Abstract
Cognitive radio networks (CRNs) act as secondary users of the spectrum left unused by licensed services or primary users thus improving spectrum usage. However, the specific features of CRNs give rise to new security threats, such as the primary user emulation (PUE) attack, in which a malicious user impersonates a primary transmission to prevent the CRN from using a vacant band. With the aim of detecting such kind of attacks, in this chapter we describe a cooperative localization method specifically suited to CRNs. Localization is a powerful PUE-detection technique in several scenarios where the position of the primary users is well known, e.g. TV towers in IEEE 802.22 standard. Simulations results show the goodness of the proposed method and its suitability to typical CRN scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The term jamming is used for intentionally disruption of communications while the term interferences usually refers to unintentionally one.
References
802.22 WG: IEEE standard for information technology-telecommunications and information exchange between systems wireless regional area networks (wran)-specific requirements part 22: Cognitive wireless ran medium access control (mac) and physical layer (phy) specifications: Policies and procedures for operation in the tv bands. IEEE Std 802.22-2011 (2011). doi:10.1109/IEEESTD.2011.5951707
Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of service resilience in ad hoc networks. In: MobiCom ’04: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, pp. 202–215. ACM, New York (2004). URL http://doi.acm.org/10.1145/1023720.1023741
Afolabi, O., Kim, K., Ahmad, A.: On secure spectrum sensing in cognitive radio networks using emitters electromagnetic signature. In: Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th Internatonal Conference on, pp. 1–5. IEEE (2009)
Akyildiz, I.F., Lee, W.Y., Vuran, M.C., Mohanty, S.: Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Comput. Netw. 50(13), 2127–2159 (2006). URL http://dx.doi.org/10.1016/j.comnet.2006.05.001
Allman, M., Paxson, V., Stevens, W.: RFC 2581: TCP congestion, control (1999)
Buchwald, G., Kuffner, S., Ecklund, L., Brown, M., Callaway, E.: The design and operation of the ieee 802.22. 1 disabling beacon for the protection of tv whitespace incumbents. In: New Frontiers in Dynamic Spectrum Access Networks, 2008. DySPAN 2008. 3rd IEEE Symposium on, pp. 1–6. IEEE (2008)
Burbank, J.: Security in cognitive radio networks: the required evolution in approaches to wireless network security. In: 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), pp. 1–7 (2008). doi:10.1109/CROWNCOM.2008.4562536
Cabric, D., Mishra, S., Brodersen, R.: Implementation issues in spectrum sensing for cognitive radios. In: Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, vol. 1, pp. 772–776 (2004). doi:10.1109/ACSSC.2004.1399240
Chen, R., Park, J., Hou, Y., Reed, J.: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun. Mag. 46(4), 50–55 (2008)
Chen, R., Park, J.M.: Ensuring trustworthy spectrum sensing in cognitive radio networks. In: 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR), pp. 110–119 (2006). doi:10.1109/SDR.2006.4286333
Chen, R., Park, J.M., Reed, J.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008). doi:10.1109/JSAC.2008.080104
Chen, Z., Cooklev, T., Chen, C., Pomalaza-Raez, C.: Modeling primary user emulation attacks and defenses in cognitive radio networks. In: Performance Computing and Communications Conference (IPCCC), 2009 IEEE 28th International, pp. 208–215 (2009). doi:10.1109/PCCC.2009.5403815
Clancy, T., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), pp. 1–8 (2008). doi:10.1109/CROWNCOM.2008.4562534
Cordeiro, C., Challapali, K., Birru, D., Shankar Sai, N.: Ieee 802.22: an introduction to the first wireless standard based on cognitive radios. J. Commun. 1(1), 38–47 (2006)
Douceur, J.R.: The sybil attack. In: IPTPS ’01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp. 251–260. Springer, London (2002)
