An Adaptive Learning-Based Attack Detection Technique for Mitigating Primary User Emulation in Cognitive Radio Networks

被引:8
作者
Arun, S. [1 ]
Umamaheswari, G. [1 ]
机构
[1] PSG Coll Technol, Elect & Commun, Coimbatore, Tamil Nadu, India
关键词
Adaptive learning; Cognitive radio; Cyclostationary feature detection; Primary user emulation attack; Signal classification; DEFENSE; AUTHENTICATION; SURVEILLANCE; TRUST; MODEL;
D O I
10.1007/s00034-019-01123-z
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cognitive radio (CR) technology is designed to improve reliability in communication between users through efficient and dynamic spectrum exploitation. CRs address the problems in spectrum allocation and channel access and improve the rate of radio resource utilization. The flexibility of the CR networks (CRN) and communication medium exposes it to a variety of threats; primary user emulation attack (PUEA) is a malicious and denial-of-service kind of adversary that defaces CRN performance. This manuscript proposes an adaptive learning-based attack detection in CRN for detecting and mitigating PUEA by analyzing the received power of the transmitter. The learning process endorses some beneficial features by distinguishing low spectrum legitimate PU from an adversary. The learning process adopts cyclostationary feature analysis for distinguishing adversaries and low power PU in CR communications. The process of learning is further enhanced by estimating distance variance and communication time-based analysis for improving the rate of signal classification and SU communication rate. The experimental analysis proves the stability of the proposed detection method by improving the SU throughput, with lesser signal classification time and misdetection probability.
引用
收藏
页码:1071 / 1088
页数:18
相关论文
共 24 条
[1]   A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines [J].
Abrardo, Andrea ;
Barni, Mauro ;
Kallas, Kassem ;
Tondi, Benedetta .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) :1333-1345
[2]  
[Anonymous], P IEEE GLOB
[3]   An energy persistent Range-dependent Regulated Transmission Communication model for vehicular network applications [J].
Baskar, S. ;
Periyanayagi, S. ;
Shakeel, P. Mohamed ;
Dhulipala, V. R. Sarma .
COMPUTER NETWORKS, 2019, 152 :144-153
[4]   Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation [J].
Borle, Kapil M. ;
Chen, Biao ;
Du, Wenliang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) :2225-2235
[5]   Toward secure distributed spectrum sensing in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min ;
Hou, Y. Thomas ;
Reed, Jeffrey H. .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) :50-55
[6]   Intelligent resource allocation scheme for the cognitive radio network in the presence of primary user emulation attack [J].
Das, Deepa ;
Das, Susmita .
IET COMMUNICATIONS, 2017, 11 (15) :2370-2379
[7]   Protecting Operation-Time Privacy of Primary Users in Downlink Cognitive Two-Tier Networks [J].
Dong, Xuewen ;
Gong, Yanmin ;
Ma, Jianfeng ;
Guo, Yuanxiong .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (07) :6561-6572
[8]   Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks [J].
Duc-Tuyen Ta ;
Nhan Nguyen-Thanh ;
Maille, Patrick ;
Van-Tam Nguyen .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2018, 4 (03) :582-596
[9]   Security in Cognitive Radio Network: Defense against Primary User Emulation attacks using Genetic Artificial Bee Colony (GABC) algorithm [J].
Elghamrawy, Sally M. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 :479-487
[10]   Spectrum sensing defending against PUE attack based on fractal dimension [J].
Fu, Shuang ;
Zhang, Guoyin ;
Li Yang .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02) :S2667-S2675