Enhanced Throughput Performance under Primary User Emulation Attack in Cognitive Radio Networks by Optimal Threshold Selection Approach

Cognitive radio (CR) provides dynamic spectrum access to combat spectrum scarcity. Due to the unique characteristic of cognitive radio network (CRN) architecture, it allows various unknown wireless devices to opportunistically access the primary user's (PU) spectrum bands which imposes security threats to the network. One of the common threats is a primary user emulation (PUE) attack, where some malicious users try to mimic the primary signal and deceive secondary users (SUs) to prevent them from accessing the vacant PU spectrum bands. In this paper, the throughput performance of a SU has been enhanced under PUE attack by a proposed optimal threshold selection approach that minimizes the total error probability where SU spectrum access is hybrid, i.e., either in overlay or in underlay. An analytical framework for evaluating the throughput of a SU under proposed defense scheme is presented. Impacts of several parameters such as sensing time, attacker's strength and attacker's presence probability on the throughput performance of a SU following the proposed scheme are indicated and compared with conventional scheme. The proposed scheme based on optimal threshold selection outperforms the conventional scheme based on a fixed threshold. The effects of attackers on false alarm probability and total error probability of SU are also indicated. A simulated test bed is developed in MATLAB to validate our analytical results.

[1]  Abbas Ali Sharifi,et al.  Secure cooperative spectrum sensing under primary user emulation attack in cognitive radio networks: Attack-aware threshold selection approach , 2016 .

[2]  Mohammad Javad Saber,et al.  Multiband Cooperative Spectrum Sensing for Cognitive Radio in the Presence of Malicious Users , 2016, IEEE Communications Letters.

[3]  Alentattil Rajesh,et al.  A simplified counter approach to primary user emulation attacks from secondary user perspective , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[4]  Sanjay Dhar Roy,et al.  Throughput performance under primary user emulation attack in cognitive radio networks , 2017, Int. J. Commun. Syst..

[5]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[6]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[7]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[8]  Santhanakrishnan Anand,et al.  Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.

[9]  Sanjay Dhar Roy,et al.  Performance of Cognitive Radio Network with Novel Hybrid Spectrum Access Schemes , 2016, Wirel. Pers. Commun..

[10]  A. Anpalagan,et al.  Throughput Analysis of Opportunistic Access Strategies in Hybrid Underlay—Overlay Cognitive Radio Networks , 2012, IEEE Transactions on Wireless Communications.

[11]  Huseyin Arslan,et al.  Cognitive Radio, Software Defined Radio, and Adaptive Wireless Systems (Signals and Communication Technology) , 2007 .

[12]  Mohsen Guizani,et al.  Securing cognitive radio networks against primary user emulation attacks , 2015, IEEE Network.

[13]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[14]  H. Urkowitz Energy detection of unknown deterministic signals , 1967 .

[15]  Yonghong Zeng,et al.  Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..

[16]  Leonardo Goratti,et al.  A single iteration belief propagation algorithm to minimize the effects of primary user emulation attacks , 2016, 2016 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).

[17]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[18]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.