{"title":"A complete algorithm to diagnose and alleviate the effects of physical layer attacks","authors":"Sasa Maric, Audri Biswas, S. Reisenfeld","doi":"10.1109/ICSIGSYS.2017.7967058","DOIUrl":null,"url":null,"abstract":"In this paper we present a method to diagnose and mitigate against primary user emulation attacks (PUEA) in cognitive radio networks. We develop a hybrid algorithm that uses a combination of compressed sensing and belief propagation to identify and combat PUEAs. We propose to use compressive sensing at the fusion centre to localise a primary user, then distribute the primary user location to secondary users in order to establish theoretical data for comparison and then use a variant of belief propagation at each secondary user to diagnose primary user emulation attacks. Using a central-distributed hybrid approach ensures that our algorithm is highly adaptive, accurate and simple to implement.","PeriodicalId":212068,"journal":{"name":"2017 International Conference on Signals and Systems (ICSigSys)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Signals and Systems (ICSigSys)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIGSYS.2017.7967058","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
In this paper we present a method to diagnose and mitigate against primary user emulation attacks (PUEA) in cognitive radio networks. We develop a hybrid algorithm that uses a combination of compressed sensing and belief propagation to identify and combat PUEAs. We propose to use compressive sensing at the fusion centre to localise a primary user, then distribute the primary user location to secondary users in order to establish theoretical data for comparison and then use a variant of belief propagation at each secondary user to diagnose primary user emulation attacks. Using a central-distributed hybrid approach ensures that our algorithm is highly adaptive, accurate and simple to implement.