Performance Analysis of Primary User Emulation Attack in Cognitive Radio Networks

被引:0
|
作者
Zhang, Chaorui [1 ]
Yu, Rong [2 ]
Zhang, Yan [3 ]
机构
[1] South China Univ Technol, Guangzhou, Guangdong, Peoples R China
[2] Guangdong Univ Technol, Guangzhou, Peoples R China
[3] Univ Oslo, Simula Res Lab Norway, N-0316 Oslo, Norway
来源
2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) | 2012年
关键词
Cognitive Radio; Primary User Emulation Attacks (PUEA); Security; Common control channel; Call admission control; CONTROL CHANNEL DESIGN;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cognitive Radio (CR) is a promising technology to efficiently utilize the limited spectrum resources for the rapidly increasing demands on wireless applications and services. Security is very challenging in a CR network due to its unique characteristics, e.g. systems co-existence and interference guarantee. In this paper, we will study the performance of CR networks under Primary User Emulation Attacks (PUEA) that is a typical security issue. A multi-dimensional Markov model is built and the system performance is evaluated under generic system models, including the common control channel (CCC) adoption and a joint PUEA detection and call admission control scheme. We introduce a new performance metric CCC recovery time and redefine outage probability to identify and evaluate the important impact of CCC on the CR network. In addition, we calculate blocking rate, dropping rate, and outage probability of the CR networks. Numerical results show that the system performance may deteriorate severely when attacked. The joint PUEA detection mechanism and guard channel strategy are able to significantly alleviate the performance degradation.
引用
收藏
页码:371 / 376
页数:6
相关论文
共 50 条
  • [21] A channel hopping based defense method against primary user emulation attack in cognitive radio networks
    Ahmadfard, Arash
    Jamshidi, Ali
    COMPUTER COMMUNICATIONS, 2019, 148 : 1 - 8
  • [22] Enhanced Primary User Emulation Attack Inference in Cognitive Radio Networks Using Machine Learning Algorithm
    Sureka, N.
    Gunaseelan, K.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1893 - 1906
  • [23] A Proactive Elimination of Primary User Emulation Attack in Cognitive Radio Networks Using Intense Explore Algorithm
    Sumathi, A. C.
    Vidhyapriya, R.
    Kiruthika, C.
    2015 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2015,
  • [24] Mitigation of primary user emulation attack using a new energy detection method in cognitive radio networks
    Madbushi, Shriraghavan
    Rukmini, M. S. S.
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2022, 29 (05) : 1510 - 1520
  • [25] Optimisation of cooperative spectrum sensing for cognitive radio networks in the presence of smart primary user emulation attack
    Saber, Mohammad Javad
    Sadough, Seyed Mohammad Sajad
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (01):
  • [26] Uncoordinated frequency hopping scheme for defense against primary user emulation attack in cognitive radio networks
    Mahmoudi, Mohsen
    Faez, Karim
    Ghasemi, Abdorasoul
    COMPUTER NETWORKS, 2019, 163
  • [27] An improved Primary User Emulation Attack Detection in Cognitive Radio Networks Based on Firefly Optimization Algorithm
    Ghanem, Walid R.
    Shokair, Mona
    Desouky, Moawad I.
    2016 33RD NATIONAL RADIO SCIENCE CONFERENCE (NRSC), 2016, : 178 - 187
  • [28] A Primary User Emulation Attack Detection Scheme in Cognitive Radio Network with Mobile Secondary User
    Li, Yongcheng
    Han, Changdong
    Wang, Manxi
    Chen, Huifang
    Xie, Lei
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1076 - 1081
  • [29] Defense against primary user emulation attacks in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Reed, Jeffrey H.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) : 25 - 37
  • [30] Securing Cognitive Radio Networks against Primary User Emulation Attacks
    Yu, Rong
    Zhang, Yan
    Liu, Yi
    Gjessing, Stein
    Guizani, Mohsen
    IEEE NETWORK, 2015, 29 (04): : 68 - 74