Mitigation of primary user emulation attack using a new energy detection method in cognitive radio networks

Shriraghavan Madbushi , M. S. S. Rukmini

Journal of Central South University ›› 2022, Vol. 29 ›› Issue (5) : 1510 -1520.

PDF
Journal of Central South University ›› 2022, Vol. 29 ›› Issue (5) : 1510 -1520. DOI: 10.1007/s11771-022-5016-7
Article

Mitigation of primary user emulation attack using a new energy detection method in cognitive radio networks

Author information +
History +
PDF

Abstract

A most promising solution to the expansion of spectrum efficiency is cognitive radio (CR) and this expansion is achieved by permitting the licensed frequency bands to be accessed by unlicensed secondary users (SUs) with a lack of interference with licensed primary users (PUs). This utilization of CR networks in the spectrum sensing causes vulnerable attacks like primary user emulation (PUE) attack and here PUs play the role of malicious user and do not permit other users to utilize PUs channel even in their unavailability. On the basis of the traditional single-threshold energy detection algorithm, a novel modified double-threshold energy detector is formulated in the CR network and the detection probability, miss detection probability, probability of false alarm, and their inter-relationship are analyzed. This paper develops a modified double threshold energy detection cooperative spectrum sensing technique to alleviate the PUE attack. Finally, performance-based evaluation is carried out between the proposed and the existing energy detection spectrum sensing method that had no consideration on PUE attack. The resultant of the simulation in MATLAB has revealed that the proposed model has significantly mitigated PUE attack by means of providing outstanding performance.

Keywords

cognitive radio / energy detection / spectrum sensing / probability of detection / false alarm probability / miss detection probability

Cite this article

Download citation ▾
Shriraghavan Madbushi, M. S. S. Rukmini. Mitigation of primary user emulation attack using a new energy detection method in cognitive radio networks. Journal of Central South University, 2022, 29(5): 1510-1520 DOI:10.1007/s11771-022-5016-7

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

JagtapA M, GomathiN. Improved Salp swarm algorithm for network connectivity in mobile sensor network [J]. Journal of Networking and Communication Systems (JNACS), 2019, 2(3): 11-19

[2]

BrajulaW, PraveenaS. Energy efficient genetic algorithm based clustering technique for prolonging the life time of wireless sensor network [J]. Journal of Networking and Communication Systems (JNACS), 2018, 1(1): 1-9

[3]

FeiH B A W. Student information management system (SIMS) [J]. International Journal of Computer Engineering & Technology (IJCET), 2014, 5(2): 9-18

[4]

AbdallaH B, LinJ, LiG. NoSQL: Collection document and cloud by using a dynamic web query form [C]. Proc SPIE 9631, Seventh International Conference on Digital Image Processing (ICDIP 2015), 2015, 9631: 534-542

[5]

GhaznaviM, JamshidiA. A reliable spectrum sensing method in the presence of malicious sensors in distributed cognitive radio network [J]. IEEE Sensors Journal, 2015, 15(3): 1810-1816

[6]

WanR, DingL, XiongN, et al.. Dynamic dual threshold cooperative spectrum sensing for cognitive radio under noise power uncertainty [J]. Human-Centric Computing and Information Sciences, 2019, 9: 22

[7]

WuJ, WangC, YuY, et al.. Performance optimisation of cooperative spectrum sensing in mobile cognitive radio networks [J]. IET Communications, 2020, 14(6): 1028-1036

[8]

HALDORAI A, KANDASWAMY U. Cooperative spectrum handovers in cognitive radio networks intelligent [R]. 2019. DOI: https://doi.org/10.1007/978-3-030-15416-5_1.

[9]

ChakrabortyA, BanerjeeJ S, ChattopadhyayA. Non-uniform quantized data fusion rule for data rate saving and reducing control channel overhead for cooperative spectrum sensing in cognitive radio networks [J]. Wireless Personal Communications, 2019, 104(2): 837-851

[10]

E. D. N. FCC. 03–222. Notice of proposed rule making and order [S]. 2003.

[11]

McHENRY M. Spectrum white space measurements [R]. New America Foundation Broadband Forum, 2003.

[12]

AkyildizI F, LeeW Y, VuranM C, et al.. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey [J]. Computer Networks, 2006, 50(13): 2127-2159

[13]

QiY, PengT, WangW, et al.. Cyclostationarity-based spectrum sensing for wideband cognitive radio [C]. 2009 WRI International Conference on Communications and Mobile Computing, 2009, Kunming, China, IEEE, 107-111

[14]

KimH, ShinK G. In-band spectrum sensing in cognitive radio networks: Energy detection or feature detection? [C]. Proceedings of the 14th ACM international conference on Mobile computing and networking-MobiCom’ 08, 2008, New York, ACM Press

[15]

WildB, RamchandranK. Detecting primary receivers for cognitive radio applications [C]. First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005, Baltimore, MD, USA, IEEE, 124130

[16]

GaoY, JiangY. Performance analysis of a cognitive radio network with imperfect spectrum sensing [C]. 2010 INFOCOM IEEE Conference on Computer Communications Workshops, 2010, San Diego, CA, USA, IEEE

[17]

SETOODEH P, HAYKIN S, MOGHADAM K R. Dynamic spectrum supply chain model for cognitive radio networks [C]//2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). 2012: 1–6. DOI: https://doi.org/10.1109/WoWMoM.2012.6263756.

