Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter

03/08/2019
by   Zakaria El Mrabet, et al.
0

Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to use the vacant spectrum bands without causing interference to the primary users. However, several attacks could disturb the normal functioning of the cognitive radio network. Primary user emulation attacks are one of the most severe attacks in which a malicious user emulates the primary user signal characteristics to either prevent other legitimate secondary users from accessing the idle channels or causing harmful interference to the primary users. There are several proposed approaches to detect the primary user emulation attackers. However, most of these techniques assume that the primary user location is fixed, which does not make them valid when the primary user is mobile. In this paper, we propose a new approach based on the Kalman filter framework for detecting the primary user emulation attacks with a non-stationary primary user. Several experiments have been conducted and the advantages of the proposed approach are demonstrated through the simulation results.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/20/2019

An Analysis on Interactions among Secondary User and Unknown Jammer in Cognitive Radio Systems by Fictitious Play

With the advancement of communication, the spectrum shortage problem bec...
research
06/21/2021

Detection Of Primary User Emulation Attack (PUEA) In Cognitive Radio Networks Using One-Class Classification

Opportunistic usage of spectrum owned by licensed (or primary) users is ...
research
12/20/2019

Game-theory-based analysis on interactions among secondary and malicious users in coordinated jamming attack in cognitive radio systems

IEEE 802.22 standard utilizes cognitive radio (CR) techniques to allow s...
research
05/01/2018

Explore Recurrent Neural Network for PUE Attack Detection in Practical CRN Models

The proliferation of the Internet of Things (IoTs) and pervasive use of ...
research
01/22/2019

Particle Swarm Optimization Approaches for Primary User Emulation Attack Detection and Localization in Cognitive Radio Networks

The primary user emulation attack (PUEA) is one of the common threats in...
research
04/24/2018

An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks

The proliferation of advanced information technologies (IT), especially ...
research
12/20/2017

Anchored Network Users: Stochastic Evolutionary Dynamics of Cognitive Radio Network Selection

To solve the spectrum scarcity problem, the cognitive radio technology i...

Please sign up or login with your details

Forgot password? Click here to reset