Securing cognitive radio networks against primary user emulation attacks

CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security is a very important but not well addressed issue in CR networks. In this article we focus on security problems arising from PUE attacks in CR networks. We present a comprehensive introduction to PUE attacks, from the attacking rationale and its impact on CR networks, to detection and defense approaches. In order to secure CR networks against PUE attacks, a two-level database-assisted detection approach is proposed to detect such attacks. Energy detection and location verification are combined for fast and reliable detection. An admission control based defense approach is proposed to mitigate the performance degradation of a CR network under a PUE attack. Illustrative results are presented to demonstrate the effectiveness of the proposed detection and defense approaches.

[1]  Zhongding Lei,et al.  IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.

[2]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[3]  Carlos A. Pomalaza-Raez,et al.  Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[4]  Santhanakrishnan Anand,et al.  Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks , 2012, IEEE Transactions on Communications.

[5]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[6]  James B. D. Joshi,et al.  Security in Dynamic Spectrum Access Systems: A Survey , 2009 .

[7]  Prasant Mohapatra,et al.  Hearing is believing: Detecting mobile primary user emulation attack in white space , 2011, 2011 Proceedings IEEE INFOCOM.

[8]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[9]  Santhanakrishnan Anand,et al.  Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.

[10]  Yuan Shi,et al.  Detecting Primary User Emulation Attack in Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[11]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.