Throughput performance under primary user emulation attack in cognitive radio networks

被引:7
|
作者
Yadav, Kuldeep [1 ]
Prasad, Binod [1 ]
Bhowmick, Abhijit [2 ]
Roy, Sanjay Dhar [1 ]
Kundu, Sumit [1 ]
机构
[1] NIT, Dept ECE, Durgapur, WB, India
[2] VITU, SENSE, Dept Commun Engn, Vellore, TN, India
关键词
cognitive radio; hybrid schemes; primary user emulation attack; security threats; throughput;
D O I
10.1002/dac.3371
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Spectrum sensing in cognitive radio networks imposes some security threats to the secondary users (SUs) such as primary user emulation attack (PUEA). In the present paper, throughput of an SU is studied for cognitive radio network under PUEA where SU spectrum access is hybrid, ie, either in overlay mode or in underlay mode. A novel analytical expression for throughput of an SU in presence of PUEA is developed. Impact of several parameters such as sensing time, attacker strength, attacker's presence probabilities, maximum allowable SU transmit power, and tolerable interference limit at primary user on the throughput of an SU is investigated. The throughput performance under PUEA and without PUEA is compared.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Performance Analysis of Primary User Emulation Attack in Cognitive Radio Networks
    Zhang, Chaorui
    Yu, Rong
    Zhang, Yan
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 371 - 376
  • [2] Enhanced Throughput Performance under Primary User Emulation Attack in Cognitive Radio Networks by Optimal Threshold Selection Approach
    Yadav, Kuldeep
    Roy, Sanjay Dhar
    Kundu, Sumit
    2018 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS, MATERIALS ENGINEERING & NANO-TECHNOLOGY (IEMENTECH), 2018, : 311 - 316
  • [3] Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks
    Seyed Abdolazim Vaziri Yazdi
    Mahdieh Ghazvini
    Wireless Personal Communications, 2019, 108 : 2261 - 2277
  • [4] An Overview of Primary User Emulation Attack in Cognitive Radio Networks
    Gupta, Ishu
    Sahu, O. P.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 27 - 31
  • [5] Detecting Primary User Emulation Attack in Cognitive Radio Networks
    Pu, Di
    Shi, Yuan
    Ilyashenko, Andrei V.
    Wyglinski, Alexander M.
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [6] Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks
    Yazdi, Seyed Abdolazim Vaziri
    Ghazvini, Mahdieh
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (04) : 2261 - 2277
  • [7] Collaborative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks
    Sharifi, Abbas Ali
    Sharifi, Morteza
    Niya, Mir Javad Musevi
    IETE JOURNAL OF RESEARCH, 2016, 62 (02) : 205 - 211
  • [8] Cooperative Primary User Emulation Attack and Defense in Cognitive Radio Networks
    Yang, Tianhong
    Chen, Huifang
    Xie, Lei
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [9] Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks
    Nguyen-Thanh, Nhan
    Ciblat, Philippe
    Pham, Anh T.
    Nguyen, Van-Tam
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (09) : 4981 - 4993
  • [10] An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks
    Dong, Qi
    Chen, Yu
    Li, Xiaohua
    Zeng, Kai
    Zimmermann, Roger
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 297 - 317