An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks

被引:2
|
作者
Dong, Qi [1 ]
Chen, Yu [1 ]
Li, Xiaohua [1 ]
Zeng, Kai [2 ]
Zimmermann, Roger [3 ]
机构
[1] Binghamton Univ, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
[2] George Mason Univ, Volgenau Sch Engn, Fairfax, VA 22030 USA
[3] Natl Univ Singapore, Sch Comp, Singapore 117417, Singapore
关键词
Cognitive radio networks (CRNs); Primary user emulation (PUE) attacks; Detection; Hard-to-mimic features; TV;
D O I
10.1007/978-3-030-01701-9_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of advanced information technologies (IT), especially the wide spread of Internet of Things (IoTs) makes wireless spectrum a precious resource. Cognitive radio network (CRN) has been recognized as the key to achieve efficient utility of communication bands. Because of the great difficulty, high complexity and regulations in dynamic spectrum access (DSA), it is very challenging to protect CRNs from malicious attackers or selfish abusers. Primary user emulation (PUE) attacks is one type of easy-to-launch but hard-to-detect attacks in CRNs that malicious entities mimic PU signals in order to either occupy spectrum resource selfishly or conduct Denial of Service (DoS) attacks. Inspired by the physical features widely used as the fingerprint of variant electronic devices, an adaptive and realistic PUE attack detection technique is proposed in this paper. It leverages the PU transmission features that attackers are not able to mimic In this work, the transmission power is selected as one of the hard-to-mimic features due to the intrinsic discrepancy between PUs and attackers, while considering constraints in real implementations. Our experimental results verified the effectiveness and correctness of the proposed mechanism.
引用
收藏
页码:297 / 317
页数:21
相关论文
共 50 条
  • [41] Defense against primary user emulation attacks in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Reed, Jeffrey H.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) : 25 - 37
  • [42] Machine Learning Techniques Based on Primary User Emulation Detection in Mobile Cognitive Radio Networks
    Cadena Munoz, Ernesto
    Fernando Pedraza, Luis
    Augusto Hernandez, Cesar
    [J]. SENSORS, 2022, 22 (13)
  • [43] Securing Cognitive Radio Networks against Primary User Emulation Attacks
    Yu, Rong
    Zhang, Yan
    Liu, Yi
    Gjessing, Stein
    Guizani, Mohsen
    [J]. IEEE NETWORK, 2016, 30 (06): : 62 - 69
  • [44] Mitigating Smart Primary User Emulation Attackers in Cognitive Radio Networks
    Taggu, Amar
    Marchang, Ningrinla
    [J]. 2019 4TH TECHNOLOGY INNOVATION MANAGEMENT AND ENGINEERING SCIENCE INTERNATIONAL CONFERENCE (TIMES-ICON), 2019,
  • [45] A Mitigation Strategy for Primary User Emulation Attacks in Cognitive Radio Networks
    Harini, S. V. Vidhya
    Aruna, T.
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [46] Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks
    Chen, Zesheng
    Cooklev, Todor
    Chen, Chao
    Pomalaza-Raez, Carlos
    [J]. 2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009), 2009, : 208 - 215
  • [47] Securing Cognitive Radio Networks against Primary User Emulation Attacks
    Yu, Rong
    Zhang, Yan
    Liu, Yi
    Gjessing, Stein
    Guizani, Mohsen
    [J]. IEEE NETWORK, 2015, 29 (04): : 68 - 74
  • [48] Detection of dynamic location primary user emulation on mobile cognitive radio networks using USRP
    Ernesto Cadena Muñoz
    Enrique Rodriguez-Colina
    Luis Fernando Pedraza
    Ingrid Patricia Paez
    [J]. EURASIP Journal on Wireless Communications and Networking, 2020
  • [49] Joint cooperative spectrum sensing and primary user emulation attack detection in cognitive radio networks using fuzzy conditional entropy maximization
    Banerjee, Avik
    Maity, Santi P.
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (05):
  • [50] Authentication scheme to combat a primary user emulation attack against cognitive radio users
    Avila, Jayapalan
    Thenmozhi, Karrupasamy
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4242 - 4253