Modeling the Lion Attack in Cognitive Radio Networks

被引:0
|
作者
Juan Hernandez-Serrano
Olga León
Miguel Soriano
机构
[1] Universitat Politècnica de Catalunya,Department of Telematics Engineering
[2] Centre Tecnològic de Telecomunicacions de Catalunya (CTTC),undefined
来源
EURASIP Journal on Wireless Communications and Networking | / 2011卷
关键词
Information System; Signal Processing; Radio Network; Cognitive Radio; System Application;
D O I
暂无
中图分类号
学科分类号
摘要
Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio is a smart device which runs radio applications software to perform signal processing. The use of this software enables the device to sense and understand its environment and actively change its mode of operation based on its observations. Unfortunately, this solution entails new security challenges. In this paper, we present a cross-layer attack to TCP connections in cognitive radio networks, analyze its impact on TCP throughput via analytical model and simulation, and propose potential countermeasures to mitigate it.
引用
收藏
相关论文
共 50 条
  • [21] The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-hoc Networks
    Mapunya, Sekgoari
    Velempini, Mthulisi
    2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 235 - 238
  • [22] Collaborative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks
    Sharifi, Abbas Ali
    Sharifi, Morteza
    Niya, Mir Javad Musevi
    IETE JOURNAL OF RESEARCH, 2016, 62 (02) : 205 - 211
  • [23] A novel system model for detecting primary user emulation attack in cognitive radio networks
    Thulasimani L.
    Magdalene A.H.S.
    Thulasimani, Lakshmanan (ltm.ece@psgtech.ac.in), 1600, Inderscience Publishers (18): : 381 - 390
  • [24] Aggregate Interference Modeling in Cognitive Radio Networks with Power and Contention Control
    Chen, Zengmao
    Wang, Cheng-Xiang
    Hong, Xuemin
    Thompson, John S.
    Vorobyov, Sergiy A.
    Ge, Xiaohu
    Xiao, Hailin
    Zhao, Feng
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2012, 60 (02) : 456 - 468
  • [25] Modeling of uplink power control for cognitive radio networks: Cooperative and noncooperative
    Wang, Wei
    Peng, Tao
    Wang, Wenbo
    MATHEMATICAL AND COMPUTER MODELLING, 2011, 53 (11-12) : 2136 - 2148
  • [26] Leveraging An Inventory of the Cognitive Radio Attack Surface
    Abadie, Andre'
    Wijesekera, Duminda
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 136 - 143
  • [27] Security-reliability trade-off for cognitive radio networks in the presence of eavesdropping attack
    Jia Zhu
    EURASIP Journal on Advances in Signal Processing, 2013
  • [28] Bayesian Decision Model with Trilateration for Primary User Emulation Attack Localization in Cognitive Radio Networks
    Fihri, Wassim Fassi
    El Ghazi, Hassan
    Kaabouch, Naima
    Abou El Majd, Badr
    2017 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2017,
  • [29] Mitigation of primary user emulation attack in cognitive radio for secured medical body area networks
    Venkatesan, K. J. Prasanna
    Vijayarangan, V.
    International Journal of Mobile Network Design and Innovation, 2015, 6 (02) : 73 - 80
  • [30] A decision-making approach for detecting the primary user emulation attack in cognitive radio networks
    Fihri, Wassim Fassi
    El Ghazi, Hassan
    Abou El Majd, Badr
    El Bouanani, Faissal
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (15)