Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Authors

  • A.A. Sharifi PhD. Student, Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran
  • M. Sharifi MSc. Student, Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran
  • M.J. Musevi Niya Associate Professor, Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran
Abstract:

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR users to prevent them from accessing the idle frequency bands. The present study investigates a new CSS scheme in the presence of a smart PUEA, which is aware of idle frequency channels and transmits its fake signal in a way that CR users are not easily able to discriminate between the received signal from the PU and PUEA. The idea is based on the Bayes risk criterion. More precisely, the sensing results of the CR users are summed up in the Fusion Center (FC) and compared with the optimum threshold that minimizes the Bayes risk. We also discuss practical limitation issue that need to be considered when applying the proposed method. Simulation results are provided to indicate the superiority of the proposed method against PUEA compared with conventional method.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

secure collaborative spectrum sensing in the presence of primary user emulation attack in cognitive radio networks

collaborative spectrum sensing (css) is an effective approach to improve the detection performance in cognitive radio (cr) networks. inherent characteristics of the cr have imposed some additional security threats to the networks. one of the common threats is primary user emulation attack (puea). in puea, some malicious users try to imitate primary signal characteristics and defraud the cr user...

full text

Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

full text

Investigation of Primary User Emulation Attack in Cognitive Radio Networks

Cognitive radio technology (CR), as a key enabling functionality for the next generation (xG) mobile communication, can remarkably improve the performance of a wireless communication system by being aware of the changes of its surrounding and dynamically modifying its operating parameters to adapt such changes. Recently, the security issues of cognitive radio (CR) networks have drawn more and m...

full text

Primary User Emulation Attack in Cognitive Radio Networks: A Survey

Cognitive radio is a promising technology aiming to solve the spectrum scarcity problem by allocating the spectrum dynamically to unlicensed users. It uses the free spectrum bands which are not being used by the licensed users without causing interference to the incumbent transmission. So, spectrum sensing is the essential mechanism on which the entire communication depends. If the spectrum sen...

full text

Primary User Emulation Attack Game in Cognitive Radio Networks: Queuing Aware Dogfight in Spectrum

Primary user emulation attack, which targets distabilizing the queuing dynamics of cognitive radio networks, is studied using game theoretic argument. The attack and defense are modeled as a stochastic game. The Nash equilibrium of the game is studied. In particular, the Lyapunov drift is considered as the reward in each round. Explicit expressions of the Nash equilibrium strategies are obtained.

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 47  issue 2

pages  1- 8

publication date 2015-11-22

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023