Defense Against Secondary User Emulation Attack in Cognitive Radio Networks Using MC- MC Method

ثبت نشده
چکیده

Cryptography is the process of transforming an intelligible message into one that's unintelligible and then re transforming that message back to its original form. This transformation along cryptography is done by using an algorithm. In this we propose a reliable Advanced Encryption Standard algorithm for the process of encryption and decryption. The AES (Advanced Encryption Standard) algorithm supports up to 256 bits which increases the number of rounds along encryption and decryption. The security level of the plaintext increases with respect to the number of rounds. These rounds are generated by using Markov Chain Monte Carlo method. Then the Affine transformation is used for the purpose of matrix generation this is used as a prior to cipher and inverse cipher. We propose a public key cryptography based primary user identification mechanism that prevents malicious secondary users from masquerading as primary users. We show that the proposed identification mechanism and the associated key management are computationally good. We also discuss some advantages and limitations of the proposed identification mechanism. Due to these functions we can reduce the primary user emulation attack with high accuracy. Keywords— AES Algorithm, MC-MC Method, Cognitive radios, Affine Transformation, Secondary User Emulation Attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

A Study on Primary User Emulation Attack in Cognitive Radio Networks

CR is an emerging technology in wireless communications. Based on their operating environment CRNs can dynamically reconfigure their characteristcics. So that many security issues has been an alarming fact to CRNs. One such attack is the Primary User Emulation Attack (PUEA). There are many techniques available to mitigate this attack. This paper presents a study about various defense techniques...

متن کامل

A Survey on Primary User Emulation Detection Mechanisms in Cognitive Radio Networks

Cognitive radio is one of the main technologies in the wireless communications. The cognitive radio networks are composed of cognitive, spectrum-agile devices which is able to modify their network configurations according to the spectral environment. This cognitive radio provides the chance reusing portions of the spectrum temporarily for the secondary users. But security is a main issue in the...

متن کامل

A Survey of Various Defense Techniques to Detect Primary User Emulation Attacks

With the advancement in wireless technology, there is an increasing problem of spectrum scarcity. To resolve this issue, a technology called Cognitive Radio (CR), based on Joseph Mitola’s Software Defined Radio (SDR) was introduced, in which the secondary users can sense the spectrum and utilize the licensed bands when the spectrum is not being utilized by the primary user. Because of its wirel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015