Skip to main content

Cooperative Detection of PUE Attacks in CRNs

  • Chapter
  • First Online:
Cognitive Communication and Cooperative HetNet Coexistence

Abstract

Cognitive radio networks (CRNs) act as secondary users of the spectrum left unused by licensed services or primary users thus improving spectrum usage. However, the specific features of CRNs give rise to new security threats, such as the primary user emulation (PUE) attack, in which a malicious user impersonates a primary transmission to prevent the CRN from using a vacant band. With the aim of detecting such kind of attacks, in this chapter we describe a cooperative localization method specifically suited to CRNs. Localization is a powerful PUE-detection technique in several scenarios where the position of the primary users is well known, e.g. TV towers in IEEE 802.22 standard. Simulations results show the goodness of the proposed method and its suitability to typical CRN scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The term jamming is used for intentionally disruption of communications while the term interferences usually refers to unintentionally one.

References

  1. 802.22 WG: IEEE standard for information technology-telecommunications and information exchange between systems wireless regional area networks (wran)-specific requirements part 22: Cognitive wireless ran medium access control (mac) and physical layer (phy) specifications: Policies and procedures for operation in the tv bands. IEEE Std 802.22-2011 (2011). doi:10.1109/IEEESTD.2011.5951707

  2. Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of service resilience in ad hoc networks. In: MobiCom ’04: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, pp. 202–215. ACM, New York (2004). URL http://doi.acm.org/10.1145/1023720.1023741

  3. Afolabi, O., Kim, K., Ahmad, A.: On secure spectrum sensing in cognitive radio networks using emitters electromagnetic signature. In: Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th Internatonal Conference on, pp. 1–5. IEEE (2009)

    Google Scholar 

  4. Akyildiz, I.F., Lee, W.Y., Vuran, M.C., Mohanty, S.: Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Comput. Netw. 50(13), 2127–2159 (2006). URL http://dx.doi.org/10.1016/j.comnet.2006.05.001

    Google Scholar 

  5. Allman, M., Paxson, V., Stevens, W.: RFC 2581: TCP congestion, control (1999)

    Google Scholar 

  6. Buchwald, G., Kuffner, S., Ecklund, L., Brown, M., Callaway, E.: The design and operation of the ieee 802.22. 1 disabling beacon for the protection of tv whitespace incumbents. In: New Frontiers in Dynamic Spectrum Access Networks, 2008. DySPAN 2008. 3rd IEEE Symposium on, pp. 1–6. IEEE (2008)

    Google Scholar 

  7. Burbank, J.: Security in cognitive radio networks: the required evolution in approaches to wireless network security. In: 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), pp. 1–7 (2008). doi:10.1109/CROWNCOM.2008.4562536

  8. Cabric, D., Mishra, S., Brodersen, R.: Implementation issues in spectrum sensing for cognitive radios. In: Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, vol. 1, pp. 772–776 (2004). doi:10.1109/ACSSC.2004.1399240

  9. Chen, R., Park, J., Hou, Y., Reed, J.: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun. Mag. 46(4), 50–55 (2008)

    Article  Google Scholar 

  10. Chen, R., Park, J.M.: Ensuring trustworthy spectrum sensing in cognitive radio networks. In: 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR), pp. 110–119 (2006). doi:10.1109/SDR.2006.4286333

  11. Chen, R., Park, J.M., Reed, J.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008). doi:10.1109/JSAC.2008.080104

    Google Scholar 

  12. Chen, Z., Cooklev, T., Chen, C., Pomalaza-Raez, C.: Modeling primary user emulation attacks and defenses in cognitive radio networks. In: Performance Computing and Communications Conference (IPCCC), 2009 IEEE 28th International, pp. 208–215 (2009). doi:10.1109/PCCC.2009.5403815

  13. Clancy, T., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), pp. 1–8 (2008). doi:10.1109/CROWNCOM.2008.4562534

  14. Cordeiro, C., Challapali, K., Birru, D., Shankar Sai, N.: Ieee 802.22: an introduction to the first wireless standard based on cognitive radios. J. Commun. 1(1), 38–47 (2006)

    Article  Google Scholar 

  15. Douceur, J.R.: The sybil attack. In: IPTPS ’01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp. 251–260. Springer, London (2002)

    Google Scholar 

  16. Eksim, A., Kulac, S., Sazli, M.: Effective cooperative spectrum sensing in ieee 802.22 standard with time diversity. In: International Conference on Advances in Computational Tools for Engineering Applications, ACTEA’09, pp. 528–531 (2009). doi:10.1109/ACTEA.2009.5227849

