Mitigation of primary user emulation attack in cognitive radio for secured medical body area networks

In recent years, the cognitive radio CR networks have lots of issues during the communication. The main and important issue to be concentrated is the primary user emulation attack PUEA. This primary user emulation attack PUEA is one of the main issues where it compromises the spectrum sensing. So to overcome this primary user emulation attack PUEA issue in the cognitive radio CR we are proposing an approach defence against PUEA attacks in cognitive radio medical body area networks MBANs. In this approach initial authentication of the primary user is done at the helper nodes. Later the network estimates the RSSI, distance and the time of arrival. Based on these parameters, it is possible for the network to have a secure communication between the nodes.

[1]  Máire O'Neill,et al.  Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[2]  Jie Wu,et al.  Efficient SINR Estimating with Accuracy Control in Large Scale Cognitive Radio Networks , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.

[3]  Loukas Lazos,et al.  A Primary User authentication system for mobile cognitive radio networks , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).

[4]  Ying-Chang Liang,et al.  A retransmission-based scheme for video streaming over wireless channels , 2010, CMC 2010.

[5]  Shuai Li,et al.  Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.

[6]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[7]  Lei Ying,et al.  Limited feedback for cognitive radio networks using compressed sensing , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[8]  Weihua Zhuang,et al.  Simple Channel Sensing Order in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.

[9]  Deepraj S Vernekar,et al.  AN INVESTIGATION OF SECURITY CHALLENGES IN COGNITIVE RADIO NETWORKS , 2012 .

[10]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[11]  Feng Lin,et al.  Cognitive radio network as wireless sensor network (II): Security consideration , 2011, Proceedings of the 2011 IEEE National Aerospace and Electronics Conference (NAECON).

[12]  Yu-Dong Yao,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack , 2011, IEEE Transactions on Wireless Communications.

[13]  Miguel Soriano,et al.  Securing cognitive radio networks , 2010 .

[14]  K. J. Ray Liu,et al.  Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.

[15]  Jianfeng Wang,et al.  Emerging cognitive radio applications: A survey , 2011, IEEE Communications Magazine.

[16]  Khaled Ben Letaief,et al.  Cooperative Communications for Cognitive Radio Networks , 2009, Proceedings of the IEEE.