equilibrium (NE) of the game. We show that performing the obtained NE surveillance strategy significantly mitigates selfish PUEA.
منابع مشابه
Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks
Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...
متن کاملDetecting Selfish Secondary User for Improving the Performance of Cognitive Radio Network by Using Sad Method
Cognitive radio (CR) is an opportunistic communication technology which is designed to utilize the maximum available licensed bandwidth for unlicensed users. In CR, when the spectrum is not used by primary user, it is accessed by the unlicensed users/secondary users. . In CRN a selfish SU (secondary user) broadcasts faked channel allocation information to other neighboring SUs in order to occup...
متن کاملEAI Endorsed Transactions
Cognitive radio networks (CRNs) are susceptible to primary user emulation (PUE) attacks. Conventional PUE attack detection approaches consider television broadcasting as the primary user. In this work, however, we study a special kind of PUE attack named wireless microphone user emulation (WMUE) attack. Existing work on WMUE attack detection deals with single channel senario. Although multi-cha...
متن کاملA Survey on Primary User Emulation Detection Mechanisms in Cognitive Radio Networks
Cognitive radio is one of the main technologies in the wireless communications. The cognitive radio networks are composed of cognitive, spectrum-agile devices which is able to modify their network configurations according to the spectral environment. This cognitive radio provides the chance reusing portions of the spectrum temporarily for the secondary users. But security is a main issue in the...
متن کاملImprovement of Spectrum Utilisation in Cognitive Radio Networks by Detection of Selfish Attacks
The traditional spectrum management techniques allow most of the spectrum to be used by licensed users exclusively. Spectrum sharing mechanism in Cognitive Radio Networks allows spectrum access to secondary user in addition to the primary licensed user. The Secondary Users, in order to compete for the spectrum, turn malicious and try to occupy all or a part of the available channel leading to S...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1604.03324 شماره
صفحات -
تاریخ انتشار 2016