Mitigation of primary user emulation attack using a new energy detection method in cognitive radio networks
Shriraghavan Madbushi , M. S. S. Rukmini
Journal of Central South University ›› 2022, Vol. 29 ›› Issue (5) : 1510 -1520.
Mitigation of primary user emulation attack using a new energy detection method in cognitive radio networks
A most promising solution to the expansion of spectrum efficiency is cognitive radio (CR) and this expansion is achieved by permitting the licensed frequency bands to be accessed by unlicensed secondary users (SUs) with a lack of interference with licensed primary users (PUs). This utilization of CR networks in the spectrum sensing causes vulnerable attacks like primary user emulation (PUE) attack and here PUs play the role of malicious user and do not permit other users to utilize PUs channel even in their unavailability. On the basis of the traditional single-threshold energy detection algorithm, a novel modified double-threshold energy detector is formulated in the CR network and the detection probability, miss detection probability, probability of false alarm, and their inter-relationship are analyzed. This paper develops a modified double threshold energy detection cooperative spectrum sensing technique to alleviate the PUE attack. Finally, performance-based evaluation is carried out between the proposed and the existing energy detection spectrum sensing method that had no consideration on PUE attack. The resultant of the simulation in MATLAB has revealed that the proposed model has significantly mitigated PUE attack by means of providing outstanding performance.
cognitive radio / energy detection / spectrum sensing / probability of detection / false alarm probability / miss detection probability
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
HALDORAI A, KANDASWAMY U. Cooperative spectrum handovers in cognitive radio networks intelligent [R]. 2019. DOI: https://doi.org/10.1007/978-3-030-15416-5_1. |
| [9] |
|
| [10] |
E. D. N. FCC. 03–222. Notice of proposed rule making and order [S]. 2003. |
| [11] |
McHENRY M. Spectrum white space measurements [R]. New America Foundation Broadband Forum, 2003. |
| [12] |
|
| [13] |
|
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
SETOODEH P, HAYKIN S, MOGHADAM K R. Dynamic spectrum supply chain model for cognitive radio networks [C]//2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). 2012: 1–6. DOI: https://doi.org/10.1109/WoWMoM.2012.6263756. |
| [18] |
|
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
|
| [23] |
|
| [24] |
|
| [25] |
CHEN R, PARK J M. Ensuring trustworthy spectrum sensing in cognitive radio networks [C]//IEEE Workshop on Networking Technologies for Software Defined Radio Networks. 2006: 110–119. DOI: https://doi.org/10.1109/SDR.2006.4286333. |
| [26] |
|
| [27] |
|
| [28] |
LI Yong-cheng, MA Xiang-rong, WANG Man-xi, et al. Detecting primary user emulation attack based on multipath delay in cognitive radio network [C]//Smart Innovations in Communication and Computational Sciences. 2019: 361–373. DOI: https://doi.org/10.1007/978-981-10-8968-8_31. |
| [29] |
|
| [30] |
|
| [31] |
|
| [32] |
ROSS S M. Introduction to probability models [M]. Ninth Edition. Academic Press, 2007. |
| [33] |
|
| [34] |
|
| [35] |
|
| [36] |
|
| [37] |
ATAKLI I, HU H, CHEN Y, et al. Malicious node detection in wireless sensor networks using weighted trust evaluation [C]//Proceedings of the 2008 Spring simulation Multiconference. Society for Computer Simulation International, 2008: 836–843. DOI: https://doi.org/10.1145/1400549.1400686. |
| [38] |
ANAND S, JIN Z, SUBBALAKSHMI K P. An analytical model for primary user emulation attacks in cognitive radio networks [C]//3rd IEEE Symposium on new Frontiers in Dynamic Spectrum Access Networks. 2008: 1–6. DOI: https://doi.org/10.1109/DYSPAN.2008.16. |
| [39] |
|
| [40] |
|
| [41] |
|
| [42] |
TRIWICAKSONO D, YOUNG-SHIN S. Energy detector and matched filter as cascaded clear channel assessment in wireless network [C]//IET International Conference on Information and Communications Technologies (IETICT 2013). Beijing, China. Institution of Engineering and Technology, 2013: 551–556. DOI: https://doi.org/10.1049/cp.2013.0100. |
/
| 〈 |
|
〉 |