A mitigation strategy against malicious Primary User Emulation Attack in Cognitive Radio networks

The increasing demand of usable spectrum range startled the world of serious shortage in coming years. Cognitive Radio technology emerged to solve this problem by allowing unlicensed users to utilize the spectrum resources whenever the licensed users are not active. With the emergence of this technology many security issues arose, that if successful may hamper all the benefits this promising technology has to offer. Among many other security issues Primary User Emulation Attack is one. In this paper we discuss the Primary User Emulation Attack. We also discuss the existing work in the field, along with its limitations. We also elucidate the effects of this attack through simulation results. In the end we describe our proposed approach to counter the Primary User Emulation Attack.

[1]  H. Kumar,et al.  Malicious User Detection in Cognitive Radio , 2015 .

[2]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[3]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[4]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[5]  Caidan Zhao,et al.  Anti-PUE Attack Base on the Transmitter Fingerprint Identification in Cognitive Radio , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[6]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[7]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[8]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[9]  Han Yu,et al.  Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.

[10]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[11]  F. Riaz,et al.  Vehicle-to-vehicle communication enhanced by cognitve approach and multi-radio technologies , 2012, 2012 International Conference on Emerging Technologies.

[12]  Santhanakrishnan Anand,et al.  Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.

[13]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[14]  M. Imran,et al.  White space optimization using memory enabled genetic algorithm in vehicular cognitive radio , 2013, 2012 IEEE 11th International Conference on Cybernetic Intelligent Systems (CIS).

[15]  Yonghong Zeng,et al.  A Review on Spectrum Sensing for Cognitive Radio: Challenges and Solutions , 2010, EURASIP J. Adv. Signal Process..

[16]  Yong Guan,et al.  A Framework for Cooperative In-Band Sensing in Cognitive Radio Network , 2010, 2010 Fifth IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR).

[17]  Imran Rashid,et al.  Primary User Emulation attack and their mitigation strategies: A survey , 2013, 2013 2nd National Conference on Information Assurance (NCIA).

[18]  Roshan Singh Thakur,et al.  Attacks & Preventions of Cognitive Radio Network-A Survey , 2013 .

[19]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[20]  Mohsen Guizani,et al.  Survey of Security Issues in Cognitive Radio Networks , 2011 .