primary user emulation attack
Recently Published Documents


TOTAL DOCUMENTS

97
(FIVE YEARS 28)

H-INDEX

10
(FIVE YEARS 2)

2021 ◽  
Vol 36 (2) ◽  
pp. 129-134
Author(s):  
Mahmoud A. Ammar ◽  
Salahedin A. Rehan

Cognitive Radio (CR) can be defined as a technology that allows users to change the transmission parameters as required to increase the spectrum efficiency. Because of this mechanism, some threats emerge. Two major threats are found in CR. The first is the Primary User Emulation Attack (PUEA), where the attacker is able to transmit at a forbidden time slot effectively, emulating the signals of the primary user. This makes all the system users believe that the spectrum is occupied by a good primary user.  The second threat is known as the spectrum sensing data falsification attack (SSDF). In this case, the attackers send false observation information, intentionally or unintentionally, to the fusion center (FC), causing it to make the wrong decision. In this study, the scheme presented  was based on a users' reputation for secure spectrum access in cognitive radio networks. Each Secondary User (SU) performs local sensing and then forwards the sensing results to the main fusion center FC. The FC makes the final decision about the presence of the primary user based on the proposed approach. The schemes substantially reduce the effect of cognitive users with low reputation values while improving the impact of cognitive users with the high reputation values on the final decision. It has been verified that the proposed approach can improve the sensing performance under the impact of a different number of reliable and unreliable users in a CR network. Results based on simulation show that the proposed scheme outperforms the traditional majority scheme despite a high number of malicious users.


2021 ◽  
Vol 36 (1) ◽  
pp. 73-79
Author(s):  
Mahmoud Ali Ammar

In Cognitive Radio Networks (CRN), the main aim is to allow the secondary users (SUs) to identify the empty bands and use them to transmit or receive data opportunistically. Primary users (PUs) have the priority to use a channel, while the secondary users must vacant this channel once a primary user requests it. An attack known in cognitive radio networks as a Primary User Emulation Attack (PUEA) aims to prevent the SU from using the empty bands. In this paper, an analytical and experimental approach is presented to mitigate the PUEA. This approach is based on obtaining the Probability Density Functions (PDFs) of the received powers at the secondary users from malicious nodes and also from the primary transmitter in the cognitive network. Then, these obtained PDFs are used in Neyman-Pearson composite hypothesis test to measure the performance metrics (probability of false alarm and miss detection in the network). The results proved that the performance metrics were greatly influenced by the network area, where the secondary user is located, and the threshold value λ used in the decision rule. Also, there are boundaries for the λ choices that cannot be overtaken.


2020 ◽  
Vol 88 ◽  
pp. 106849
Author(s):  
Vijayakumar Ponnusamy ◽  
Kottilingam Kottursamy ◽  
T. Karthick ◽  
M.B. Mukeshkrishnan ◽  
D. Malathi ◽  
...  

Author(s):  
N. Armi ◽  
W. Gharibi ◽  
W.Z. Khan

Security threat is a crucial issue in cognitive radio network (CRN). These threats come from physical layer, data link layer, network layer, transport layer, and application layer. Hence, security system to all layers in CRN has a responsibility to protect the communication between among Secondary User (SU) or to maintain valid detection to the presence of Primary User (PU) signals. Primary User Emulation Attack (PUEA) is a threat on physical layer where malicious user emulates PU signal. This paper studies the effect of exclusive region of PUEA in CRN. We take two setting of exclusive distances, 30m and 50m, where this radius of area is free of malicious users. Probability of false alarm (Pf) and miss detection (Pm) are used to evaluate the performances. The result shows that increasing distance of exclusive region may decrease Pf and Pm.


2020 ◽  
Vol 115 (1) ◽  
pp. 827-858
Author(s):  
Nikita Mishra ◽  
Sumit Srivastava ◽  
Shivendra Nath Sharan

Sign in / Sign up

Export Citation Format

Share Document