[18]

RenZ, TaghipourA, Canel-DepitreB. Information sharing in supply chain under uncertainty [C]. 2016 6th International Conference on Information Communication and Management (ICICM), 2016, Hatfield, UK, IEEE, 6771

[19]

VosooghidizajiM, TaghipourA, Canel-DepitreB. Supply chain coordination under information asymmetry: A review [J]. International Journal of Production Research, 2020, 58(6): 1805-1834

[20]

SaralaB, DeviS R, SheelaJ J J. Spectrum energy detection in cognitive radio networks based on a novel adaptive threshold energy detection method [J]. Computer Communications, 2020, 152: 1-7

[21]

KumarA, ThakurP, PanditS, et al.. Analysis of optimal threshold selection for spectrum sensing in a cognitive radio network: An energy detection approach [J]. Wireless Networks, 2019, 25(7): 3917-3931

[22]

SaralaB, DeviD R, BhargavaD S. Classical energy detection method for spectrum detecting in cognitive radio networks by using robust augmented threshold technique [J]. Cluster Computing, 2019, 22(5): 11109-11118

[23]

GhaznaviM, JamshidiA. Efficient method for reducing the average control bits in a distributed cooperative sensing in cognitive radio system [J]. IET Communications, 2013, 7(9): 867-874

[24]

JamshidiA. Performance analysis of low average reporting bits cognitive radio schemes in bandwidth constraint control channels [J]. IET Communications, 2009, 3(9): 1544

[25]

CHEN R, PARK J M. Ensuring trustworthy spectrum sensing in cognitive radio networks [C]//IEEE Workshop on Networking Technologies for Software Defined Radio Networks. 2006: 110–119. DOI: https://doi.org/10.1109/SDR.2006.4286333.

[26]

GhoshS K, MehediJ, SamalU C. Sensing performance of energy detector in cognitive radio networks [J]. International Journal of Information Technology, 2019, 114773-778

[27]

SajidA, KhalidB, AliM, et al.. Securing cognitive radio networks using blockchains [J]. Future Generation Computer Systems, 2020, 108: 816-826

[28]

LI Yong-cheng, MA Xiang-rong, WANG Man-xi, et al. Detecting primary user emulation attack based on multipath delay in cognitive radio network [C]//Smart Innovations in Communication and Computational Sciences. 2019: 361–373. DOI: https://doi.org/10.1007/978-981-10-8968-8_31.

[29]

GhaznaviM, JamshidiA. Interference impact on the outage capacity of a frequency diversity paradigm in cognitive radio networks [J]. IET Communications, 2012, 6(2): 179-186

[30]

JinZ, AnandS, SubbalakshmiK P. Detecting primary user emulation attacks in dynamic spectrum access networks [C]. 2009 IEEE International Conference on Communications, 2009, Dresden, Germany, IEEE, 15

[31]

ChenR, ParkJ M, ReedJ H. Defense against primary user emulation attacks in cognitive radio networks [J]. IEEE Journal on Selected Areas in Communications, 2008, 26(1): 25-37

[32]

ROSS S M. Introduction to probability models [M]. Ninth Edition. Academic Press, 2007.

[33]

VaziriY S A, GhazviniM. Countermeasure with primary user emulation attack in cognitive radio networks [J]. Wireless Personal Communications, 2019, 108(4): 2261-2277

[34]

GuptaE, Poonam, NagpalC K. Survey on PUE attack detection and prevention techniques [J]. International Journal of Emerging Technologies in Engineering Research, 2016, 4(4): 90-95

[35]

FurqanH M, AygülM A, NazzalM, et al.. Primary user emulation and jamming attack detection in cognitive radio via sparse coding [J]. EURASIP Journal on Wireless Communications and Networking, 2020, 1: 141

[36]

ZhangW, MallikR K, LetaiefK B. Optimization of cooperative spectrum sensing with energy detection in cognitive radio networks [J]. IEEE Transactions on Wireless Communications, 2009, 8(12): 5761-5766

[37]

ATAKLI I, HU H, CHEN Y, et al. Malicious node detection in wireless sensor networks using weighted trust evaluation [C]//Proceedings of the 2008 Spring simulation Multiconference. Society for Computer Simulation International, 2008: 836–843. DOI: https://doi.org/10.1145/1400549.1400686.

[38]

ANAND S, JIN Z, SUBBALAKSHMI K P. An analytical model for primary user emulation attacks in cognitive radio networks [C]//3rd IEEE Symposium on new Frontiers in Dynamic Spectrum Access Networks. 2008: 1–6. DOI: https://doi.org/10.1109/DYSPAN.2008.16.

[39]

ChenZ, CooklevT, ChenC, et al.Modeling primary user emulation attacks and defenses in cognitive radio networks [C], 2009, Scottsdale, AZ, IEEE, 208-215

[40]

BaoF, ChenH, XieLAnalysis of primary user emulation attack with motional secondary users in cognitive radio networks [C], 2012, Sydney, NSW, Australia, IEEE, 956961

[41]

OmerA EReview of spectrum sensing techniques in Cognitive Radio networks [C], 2015, Khartoum, Sudan, IEEE, 439446

[42]

TRIWICAKSONO D, YOUNG-SHIN S. Energy detector and matched filter as cascaded clear channel assessment in wireless network [C]//IET International Conference on Information and Communications Technologies (IETICT 2013). Beijing, China. Institution of Engineering and Technology, 2013: 551–556. DOI: https://doi.org/10.1049/cp.2013.0100.

AI Summary AI Mindmap
PDF

112

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/