A channel hopping based defense method against primary user emulation attack in cognitive radio networks

被引:11
|
作者
Ahmadfard, Arash [1 ]
Jamshidi, Ali [1 ]
机构
[1] Shiraz Univ, Sch Elect & Comp Engn, Shiraz, Iran
关键词
Cognitive radio networks; Security; Primary user emulation attack; Zero-sum game; Channel hopping; SURVEILLANCE;
D O I
10.1016/j.comcom.2019.09.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cognitive radio is a promising technology for the problem of spectrum scarcity. Security issues of this network have attracted great attention in the recent years. Primary user emulation attack is a security threat which can significantly degrade the performance of cognitive networks. In this attack, an attacker emulates the signal of the primary users to prevent the cognitive network from utilization of the channels. In this paper, we study a channel hopping based defense method. In particular, a cognitive network is considered that is under attack by a single attacker. The attacker's goal is to degrade the total throughput of the cognitive network as much as possible. However, the each cognitive user wants to maximize its own throughput. The interactions among the cognitive users and the attacker are modeled by a multi-player zero-sum game and an algorithm is proposed for obtaining the Nash equilibrium of the game. Simulation results are presented to clarify the performance of the algorithm.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] Uncoordinated frequency hopping scheme for defense against primary user emulation attack in cognitive radio networks
    Mahmoudi, Mohsen
    Faez, Karim
    Ghasemi, Abdorasoul
    [J]. COMPUTER NETWORKS, 2019, 163
  • [2] Cooperative Primary User Emulation Attack and Defense in Cognitive Radio Networks
    Yang, Tianhong
    Chen, Huifang
    Xie, Lei
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [3] Defense against primary user emulation attacks in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Reed, Jeffrey H.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) : 25 - 37
  • [4] Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks
    Nguyen-Thanh, Nhan
    Ciblat, Philippe
    Pham, Anh T.
    Nguyen, Van-Tam
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (09) : 4981 - 4993
  • [5] An Overview of Primary User Emulation Attack in Cognitive Radio Networks
    Gupta, Ishu
    Sahu, O. P.
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 27 - 31
  • [6] Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks
    Seyed Abdolazim Vaziri Yazdi
    Mahdieh Ghazvini
    [J]. Wireless Personal Communications, 2019, 108 : 2261 - 2277
  • [7] Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks
    Yazdi, Seyed Abdolazim Vaziri
    Ghazvini, Mahdieh
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (04) : 2261 - 2277
  • [8] Detecting Primary User Emulation Attack in Cognitive Radio Networks
    Pu, Di
    Shi, Yuan
    Ilyashenko, Andrei V.
    Wyglinski, Alexander M.
    [J]. 2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [9] Performance Analysis of Primary User Emulation Attack in Cognitive Radio Networks
    Zhang, Chaorui
    Yu, Rong
    Zhang, Yan
    [J]. 2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 371 - 376
  • [10] Defense against primary user emulation attackers based on adaptive Bayesian learning automata in cognitive radio networks
    Mahmoudi, Mohsen
    Faez, Karim
    Ghasemi, Abdorasoul
    [J]. AD HOC NETWORKS, 2020, 102