PATTERN BASED ANOMALOUS USER DETECTION IN COGNITIVE RADIO NETWORKS

被引:0
|
作者
Rajasegarar, Sutharshan [1 ]
Leckie, Christopher [1 ]
Palaniswami, Marimuthu [2 ]
机构
[1] Univ Melbourne, Natl ICT Australia Victoria, Dept Comp & Informat Syst, Melbourne, Vic, Australia
[2] Univ Melbourne, Dept Elect & Elect Engn, Melbourne, Vic, Australia
基金
澳大利亚研究理事会;
关键词
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Cognitive radio (CR) provides the ability to sense the range of frequencies (spectrum) that are not utilized by the incumbent user (primary user) and to opportunistically use the unoccupied spectrum in a heterogeneous environment. This can use a collaborative spectrum sensing approach to detect the spectrum holes. However, this nature of the collaborative mechanism is vulnerable to security attacks and faulty observations communicated by the opportunistic users (secondary users). Detecting such malicious users in CR networks is challenging as the pattern of malicious behavior is unknown apriori. In this paper we present an unsupervised approach to detect those malicious users, utilizing the pattern of their historic behavior. Our evaluation reveals that the proposed scheme effectively detects the malicious data in the system and provides a robust framework for CR to operate in this environment.
引用
收藏
页码:5605 / 5609
页数:5
相关论文
共 50 条
  • [31] Distributed Detection in Cognitive Radio Networks with Unknown Primary User's Traffic
    Shams, Sulthana
    Santhoshkumar, M.
    Muttath, Dony J.
    Premkumar, K.
    [J]. PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 823 - 827
  • [32] Signal Processing-based Model for Primary User Emulation Attacks Detection in Cognitive Radio Networks
    Lafia D.
    Sanni M.L.
    Adetona R.A.
    Akinyemi B.O.
    Aderounmu G.A.
    [J]. Journal of Computing and Information Technology, 2021, 29 (02) : 77 - 88
  • [33] Joint compressed spectrum detection and primary user localization in cognitive radio networks
    Wireless Communications Key Lab. of Jiangsu Province, Nanjing University of Posts and Telecommunications, Nanjing, China
    [J]. J. Comput. Inf. Syst., 19 (7087-7094):
  • [34] A survey on security attacks and countermeasures with primary user detection in cognitive radio networks
    Marinho J.
    Granjal J.
    Monteiro E.
    [J]. Eurasip Journal on Information Security, 2015, 2015 (01)
  • [35] An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks
    Dong, Qi
    Chen, Yu
    Li, Xiaohua
    Zeng, Kai
    Zimmermann, Roger
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 297 - 317
  • [36] Range-Based Primary user Localization in Cognitive Radio Networks
    Singh, Awadhesh Kumar
    Singh, A. K.
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 : 199 - 206
  • [37] Reinforcement Learning based Secondary User Transmissions in Cognitive Radio Networks
    Arunthavanathan, Senthuran
    Kandeepan, Sithamparanathan
    Evans, Robin J.
    [J]. 2013 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2013, : 374 - 379
  • [38] User social activity-based routing for cognitive radio networks
    Junling Lu
    Zhipeng Cai
    Xiaoming Wang
    Lichen Zhang
    Peng Li
    Zaobo He
    [J]. Personal and Ubiquitous Computing, 2018, 22 : 471 - 487
  • [39] Primary User Activity Based Channel Allocation in Cognitive Radio Networks
    Wang, Wei
    Lv, Tiejun
    Wang, Taotao
    Yu, Xuefen
    [J]. 2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [40] User social activity-based routing for cognitive radio networks
    Lu, Junling
    Cai, Zhipeng
    Wang, Xiaoming
    Zhang, Lichen
    Li, Peng
    He, Zaobo
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (03) : 471 - 487