نتایج جستجو برای: primary user emulation attack

تعداد نتایج: 950393  

Journal: :CoRR 2017
Monireh Dabaghchian Amir Alipour-Fanid Kai Zeng Qingsi Wang Peter Auer

In a cognitive radio network, a secondary user learns the spectrum environment and dynamically accesses the channel where the primary user is inactive. At the same time, a primary user emulation (PUE) attacker can send falsified primary user signals and prevent the secondary user from utilizing the available channel. The best attacking strategies that an attacker can apply have not been well st...

2016
A. A. Sharifi

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

2014
Gudiguntla Venkata Prasanna Venkatesan

A scheduling problem that includes different hardware delays experienced by the secondary users (SUs) while switching to different frequency bands in a centralized cognitive radio network (CRN) is formulated. A polynomial-time suboptimal algorithm is proposed to reduce the scheduling problem. The impact of varying switching delay, number offer quencies, and number of SUs is evaluated. The simul...

Journal: :IET Communications 2012
Yi Tan Shamik Sengupta K. P. Subbalakshmi

Cognitive radio enabled dynamic spectrum access networks are designed to detect and opportunistically utilize the unused or under-utilized spectrum bands. However, due to the open paradigm of cognitive radio networks and lack of proactive security protocols, the dynamic spectrum access networks are vulnerable to various denial-ofservice (DoS) threats. In this paper, we propose a game theoretic ...

Journal: :JCM 2017
Yunchuan Wang Xiaorong Xu Weiwei Wu Jianrong Bao

Due to the fact that security and energy efficiency are investigated separately in the conventional Primary User Emulation Attack (PUEA) countermeasure strategy in Cooperative Spectrum Sensing (CSS) process, the tradeoff between security and energy efficiency is discussed in this paper. CSS can improve detection performance whereas energy consumption will dramatically boost up with the increasi...

Journal: :Future Internet 2023

The primary user emulation (PUE) attack is one of the strongest attacks in mobile cognitive radio networks (MCRN) because users (PU) and secondary (SU) are unable to communicate if a malicious (MU) present. In literature, some techniques used detect attack. However, those do not explore cooperative detection PUE using deep neural (DNN) MCRN network with experimental results on software-defined ...

Journal: :IET Communications 2012
Elena Romero Alexandre Mouradian Javier Blesa José Manuel Moya Álvaro Araujo

Along with Cognitive Radio Networks are been developed, to design optimistic security mechanisms is becoming a big challenge. This paper proposes a taxonomy of attacks on Cognitive Radio Networks. This will help researches in the area to better understand the security problems and design more optimistic countermeasures. A new simulation framework for security threats has been developed to check...

2014
Abhilasha Singh Anita Sharma Joseph Mitola

With the advancement in wireless technology, there is an increasing problem of spectrum scarcity. To resolve this issue, a technology called Cognitive Radio (CR), based on Joseph Mitola’s Software Defined Radio (SDR) was introduced, in which the secondary users can sense the spectrum and utilize the licensed bands when the spectrum is not being utilized by the primary user. Because of its wirel...

Journal: :Engineering reports 2023

The growing cognizance of spectrum scarcity has become a more significant concern in wireless radio communications. Due to the exponential growth data transmission intelligent sensor networks, energy detection promising solution for resolving shortages. Primary user emulation attack (PUEA) been identified as vector cognitive (CR) domain's physical layer. In comparison, CR is method increase eff...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید