Survey of Identity-Based Attacks Detection Techniques in Wireless Networks Using Received Signal Strength

Author(s):  
Ahmad Raza Cheema ◽  
Malek Alsmadi ◽  
Salama Ikki

The problem of spectrum scarcity in wireless communication can be reduced by Cognitive Radio (CR) technology in which the spectrum holes or unused spectrum can be allocated to the secondary or unlicensed users. But the major problem in CR is providing security. Various security issues are present at different layer. One of the major wide spread security issue in the cognitive radio is the Primary user emulsion attack in which the malicious secondary user emulated as primary user to get spectrum resources for a long time. One of way to avoided PUEA is, by obtaining the location of malicious user. The conventional location detection techniques such as time of arrival, time difference of arrival and direction of arrival, will give better performance when the user is stationary. Even though Received Signal Strength Indicator along RF fingerprint technique gives the better location of mobile user but it requires the more hardware. Hence the cost is high. In this paper, the author proposed an algorithm to locate the attacker using EKF and UKF with RSSI. In this algorithm, the initial position of user can be obtained by Received Signal Strength Indicator. This initial position integrated to EKF and UKF to track the location of primary user, which is a mobile user so that PUE Attack can be identified and avoided. The author also compares the performance of Extended Kalman Filter with Unscented Kalman Filter by Matlab software.


Sign in / Sign up

Export Citation Format

Share Document