{"title":"认知无线网络中主用户仿真攻击研究综述","authors":"Ishu Gupta, O. P. Sahu","doi":"10.1109/ICCMC.2018.8487476","DOIUrl":null,"url":null,"abstract":"With the emerging new license-exempt wireless devices, the problem of spectrum scarcity has become a major concern. Cognitive Radio is a new technology that is widely studied nowadays to prevent the problem of spectrum shortage and its underutilization. The main task to implement this technology lies in sensing the available free spectrum. Most of the present research revolves around spectrum sensing in Cognitive radio Network (CRN). However, due to dynamic nature of Cognitive Radio technology, it suffers from various security threats. In this paper, one such attack named as Primary User Emulation Attack (PUEA) that degrades the performance of CRNs drastically is reviewed. Also, future scope and challenges are discussed.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"81 12","pages":"27-31"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Overview of Primary User Emulation Attack in Cognitive Radio Networks\",\"authors\":\"Ishu Gupta, O. P. Sahu\",\"doi\":\"10.1109/ICCMC.2018.8487476\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the emerging new license-exempt wireless devices, the problem of spectrum scarcity has become a major concern. Cognitive Radio is a new technology that is widely studied nowadays to prevent the problem of spectrum shortage and its underutilization. The main task to implement this technology lies in sensing the available free spectrum. Most of the present research revolves around spectrum sensing in Cognitive radio Network (CRN). However, due to dynamic nature of Cognitive Radio technology, it suffers from various security threats. In this paper, one such attack named as Primary User Emulation Attack (PUEA) that degrades the performance of CRNs drastically is reviewed. Also, future scope and challenges are discussed.\",\"PeriodicalId\":6604,\"journal\":{\"name\":\"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"81 12\",\"pages\":\"27-31\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC.2018.8487476\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2018.8487476","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Overview of Primary User Emulation Attack in Cognitive Radio Networks
With the emerging new license-exempt wireless devices, the problem of spectrum scarcity has become a major concern. Cognitive Radio is a new technology that is widely studied nowadays to prevent the problem of spectrum shortage and its underutilization. The main task to implement this technology lies in sensing the available free spectrum. Most of the present research revolves around spectrum sensing in Cognitive radio Network (CRN). However, due to dynamic nature of Cognitive Radio technology, it suffers from various security threats. In this paper, one such attack named as Primary User Emulation Attack (PUEA) that degrades the performance of CRNs drastically is reviewed. Also, future scope and challenges are discussed.