Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature (PDLS)

被引:7
作者
Albehadili, Abdulsahib [1 ]
Ali, Atif [1 ]
Jahan, Farha [1 ]
Javaid, Ahmad Y. [1 ]
Oluoch, Jared [2 ]
Devabhaktuni, Vijay [3 ]
机构
[1] Univ Toledo, Dept Elect Engn & Comp Sci, 2801 W Bancroft St, Toledo, OH 43606 USA
[2] Univ Toledo, Dept Engn Technol, 2801 W Bancroft St, Toledo, OH 43606 USA
[3] Purdue Univ Northwest, Dept Elect & Comp Engn, Hammond, IN USA
来源
2019 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS) | 2019年
关键词
Cognitive Radio; GNURadio; Link-signature; Machine Learning; Multipath; Physical Layer Security; Software-Defined Radio; Wireless Communications; PHYSICAL-LAYER;
D O I
10.1109/wts.2019.8715527
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A machine learning (ML) framework is proposed for primary user emulation attack (PUEA) detection in Cognitive Radio Networks (CRN). The ML framework is based on various classification models that exploit features extracted using the proposed Pattern Described Link-Signature method (PDLS) to distinguish between legitimate and malicious users. PDLS defines Link-signature from the channel impulse response (CIR) of the wireless link in the multipath environment. Previous works define Link-signature as the amplitude (or power) value of CIR while PDLS, on the other hand, defines it as a pattern that describes the structure of 52 sub-CIR (i.e., CIR contains 52 sub-CIR) in Orthogonal Frequency Division Multiplexing (OFDM) based transceivers. The proposed scheme is tested by developing a Software-Defined Radio (SDR) testbed to capture real wireless channel measurements. The testbed is based on IEEE 802.11a/g/p standard transceiver which comprises OFDM physical layer. Experimental results show that the proposed approach can distinguish between legitimate and malicious users effectively.
引用
收藏
页数:7
相关论文
共 28 条
[1]  
Albehadili A., 2018, IEEE ACCESS
[2]  
BISHOP C. M., 2006, Pattern recognition and machine learning, DOI [DOI 10.1117/1.2819119, 10.1007/978-0-387-45528-0]
[3]  
Bloessl B., 1996, IEEE T MOBILE COMPTI, V17, P1162
[4]  
Caidan Zhao, 2010, Proceedings of the 2010 International Conference on Communications and Mobile Computing (CMC 2010), P154, DOI 10.1109/CMC.2010.36
[5]  
CHEN R, 2008, IEEE J SELECTED AREA, V26
[6]   Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks [J].
Chen, Zesheng ;
Cooklev, Todor ;
Chen, Chao ;
Pomalaza-Raez, Carlos .
2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009), 2009, :208-215
[7]  
Chenji H., 2016, 34th AIAA International Communications Satellite Systems Conference, P5728
[8]  
Chin W.-L., 2012, Vehicular Technology Conference (VTC Spring), 2012 IEEE 75th, P1
[9]  
Farhat MT, 2018, PROC NAECON IEEE NAT, P137, DOI 10.1109/NAECON.2018.8556763
[10]  
Fragkiadakis A. G., 2015, IEEE COMMUNICATIONS, V15, P428