Efficient Transmission Strategy for Cognitive Radio Systems Under Primary User Emulation Attack

被引:21
|
作者
Karimi, Mohammad [1 ]
Sadough, Seyed Mohammad Sajad [1 ]
机构
[1] Shahid Beheshti Univ, Dept Elect Engn, Cognit Telecommun Res Grp, Tehran 1983969411, Iran
来源
IEEE SYSTEMS JOURNAL | 2018年 / 12卷 / 04期
关键词
Cognitive radio (CR); energy detection; primary user emulation attack (PUEA); spectrum access function; ENERGY DETECTION; SPECTRUM ACCESS; PHYSICAL LAYER; NETWORKS; DEFENSE; POWER;
D O I
10.1109/JSYST.2017.2747594
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In energy detection-based cognitive radio (CR), the conventional transmission strategy consists in comparing the measured energy to a predefined threshold. Then, while the measured energy is less than the threshold, the secondary user (SU) is allowed to transmit over primary user's (PU) band and otherwise, no secondary transmission occurs. Here, we show that the aforementioned conventional transmission strategy is suboptimal in terms of secondary achievable data rates and probability of detection. As an alternative, we propose a different approach to CR signaling based on a spectrum access function that defines an efficient framework for the SU to access the primary spectrum. In particular, we consider the scenario of PU emulation attack (PUEA) in CR where some malicious users mimic the PU's signal, leading to a reduction of the secondary achievable data rates. By considering PUEA into account, we derive the optimal spectrum access function by maximizing the secondary transmission data rate under miss detection and false alarm constraints, which insures that the CR user does not degrade the performance of the PU. Comparative numerical results illustrate the superiority and the adequacy of the proposed transmission scheme under PUEA in terms of higher secondary achievable data rate and higher probability of detection.
引用
收藏
页码:3767 / 3774
页数:8
相关论文
共 50 条
  • [1] On Optimal Spectrum Sensing Strategy for Cognitive Radio Systems under Primary User Emulation Attack
    Saber, Mohammad Javad
    Sadough, Seyed Mohammad Sajad
    [J]. 2014 7TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2014, : 1113 - 1116
  • [2] Throughput performance under primary user emulation attack in cognitive radio networks
    Yadav, Kuldeep
    Prasad, Binod
    Bhowmick, Abhijit
    Roy, Sanjay Dhar
    Kundu, Sumit
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
  • [3] Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks
    Seyed Abdolazim Vaziri Yazdi
    Mahdieh Ghazvini
    [J]. Wireless Personal Communications, 2019, 108 : 2261 - 2277
  • [4] An Overview of Primary User Emulation Attack in Cognitive Radio Networks
    Gupta, Ishu
    Sahu, O. P.
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 27 - 31
  • [5] Detection of Primary User Emulation Attack in Cognitive Radio Environment
    Saifuddin, Khaled Mohammed
    Reza, Kazi Fahid
    Fahim, Masud An Nur Islam
    Alam, Sk Shariful
    [J]. 2017 6TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS AND VISION & 2017 7TH INTERNATIONAL SYMPOSIUM IN COMPUTATIONAL MEDICAL AND HEALTH TECHNOLOGY (ICIEV-ISCMHT), 2017,
  • [6] Detecting Primary User Emulation Attack in Cognitive Radio Networks
    Pu, Di
    Shi, Yuan
    Ilyashenko, Andrei V.
    Wyglinski, Alexander M.
    [J]. 2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [7] Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks
    Yazdi, Seyed Abdolazim Vaziri
    Ghazvini, Mahdieh
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (04) : 2261 - 2277
  • [8] Collaborative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks
    Sharifi, Abbas Ali
    Sharifi, Morteza
    Niya, Mir Javad Musevi
    [J]. IETE JOURNAL OF RESEARCH, 2016, 62 (02) : 205 - 211
  • [9] Authentication Based Primary User Emulation Attack Mitigation in Cognitive Radio
    Avila, J.
    Prem, S.
    Rajapradeepa, S.
    Thenmozhi, K.
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [10] Performance Analysis of Primary User Emulation Attack in Cognitive Radio Networks
    Zhang, Chaorui
    Yu, Rong
    Zhang, Yan
    [J]. 2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 371 - 376