An Optimized Scheme to Resist Primary User Emulation Attacks

被引:0
|
作者
Xiao, Jie [1 ]
Chen, Yuebin [1 ]
Xing, Chuanxi [1 ]
Yang, Jiangfeng [1 ]
Yang, Zhenling [1 ]
机构
[1] Yunnan Minzu Univ, Sch Elect & Informat Technol, Kunming, Yunnan, Peoples R China
关键词
cognitive radio; cooperative spectrum sensing; primary user emulation attack; energy detection; optimal weight coefficient; COGNITIVE RADIO;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of cognitive radio (CR) network security has become an important problem in cognitive radio technology. One of the most common attacks is primary user emulation attacks (PUEA), where some malicious users simulate CR users to prevent them from accessing the vacant frequency. Here, a cooperative spectrum sensing (CSS) method with optimal weight coefficient based on improved energy detection is proposed. In the proposed scheme, we combine sensing information using the optimal weight coefficient at a fusion center and apply the improved energy detection, which effectively prevent the PUEA. Simulation results show that the method outperforms the traditional energy detection with optimal weight coefficient in detection performance.
引用
收藏
页码:176 / 180
页数:5
相关论文
共 50 条
  • [31] Improved cooperative spectrum sensing under primary user emulation attacks in cognitive radio networks
    Orumwense, Efe
    Oyerinde, Olutayo
    Mneney, Stanley
    [J]. JOURNAL OF ENGINEERING RESEARCH, 2017, 5 (03): : 73 - 90
  • [32] Online Learning-Based Optimal Primary User Emulation Attacks in Cognitive Radio Networks
    Dabaghchian, Monireh
    Alipour-Fanid, Amir
    Zeng, Kai
    Wang, Qingsi
    [J]. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 100 - 108
  • [33] Mitigating Primary User Emulation attacks in Cognitive Radio networks using advanced encryption standard
    Jiang, Huichao
    Jing, Xiao Jun
    Sun, Songlin
    Huang, Hai
    Li, Yan
    Wang, Xiaohan
    Cheng, Dongmei
    [J]. SIGNAL AND INFORMATION PROCESSING, NETWORKING AND COMPUTERS, 2016, : 185 - 193
  • [34] On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification
    Nam Tuan Nguyen
    Zheng, Rong
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (03) : 1432 - 1445
  • [35] Mitigating Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard
    Alahmadi, Ahmed
    Abdelhakim, Mai
    Ren, Jian
    Li, Tongtong
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 3229 - 3234
  • [36] Optimal soft combination for multiple antenna energy detection under primary user emulation attacks
    Saber, M. J.
    Sadough, S. M. S.
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (09) : 1181 - 1188
  • [37] Authentication scheme to combat a primary user emulation attack against cognitive radio users
    Avila, Jayapalan
    Thenmozhi, Karrupasamy
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4242 - 4253
  • [38] Detecting primary user emulation attacks based on PDF-BP algorithm in cognitive radio networks
    Chen, Yueyun
    Yang, Liuqing
    Ma, Shuaishuai
    Yuan, Xiaopan
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 660 - 666
  • [39] Signal Processing-based Model for Primary User Emulation Attacks Detection in Cognitive Radio Networks
    Lafia, Diafale
    Sanni, Mistura Laide
    Adetona, Rasheed Ayodeji
    Akinyemi, Bodunde Odunola
    Aderounmu, Ganiyu Adesola
    [J]. Journal of Computing and Information Technology, 2021, 29 (02) : 77 - 88
  • [40] Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding
    Xie, Xiongwei
    Wang, Weichao
    [J]. 4TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2013) AND THE 3RD INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH), 2013, 21 : 430 - 435