{"title":"An Improved Cooperative Spectrum Sensing Scheme for Emulation Attacker Detection in Cognitive Radio Network","authors":"Momin Nadeem Awan, S. Haq, S. Anwar","doi":"10.1109/ICRAI57502.2023.10089590","DOIUrl":null,"url":null,"abstract":"Cognitive Radio (CR) network like other wireless networks is vulnerable to several attacks. The frequent attacks on CR Network includes Noise (the attacker is a network jammer), and Miss-Detection (lazy-SU, malicious-SU, Primary User Emulation Attacker (PUEA)). The PUEA is considered the most devastating among them since it includes a built-in sensing system. It continuously monitors the primary user's (PU) state and tries to obtain the whole spectrum when PU not utilizing it while sometimes it even tries to avail the spectrum in the presence of the PU. It imitates the PU and tricks the Sensing Nodes i.e., SUs. A mechanism of PU position monitoring employing the Time-of-Flight/Time-of-Arrival (ToF/ToA) method is suggested in this study effort. The simulation results indicate a significant improvement in the network throughput for the suggested location history technique compared to the traditional schemes.","PeriodicalId":447565,"journal":{"name":"2023 International Conference on Robotics and Automation in Industry (ICRAI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Robotics and Automation in Industry (ICRAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRAI57502.2023.10089590","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cognitive Radio (CR) network like other wireless networks is vulnerable to several attacks. The frequent attacks on CR Network includes Noise (the attacker is a network jammer), and Miss-Detection (lazy-SU, malicious-SU, Primary User Emulation Attacker (PUEA)). The PUEA is considered the most devastating among them since it includes a built-in sensing system. It continuously monitors the primary user's (PU) state and tries to obtain the whole spectrum when PU not utilizing it while sometimes it even tries to avail the spectrum in the presence of the PU. It imitates the PU and tricks the Sensing Nodes i.e., SUs. A mechanism of PU position monitoring employing the Time-of-Flight/Time-of-Arrival (ToF/ToA) method is suggested in this study effort. The simulation results indicate a significant improvement in the network throughput for the suggested location history technique compared to the traditional schemes.