Defense against primary user emulation attacks in cognitive radio networks

被引:361
|
作者
Chen, Ruiliang [1 ]
Park, Jung-Min [1 ]
Reed, Jeffrey H. [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
基金
美国国家科学基金会;
关键词
cognitive radio; communication system security; primary user emulation attack; localization; spectrum sensing; wireless sensor network;
D O I
10.1109/JSAC.2008.080104
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in licensed spectrum bands while causing no interference to incumbent communications. Spectrum sensing is one of the essential mechanisms of CRs and its operational aspects are being investigated actively. However, the security aspects of spectrum sensing have garnered little attention. In this paper, we identify a threat to spectrum sensing, which we call the primary user emulation (PUE) attack. In this attack, an adversary's CR transmits signals whose characteristics emulate those of incumbent signals. The highly flexible, software-based air interface of CRs makes such an attack possible. Our investigation shows that a PUE attack can severely interfere with the spectrum sensing process and significantly reduce the channel resources available to legitimate unlicensed users. To counter this threat, we propose a transmitter verification scheme, called LocDef (localization-based defense), which verifies whether a given signal is that of an incumbent transmitter by estimating its location and observing its signal characteristics. To estimate the location of the signal transmitter, LocDef employs a non-interactive localization scheme. Our security analysis and simulation results suggest that LocDef is effective in identifying PUE attacks under certain conditions.
引用
收藏
页码:25 / 37
页数:13
相关论文
共 50 条
  • [41] Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks
    Alahmadi, Ahmed
    Song, Tianlong
    Li, Tongtong
    [J]. 2014 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2014, : 1165 - 1169
  • [42] A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Network
    Hao, Dong
    Sakurai, Kouichi
    [J]. 2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 495 - 502
  • [43] Optimal Cooperative Detection of Primary User Emulation Attacks in Distributed Cognitive Radio Network
    Dang, Manman
    Zhao, Zhifeng
    Zhang, Honggang
    [J]. 2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 368 - 373
  • [44] Self B - Adaptive Key Generation for Primary Users in Cognitive Radio Networks for Less Prone Primary User Emulation Attacks
    Lakshmibai, T.
    Parthasarathy, C.
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2018, 11 (01): : 1 - 12
  • [45] Multiple-Phase Energy Detection and Effective Capacity Based Resource Allocation Against Primary User Emulation Attacks in Cognitive Radio Networks
    Liu, Zongyi
    Zhang, Guomei
    Meng, Wei
    Ma, Xiaohui
    Li, Guobing
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (03) : 1313 - 1336
  • [46] A Routing Game in Cognitive Radio Networks against Routing-Toward-Primary-User Attacks
    Wang, Wenbo
    Kwasinski, Andres
    Han, Zhu
    [J]. 2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 2510 - 2515
  • [47] Throughput performance under primary user emulation attack in cognitive radio networks
    Yadav, Kuldeep
    Prasad, Binod
    Bhowmick, Abhijit
    Roy, Sanjay Dhar
    Kundu, Sumit
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
  • [48] Cooperative detection of primary user emulation attacks based on channel-tap power in mobile cognitive radio networks
    Chin, Wen-Long
    Trong Nghia Le
    Tseng, Chun-Lin
    Kao, Wei-Che
    Tsai, Chun-Shen
    Kao, Chun-Wei
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2014, 15 (04) : 263 - 274
  • [49] An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks
    Dong, Qi
    Chen, Yu
    Li, Xiaohua
    Zeng, Kai
    Zimmermann, Roger
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 297 - 317
  • [50] On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification
    Nam Tuan Nguyen
    Zheng, Rong
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (03) : 1432 - 1445