Analysis of an approach to reducing drops of secondary user on primary user emulation attack

被引:0
|
作者
Sun, Hui [1 ,2 ]
Yang, Chuang [1 ]
Wang, Rui [1 ]
Ghauri, Sabir [2 ]
机构
[1] Civil Aviat Univ China, Coll Informat Engn & Automat, Tianjin 300300, Peoples R China
[2] Univ West England, Dept Engn Design & Math, Frenchay Campus, Bristol BS16 1QY, Avon, England
关键词
cognitive radio; PUEA; Markov chain; drop probability;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we propose a method for a Cognitive Radio Network (CRN) to reduce the drop probability of Secondary User (SU) due to the Primary User Emulation Attack (PUEA) of Malicious User (MU). Instead of abandoning the current channel, a novel method called a Pause Approach is used if Primary User (PU) or MU accesses the same channel. This method helps SU to find the attack behaviour of MU and increases the network throughput performance. Also, we analyse the channel states with a Continuous Time Markov Chain (CTMC). The simulation results validate the proposed method based on Matlab.
引用
收藏
页码:253 / 258
页数:6
相关论文
共 50 条
  • [1] A Primary User Emulation Attack Detection Scheme in Cognitive Radio Network with Mobile Secondary User
    Li, Yongcheng
    Han, Changdong
    Wang, Manxi
    Chen, Huifang
    Xie, Lei
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1076 - 1081
  • [2] Analysis of Primary User Emulation Attack with Motional Secondary Users in Cognitive Radio Networks
    Bao, Feijing
    Chen, Huifang
    Xie, Lei
    [J]. 2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2012, : 956 - 961
  • [3] A Simplified Counter Approach to Primary User Emulation Attacks from Secondary User Perspective
    Shrivastava, Shivanshu
    Rajesh, A.
    Bora, P. K.
    [J]. 2015 IEEE 26TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2015, : 2149 - 2154
  • [4] Performance Analysis of Primary User Emulation Attack in Cognitive Radio Networks
    Zhang, Chaorui
    Yu, Rong
    Zhang, Yan
    [J]. 2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 371 - 376
  • [5] Primary User Emulation Attack and their Mitigation Strategies: A Survey
    Naqvi, Bilal
    Rashid, Imran
    Riaz, Faisal
    Aslam, Baber
    [J]. 2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 95 - 100
  • [6] Countermeasures for Primary User Emulation Attack: A Comprehensive Review
    Mishra, Nikita
    Srivastava, Sumit
    Sharan, Shivendra Nath
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (01) : 827 - 858
  • [7] Countermeasures for Primary User Emulation Attack: A Comprehensive Review
    Nikita Mishra
    Sumit Srivastava
    Shivendra Nath Sharan
    [J]. Wireless Personal Communications, 2020, 115 : 827 - 858
  • [8] Online learning for primary user emulation attack strategy
    Sheng, Xiang
    Wang, Shaowei
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2020, 42 (04): : 12 - 17
  • [9] Detection of Primary User Emulation Attack in Sensor Networks
    Rana, Md Masud
    Shuvo, Md Mazed Rayhan
    [J]. 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 247 - 252
  • [10] An Overview of Primary User Emulation Attack in Cognitive Radio Networks
    Gupta, Ishu
    Sahu, O. P.
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 27 - 31