Smart primary user emulation in cognitive radio networks: defence strategies against radio‐aware attacks and robust spectrum sensing

Cognitive radio CR, which provides dynamic spectrum access to combat spectrum scarcity, imposes some emerging threats to the network. One of the common threats in CR is primary user emulation PUE attack, in which some malicious users try to mimic primary signal and deceive CR users to prevent them from accessing the vacant frequency bands. In this paper, we propose a smart radio-aware PUE attacker that is equipped with spectrum sensing and consumes malicious resources in a way that causes more destruction on CR performance than always present PUE attackers. We first analyse and formulate the destructive effect such an attacker imposes to the CR network, and then, we derive robust cooperative spectrum sensing rules for energy detection spectrum sensing under PUE attacks. Moreover, using a weighting vector at fusion centre of the CRs, we propose a scheme to combat fake signals by maximising the average cognitive signal to interference plus noise ratio. We combine proposed method with two widely used energy detection scheme, Neyman-Pearson and minimum probability of error criterion. Numerical results show the superiority and robustness of our proposed method in the presence of smart attackers compared with conventional methods. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Vahid Tarokh,et al.  Interference and noise reduction by beamforming in cognitive networks , 2009, IEEE Transactions on Communications.

[2]  Mohamed-Slim Alouini,et al.  On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.

[3]  S. Srinivasa,et al.  The Throughput Potential of Cognitive Radio: A Theoretical Perspective , 2006, 2006 Fortieth Asilomar Conference on Signals, Systems and Computers.

[4]  Carlos A. Pomalaza-Raez,et al.  Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[5]  Laurence B. Milstein,et al.  Spoofing or Jamming: Performance Analysis of a Tactical Cognitive Radio Adversary , 2011, IEEE Journal on Selected Areas in Communications.

[6]  Gang Wang,et al.  Collaborative Spectrum Sensing in Cognitive Radio System - Performance Analysis of Weighted Gain Combining , 2011, 2011 Ninth Annual Communication Networks and Services Research Conference.

[7]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[8]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[9]  Qihui Wu,et al.  Kernel-Based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions , 2013, IEEE Signal Processing Magazine.

[10]  Yu-Dong Yao,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack , 2011, IEEE Transactions on Wireless Communications.

[11]  Prasant Mohapatra,et al.  Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space , 2013, IEEE Transactions on Mobile Computing.

[12]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[13]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[14]  Seyed Ali Ghorashi,et al.  Spectrum Leasing for OFDM-Based Cognitive Radio Networks , 2013, IEEE Transactions on Vehicular Technology.

[15]  Erik G. Larsson,et al.  Spectrum Sensing for Cognitive Radio : State-of-the-Art and Recent Advances , 2012, IEEE Signal Processing Magazine.

[16]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[17]  Paul S. Dwyer,et al.  Multivariate Maxima and Minima with Matrix Derivatives , 1969 .

[18]  Khaled Ben Letaief,et al.  Cooperative Communications for Cognitive Radio Networks , 2009, Proceedings of the IEEE.