Detection of intelligent malicious user in cognitive radio network by using friend or foe (FoF) detection technique

In a cognitive radio network, dynamic spectrum must be shared with an unlicensed user because of the limited bandwidth of the wireless spectrum. As a regulation of cognitive radio networks, a secondary user is allowed to utilize the unoccupied spectrum when it is not being used by the primary user. However, an intelligent malicious user can attack a cognitive radio network and block the permitted channel for the secondary user. The invasion of an intelligent malicious user is a serious problem in the deployment of such networks. In this paper, we introduce a novel scheme based on friend or foe (FoF) detection with physical-layer network coding to detect a secondary user and an intelligent malicious user. The entire cognitive radio network is protected while the secondary user and intelligent malicious user are accurately detected. The effectiveness of the proposed approach is analyzed theoretically and by MATLAB simulation. It is shown that with the FoF detection technique and the proposed algorithm, the base station can detect the secondary user and intelligent malicious user with high accuracy. Computer simulations show that the probability of detection is almost 100% and that the probability of the false alarm is almost 0% for a low Eb/N0. Consequently, the proposed technique can be applied to a cognitive radio network to protect the entire network and ensure appropriate channel utilization by the secondary user.

[1]  Tongtong Li,et al.  Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.

[2]  Lokesh Chouhan,et al.  Secure and trusted algorithm for cognitive radio network , 2012, 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).

[3]  Rong Zheng,et al.  On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification , 2012, IEEE Transactions on Signal Processing.

[4]  Soung Chang Liew,et al.  Hot topic: physical-layer network coding , 2006, MobiCom '06.

[5]  Brian M. Sadler,et al.  Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.

[6]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[7]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[8]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[9]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[10]  S. Arkoulis,et al.  Cognitive Spectrum and Its Security Issues , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.

[11]  Y. Raghavender Rao,et al.  APPLICATION OF NORMALIZED CROSS CORRELATION TO IMAGE REGISTRATION , 2014 .

[12]  Soung Chang Liew,et al.  Channel coding and decoding in a relay system operated with physical-layer network coding , 2008, IEEE Journal on Selected Areas in Communications.

[13]  John C. S. Lui,et al.  Friends or Foes: Detecting Dishonest Recommenders in Online Social Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[14]  Charles M. Grinstead,et al.  Introduction to probability , 1999, Statistics for the Behavioural Sciences.

[15]  Zhu Han,et al.  Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[16]  Prasant Mohapatra,et al.  Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space , 2013, IEEE Transactions on Mobile Computing.

[17]  Yu-Dong Yao,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack , 2011, IEEE Transactions on Wireless Communications.

[18]  Ekram Hossain,et al.  Dynamic Spectrum Access and Management in Cognitive Radio Networks: Introduction , 2009 .

[19]  Ekram Hossain,et al.  Dynamic Spectrum Access and Management in Cognitive Radio Networks , 2009 .

[20]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[21]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .