An Adaptive Learning-Based Attack Detection Technique for Mitigating Primary User Emulation in Cognitive Radio Networks

被引:0
作者
S. Arun
G. Umamaheswari
机构
[1] PSG College of Technology,Electronics and Communication
来源
Circuits, Systems, and Signal Processing | 2020年 / 39卷
关键词
Adaptive learning; Cognitive radio; Cyclostationary feature detection; Primary user emulation attack; Signal classification;
D O I
暂无
中图分类号
学科分类号
摘要
Cognitive radio (CR) technology is designed to improve reliability in communication between users through efficient and dynamic spectrum exploitation. CRs address the problems in spectrum allocation and channel access and improve the rate of radio resource utilization. The flexibility of the CR networks (CRN) and communication medium exposes it to a variety of threats; primary user emulation attack (PUEA) is a malicious and denial-of-service kind of adversary that defaces CRN performance. This manuscript proposes an adaptive learning-based attack detection in CRN for detecting and mitigating PUEA by analyzing the received power of the transmitter. The learning process endorses some beneficial features by distinguishing low spectrum legitimate PU from an adversary. The learning process adopts cyclostationary feature analysis for distinguishing adversaries and low power PU in CR communications. The process of learning is further enhanced by estimating distance variance and communication time-based analysis for improving the rate of signal classification and SU communication rate. The experimental analysis proves the stability of the proposed detection method by improving the SU throughput, with lesser signal classification time and misdetection probability.
引用
收藏
页码:1071 / 1088
页数:17
相关论文
共 77 条
[1]  
Abrardo A(2016)A game-theoretic framework for optimum decision fusion in the presence of by zantines IEEE Trans. Inf. Forensics Secur. 11 1333-1345
[2]  
Barni M(2019)An energy persistent range-dependent regulated transmission communication model for vehicular network applications Comput. Netw. 152 144-153
[3]  
Kallas K(2015)Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation IEEE Trans. Inf. Forensics Secur. 10 2225-2235
[4]  
Tondi B(2008)Toward secure distributed spectrum sensing in cognitive radio networks IEEE Commun. Mag. 46 50-55
[5]  
Baskar S(2017)Intelligent resource allocation scheme for the cognitive radio network in the presence of primary user emulation attack IET Commun. 11 2370-2379
[6]  
Periyanayagi S(2018)Protecting operation-time privacy of primary users in downlink cognitive two-tier networks IEEE Trans. Veh. Technol. 67 6561-6572
[7]  
Shakeel PM(2017)Spectrum sensing defending against PUE attack based on fractal dimension Cluster Computing 22 2667-2675
[8]  
Dhulipala VS(2017)Defence against primary user emulation attack using statistical properties of the cognitive radio received power IET Commun. 11 1535-1542
[9]  
Borle KM(2017)On detecting primary user emulation attack using channel impulse response in the cognitive radio network Front. Inf. Technol. Electron. Eng. 18 1665-1676
[10]  
Chen B(2018)Efficient transmission strategy for cognitive radio systems under primary user emulation attack IEEE Syst. J. 12 3767-3774