Defense Against Selfish PUEA in Cognitive Radio Networks Based on Hash Message Authentication Code

Cognitive radio network (CRN) is a very astute technology developed to solve the spectrum shortage problem in wireless communication by utilizing the unused bands, where a secondary user (SU) utilizes the free spectrum of the primary user (PU) in an opportunistic manner. The CRN defines the free spectrum sessions using an intelligent and sophisticated process called a spectrum sensing. The spectrum sensing encounters a security problem called primary user emulation attack (PUEA). In this problem, an attacker mimics the PU signal to force the SUs to leave the free band. In this paper, a proposed model based on hash message authentication code (HMAC) is used to detect the PUEA in CRN. HMAC is used to trusting the PU transmission, which is not clarified until now. A shared secret key is used between the SU and the PU to achieve an accurate identification of the PU signal from the attacker. The effiectiveness of the proposed approach is analyzed through both theoretical analysis and Simulation. Results show that the proposed method is completely defeated the selfish PUEA and achieves efficient spectrum sharing, moreover, it provides a good detection of the PU when error correcting codes are used.

[1]  Abbas Ali Sharifi,et al.  Secure cooperative spectrum sensing under primary user emulation attack in cognitive radio networks: Attack-aware threshold selection approach , 2016 .

[2]  Tongtong Li,et al.  Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.

[3]  Huifang Chen,et al.  Analysis of primary user emulation attack with motional secondary users in cognitive radio networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[4]  Santhanakrishnan Anand,et al.  Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.

[5]  Yu-Dong Yao,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack , 2011, IEEE Transactions on Wireless Communications.

[6]  Tongtong Li,et al.  Sub-band detection of primary user emulation attacks in OFDM-based cognitive radio networks , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[7]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[8]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[9]  Investigation of Puea in Cognitive Radio Networks Using Energy Detection in Different Channel Model , 2015 .

[10]  Chin-Chen Chang,et al.  Ciphertext-Auditable Identity-Based Encryption , 2015, Int. J. Netw. Secur..

[11]  Alba Rozas Cid,et al.  PUE attack detection in CWSNs using anomaly detection techniques , 2013 .

[12]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[13]  Han Yu,et al.  Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.

[14]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[15]  H. Urkowitz Energy detection of unknown deterministic signals , 1967 .

[16]  Chuangui Ma,et al.  Improved Fault Attack Against Eta Pairing , 2014, Int. J. Netw. Secur..

[17]  Maryam Haghighat,et al.  Smart primary user emulation in cognitive radio networks: defence strategies against radio‐aware attacks and robust spectrum sensing , 2015, Trans. Emerg. Telecommun. Technol..

[18]  Seyed Mohammad Sajad Sadough,et al.  Optimal soft combination for multiple antenna energy detection under primary user emulation attacks , 2015 .

[19]  Cheng-Chi Lee,et al.  Guessing Attacks on Strong-Password Authentication Protocol , 2013, Int. J. Netw. Secur..

[20]  Carlos A. Pomalaza-Raez,et al.  Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[21]  Wenliang Du,et al.  A physical layer authentication scheme for countering primary user emulation attack , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[22]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[23]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .