{"title":"Detection of primary user emulation attacks in Cognitive Radio networks","authors":"M. Thanu","doi":"10.1109/CTS.2012.6261113","DOIUrl":null,"url":null,"abstract":"As the proliferation of wireless handheld devices such as smart phones and tablets grow exponentially, new technologies have to be adopted to efficiently use the radio frequency spectrum. Cognitive Radio(CR) network offers a promising solution to improve spectrum utilization and efficiency by harnessing the available spectrum resources in real-time. However, participants in the CR network can comprise of malicious adversaries who adopt dishonest and non-cooperative strategies to attack the network. In our research, we focus on a critical attack on the CR network: Primary User Emulation (PUE). In a PUE attack, the malicious adversary violates spectrum sharing etiquette by impersonating the primary user at the expense of other unselfish secondary users. To thwart such an attack, we present a strategy to authenticate the primary user, which involves collaborative learning among CR users.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Collaboration Technologies and Systems (CTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CTS.2012.6261113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
As the proliferation of wireless handheld devices such as smart phones and tablets grow exponentially, new technologies have to be adopted to efficiently use the radio frequency spectrum. Cognitive Radio(CR) network offers a promising solution to improve spectrum utilization and efficiency by harnessing the available spectrum resources in real-time. However, participants in the CR network can comprise of malicious adversaries who adopt dishonest and non-cooperative strategies to attack the network. In our research, we focus on a critical attack on the CR network: Primary User Emulation (PUE). In a PUE attack, the malicious adversary violates spectrum sharing etiquette by impersonating the primary user at the expense of other unselfish secondary users. To thwart such an attack, we present a strategy to authenticate the primary user, which involves collaborative learning among CR users.