  17. FCC: Federal Communications Commission. ET Docket No. 03–322. Notice of proposed rule making and order (2003)

    Google Scholar 

  18. Foy, W.: Position-location solutions by taylor-series estimation. IEEE Trans. Aerosp. Electron. Syst. AES-12(2), 187–194 (1976). doi:10.1109/TAES.1976.308294

    Google Scholar 

  19. Gezici, S., Tian, Z., Giannakis, G., Kobayashi, H., Molisch, A., Poor, H., Sahinoglu, Z.: Localization via ultra-wideband radios: a look at positioning aspects for future sensor networks. IEEE Signal Process. Mag. 22(4), 70–84 (2005). doi:10.1109/MSP.2005.1458289

    Google Scholar 

  20. Hernández-Serrano, J., León, O., Soriano, M.: Modeling the Lion attack in cognitive radio networks. EURASIP J. Wireless Commun. Netw. 2011, 633–652 (2010)

    Google Scholar 

  21. Jin, Z., Anand, S., Subbalakshmi, K.P.: Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing. SIGMOBILE Mob. Comput. Commun. Rev. 13(2), 74–85 (2009).URLhttp://doi.acm.org/10.1145/1621076.1621084

  22. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. (Sens. Netw. Protoc. Appl.) 1(2–3), 293–315 (2003). doi:10.1016/S1570-8705(03)00008-8

  23. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2), 293–315 (2003)

    Article  Google Scholar 

  24. León, O., Hernández Serrano, J., Soriano, M.: A new cross-layer attack to tcp in cognitive radio networks. In: Second International Workshop on Cross Layer Design (IWCLD), pp. 1–5 (2009). doi:10.1109/IWCLD.2009.5156526

  25. León, O., Hernández-Serrano, J., Soriano, M.: Securing cognitive radio networks. Int. J. Commun. Syst. 23(5), 633–652 (2010). doi:10.1002/dac.1102

    Google Scholar 

  26. León, O., Hernández-Serrano, J., Soriano, M.: Cooperative detection of primary user emulation attacks in crns. Comput. Netw. 56(14), 3374–3384 (2012)

    Google Scholar 

  27. Li, H., Han, Z.: Dogfight in spectrum: combating primary user emulation attacks in cognitive radio systems, part i: known channel statistics. IEEE Trans. Wireless Commun. 9(11), 3566–3577 (2010). doi:10.1109/TWC.2010.091510.100629

  28. Mathur, C.N., Subbalakshmi, K.P.: Security Issues in Cognitive Radio Networks. In: Mahmoud, Q.H. (ed.) Cognitive Networks: Towards Self-Aware Networks, pp. 284–293. John Wiley, Chichester (2007)

    Google Scholar 

  29. MATLAB: version 7.9 (r2009b) (2009). URL http://www.mathworks.com

  30. Min, A., Shin, K., Hu, X.: Secure cooperative sensing in ieee 802.22 wrans using shadow fading correlation. IEEE Trans. Mobile Comput. 10(10), 1434–1447 (2010)

    Google Scholar 

  31. Pandey, S., Agrawal, P.: A survey on localization techniques for wireless networks. Chin. Inst. Eng. 29(7), 1125 (2006)

    Article  Google Scholar 

  32. Patwari, N., Ash, J., Kyperountas, S., Hero A.O., I., Moses, R., Correal, N.: Locating the nodes: cooperative localization in wireless sensor networks. IEEE IEEE Signal Process. Mag. 22(4), 54–69 (2005). doi:10.1109/MSP.2005.1458287

  33. Patwari, N., Hero A.O., I., Perkins, M., Correal, N., O’Dea, R.: Relative location estimation in wireless sensor networks. IEEE Trans. Signal Process. 51(8), 2137–2148 (2003). doi:10.1109/TSP.2003.814469

  34. Rong, P., Sichitiu, M.: Angle of arrival localization for wireless sensor networks. In: Sensor and Ad Hoc Communications and Networks, 2006. SECON ’06. 2006 3rd Annual IEEE Communications Society on, vol. 1, pp. 374–382 (2006). doi:10.1109/SAHCN.2006.288442

  35. Zhang, Y., Xu, G., Geng, X.: Security threats in cognitive radio networks. In: High Performance Computing and Communications, 2008. HPCC ’08. 10th IEEE International Conference on, pp. 1036–1041 (2008). doi:10.1109/HPCC.2008.21

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Olga León .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

León, O., Hernández-Serrano, J., Soriano, M. (2014). Cooperative Detection of PUE Attacks in CRNs. In: Di Benedetto, MG., Bader, F. (eds) Cognitive Communication and Cooperative HetNet Coexistence. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-319-01402-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01402-9_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01401-2

  • Online ISBN: 978-3-319-01402-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics