Throughput of cognitive radio networks with improved energy detector under security threats

被引:6
作者
Yadav, Kuldeep [1 ]
Roy, Sanjay Dhar [1 ]
Kundu, Sumit [1 ]
机构
[1] NIT, Dept Elect & Commun Engn, Durgapur, WB, India
关键词
cognitive radio; hybrid scheme; improved energy detector; PUE attack; security threats; SSDF attack; ATTACK; PERFORMANCE; DEFENSE; SIGNALS;
D O I
10.1002/dac.3512
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Spectrum sensing in cognitive radio networks (CRNs) is subjected to some security threats such as primary user emulation (PUE) attack and spectrum sensing data falsification (SSDF) attack. In PUE attack, a malicious user (MUPUE) transmits an emulated primary signal throughout the spectrum sensing interval to secondary users (SUs) to forestall them from accessing the primary user (PU) spectrum bands. In SSDF attack, malicious users (MUSSDF) intentionally report false sensing decisions to the fusion center (FC) to influence the overall decision. While most of the existing literatures have studied the effects of these 2 types of attacks separately, the present paper evaluates the secondary network performance in terms of throughput under both the PUE and SSDF attacks with improved energy detectors (IEDs) where SU's spectrum access is hybrid, ie, either in overlay or in underlay mode. An analytical expression on throughput of SU under the simultaneous influence of both of these attacks is developed. Impact of several parameters such as IED parameter, attacker probabilities, and attacker strength on the throughput of SU is investigated. Performance of the present scheme is also compared with only PUE and only SSDF attacks. A simulation test bed is developed in MATLAB to validate our analytical results.
引用
收藏
页数:15
相关论文
共 33 条
  • [1] [Anonymous], 2003, FCC 03-322
  • [2] [Anonymous], [No title captured]
  • [3] Arslan H, 2007, SIGNALS COMMUN TECHN, P1, DOI 10.1007/978-1-4020-5542-3
  • [4] A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions
    Attar, Alireza
    Tang, Helen
    Vasilakos, Athanasios V.
    Yu, F. Richard
    Leung, Victor C. M.
    [J]. PROCEEDINGS OF THE IEEE, 2012, 100 (12) : 3172 - 3186
  • [5] Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead
    Baldini, Gianmarco
    Sturman, Taj
    Biswas, Abdur Rahim
    Leschhorn, Ruediger
    Godor, Gyoezoe
    Street, Michael
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02): : 355 - 379
  • [6] Performance of Cognitive Radio Network with Novel Hybrid Spectrum Access Schemes
    Bhowmick, Abhijit
    Prasad, Binod
    Roy, Sanjay Dhar
    Kundu, Sumit
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (02) : 541 - 560
  • [7] Toward secure distributed spectrum sensing in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Hou, Y. Thomas
    Reed, Jeffrey H.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 50 - 55
  • [8] Improved Energy Detector for Random Signals in Gaussian Noise
    Chen, Yunfei
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (02) : 558 - 563
  • [9] Robust Spectrum Sensing With Crowd Sensors
    Ding, Guoru
    Wang, Jinlong
    Wu, Qihui
    Zhang, Linyuan
    Zou, Yulong
    Yao, Yu-Dong
    Chen, Yingying
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (09) : 3129 - 3143
  • [10] Kernel-Based Learning for Statistical Signal Processing in Cognitive Radio Networks
    Ding, Guoru
    Wu, Qihui
    Yao, Yu-Dong
    Wang, Jinlong
    Chen, Yingying
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (04) : 126 - 136