Malicious User Attack in Cognitive Radio Networks

Signal detection in cognitive radio network (CRN) is influenced by several factors. One of them is malicious user that emulate primary user (PU) signal. Emulation of PU signal causes detection error. This paper investigates the impact of malicious user attack to PU signal detection. A number of malicious users are randomly deployed around secondary user (SU) at a certain distance. They attempt to attack primary signal detection that is transmitted from 100 km to SU receiver. Then, the received signal power at secondary receiver and the performance of probability of false alarm and probability of miss detection under two hypothesis of Neyman Pearson criterion are studied. The derived results show that a number of malicious users has a significant impact to the performance of received power at SU and detection error rate.

[1]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[2]  James B. D. Joshi,et al.  Security in Dynamic Spectrum Access Systems: A Survey , 2009 .

[3]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[4]  Yuli Fu,et al.  Application of Stochastic Resonance of the Single-mode Nonlinear Optical System in Spectrum Sensing of Cognitive Radio Networks , 2015 .

[5]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[6]  Muhammad Arshad,et al.  Spectrum sensing performance in cognitive radio system , 2015, 2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE).

[7]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[8]  H Venkatesh Kumar,et al.  A Novel Approach to Optimize Cognitive Radio Network Utilization using Cascading Technique , 2015 .

[9]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[10]  Santhanakrishnan Anand,et al.  Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.

[11]  Philippe Ciblat,et al.  Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks , 2015, IEEE Transactions on Wireless Communications.