认知无线电网络中主用户仿真攻击的检测

M. Thanu
{"title":"认知无线电网络中主用户仿真攻击的检测","authors":"M. Thanu","doi":"10.1109/CTS.2012.6261113","DOIUrl":null,"url":null,"abstract":"As the proliferation of wireless handheld devices such as smart phones and tablets grow exponentially, new technologies have to be adopted to efficiently use the radio frequency spectrum. Cognitive Radio(CR) network offers a promising solution to improve spectrum utilization and efficiency by harnessing the available spectrum resources in real-time. However, participants in the CR network can comprise of malicious adversaries who adopt dishonest and non-cooperative strategies to attack the network. In our research, we focus on a critical attack on the CR network: Primary User Emulation (PUE). In a PUE attack, the malicious adversary violates spectrum sharing etiquette by impersonating the primary user at the expense of other unselfish secondary users. To thwart such an attack, we present a strategy to authenticate the primary user, which involves collaborative learning among CR users.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Detection of primary user emulation attacks in Cognitive Radio networks\",\"authors\":\"M. Thanu\",\"doi\":\"10.1109/CTS.2012.6261113\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the proliferation of wireless handheld devices such as smart phones and tablets grow exponentially, new technologies have to be adopted to efficiently use the radio frequency spectrum. Cognitive Radio(CR) network offers a promising solution to improve spectrum utilization and efficiency by harnessing the available spectrum resources in real-time. However, participants in the CR network can comprise of malicious adversaries who adopt dishonest and non-cooperative strategies to attack the network. In our research, we focus on a critical attack on the CR network: Primary User Emulation (PUE). In a PUE attack, the malicious adversary violates spectrum sharing etiquette by impersonating the primary user at the expense of other unselfish secondary users. To thwart such an attack, we present a strategy to authenticate the primary user, which involves collaborative learning among CR users.\",\"PeriodicalId\":200122,\"journal\":{\"name\":\"2012 International Conference on Collaboration Technologies and Systems (CTS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-05-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Collaboration Technologies and Systems (CTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CTS.2012.6261113\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Collaboration Technologies and Systems (CTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CTS.2012.6261113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

随着智能手机和平板电脑等无线手持设备的激增,必须采用新技术来有效地利用无线电频谱。认知无线电(CR)网络通过实时利用可用的频谱资源,为提高频谱利用率和效率提供了一种很有前景的解决方案。然而,CR网络中的参与者可能包括恶意的对手,他们采用不诚实和非合作的策略来攻击网络。在我们的研究中,我们重点研究了CR网络上的一种关键攻击:主用户仿真(PUE)。在PUE攻击中,恶意攻击者通过冒充主用户,以牺牲其他无私的辅助用户为代价,违反频谱共享礼仪。为了阻止这种攻击,我们提出了一种验证主用户的策略,该策略涉及CR用户之间的协作学习。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Detection of primary user emulation attacks in Cognitive Radio networks
As the proliferation of wireless handheld devices such as smart phones and tablets grow exponentially, new technologies have to be adopted to efficiently use the radio frequency spectrum. Cognitive Radio(CR) network offers a promising solution to improve spectrum utilization and efficiency by harnessing the available spectrum resources in real-time. However, participants in the CR network can comprise of malicious adversaries who adopt dishonest and non-cooperative strategies to attack the network. In our research, we focus on a critical attack on the CR network: Primary User Emulation (PUE). In a PUE attack, the malicious adversary violates spectrum sharing etiquette by impersonating the primary user at the expense of other unselfish secondary users. To thwart such an attack, we present a strategy to authenticate the primary user, which involves collaborative learning among CR users.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信