Eksim, A., Kulac, S., Sazli, M.: Effective cooperative spectrum sensing in ieee 802.22 standard with time diversity. In: International Conference on Advances in Computational Tools for Engineering Applications, ACTEA’09, pp. 528–531 (2009). doi:10.1109/ACTEA.2009.5227849
FCC: Federal Communications Commission. ET Docket No. 03–322. Notice of proposed rule making and order (2003)
Foy, W.: Position-location solutions by taylor-series estimation. IEEE Trans. Aerosp. Electron. Syst. AES-12(2), 187–194 (1976). doi:10.1109/TAES.1976.308294
Gezici, S., Tian, Z., Giannakis, G., Kobayashi, H., Molisch, A., Poor, H., Sahinoglu, Z.: Localization via ultra-wideband radios: a look at positioning aspects for future sensor networks. IEEE Signal Process. Mag. 22(4), 70–84 (2005). doi:10.1109/MSP.2005.1458289
Hernández-Serrano, J., León, O., Soriano, M.: Modeling the Lion attack in cognitive radio networks. EURASIP J. Wireless Commun. Netw. 2011, 633–652 (2010)
Jin, Z., Anand, S., Subbalakshmi, K.P.: Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing. SIGMOBILE Mob. Comput. Commun. Rev. 13(2), 74–85 (2009).URLhttp://doi.acm.org/10.1145/1621076.1621084
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. (Sens. Netw. Protoc. Appl.) 1(2–3), 293–315 (2003). doi:10.1016/S1570-8705(03)00008-8
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2), 293–315 (2003)
León, O., Hernández Serrano, J., Soriano, M.: A new cross-layer attack to tcp in cognitive radio networks. In: Second International Workshop on Cross Layer Design (IWCLD), pp. 1–5 (2009). doi:10.1109/IWCLD.2009.5156526
León, O., Hernández-Serrano, J., Soriano, M.: Securing cognitive radio networks. Int. J. Commun. Syst. 23(5), 633–652 (2010). doi:10.1002/dac.1102
León, O., Hernández-Serrano, J., Soriano, M.: Cooperative detection of primary user emulation attacks in crns. Comput. Netw. 56(14), 3374–3384 (2012)
Li, H., Han, Z.: Dogfight in spectrum: combating primary user emulation attacks in cognitive radio systems, part i: known channel statistics. IEEE Trans. Wireless Commun. 9(11), 3566–3577 (2010). doi:10.1109/TWC.2010.091510.100629
Mathur, C.N., Subbalakshmi, K.P.: Security Issues in Cognitive Radio Networks. In: Mahmoud, Q.H. (ed.) Cognitive Networks: Towards Self-Aware Networks, pp. 284–293. John Wiley, Chichester (2007)
MATLAB: version 7.9 (r2009b) (2009). URL http://www.mathworks.com
Min, A., Shin, K., Hu, X.: Secure cooperative sensing in ieee 802.22 wrans using shadow fading correlation. IEEE Trans. Mobile Comput. 10(10), 1434–1447 (2010)
Pandey, S., Agrawal, P.: A survey on localization techniques for wireless networks. Chin. Inst. Eng. 29(7), 1125 (2006)
Patwari, N., Ash, J., Kyperountas, S., Hero A.O., I., Moses, R., Correal, N.: Locating the nodes: cooperative localization in wireless sensor networks. IEEE IEEE Signal Process. Mag. 22(4), 54–69 (2005). doi:10.1109/MSP.2005.1458287
Patwari, N., Hero A.O., I., Perkins, M., Correal, N., O’Dea, R.: Relative location estimation in wireless sensor networks. IEEE Trans. Signal Process. 51(8), 2137–2148 (2003). doi:10.1109/TSP.2003.814469
Rong, P., Sichitiu, M.: Angle of arrival localization for wireless sensor networks. In: Sensor and Ad Hoc Communications and Networks, 2006. SECON ’06. 2006 3rd Annual IEEE Communications Society on, vol. 1, pp. 374–382 (2006). doi:10.1109/SAHCN.2006.288442
Zhang, Y., Xu, G., Geng, X.: Security threats in cognitive radio networks. In: High Performance Computing and Communications, 2008. HPCC ’08. 10th IEEE International Conference on, pp. 1036–1041 (2008). doi:10.1109/HPCC.2008.21
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
León, O., Hernández-Serrano, J., Soriano, M. (2014). Cooperative Detection of PUE Attacks in CRNs. In: Di Benedetto, MG., Bader, F. (eds) Cognitive Communication and Cooperative HetNet Coexistence. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-319-01402-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-01402-9_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01401-2
Online ISBN: 978-3-319-01402-9
eBook Packages: EngineeringEngineering (R0)