Analysis of Primary Emulsion Attack in Cognitive Radio Using Distributed On-Demand Routing Protocol

  • Neelaveni Rangaraj
  • Sridevi Balu
Conference paper


The aim of this chapter is to design a novel framework for cognitive radio to overcome the security-based challenge by considering authentication and confidentiality. Particularly, the chapter focuses on the primary emulation attack, as it gives the authentication for the unlicensed user to use the unused the spectrum. These unlicensed users are considered as the secondary users and to authorize to use the spectrum only for the required period without compromising the security of the primary user. The distributed on-demand routing protocol is used in cognitive radio, and hence it can be used for the group of users sharing the same spectrum. RSA with the distributed on-demand routing protocol yields a secure key for sharing that particular session within the users. A comparison between the classical protocols for generating the secret key with Diffie–Hellman algorithm and other protocols is also done in this work by analyzing their vulnerabilities.


Distributed on-demand RSA algorithm Authentication Spectrum sharing 





Cognitive Base Station


Cognitive Radio


Credit Risk Value


Cognitive Sensing


Distributed On-Demand Routing Protocol


Destination Sequenced Distance Vector


Primary User


Primary User Emulsion


Rivest Shamir and Adleman (Public Key Encryption Technology)


Zone routing protocol


  1. 1.
    Gupta M, Jain A, Soni A (2016) A survey: render of PUE attack in cognitive radio compressed by software defined radio. IEEE, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp 4029–4034,Google Scholar
  2. 2.
    Priyadharshini RA, Haimavathi KU (2016) Detection of attacks and Countermeasures in cognitive radio network. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp 1102–1106Google Scholar
  3. 3.
    Chakravarthy R, Huang K, Zhang L, Wu Z (2017) Primary user authentication of cognitive radio network using underlay waveform. Cognitive communications for aerospace applications workshop, pp 1–5Google Scholar
  4. 4.
    Wang CL, Chen HW, Tsai ZY (2012) Throughput maximization for cognitive radio networks with wideband spectrum sensing. IEEE wireless communications and networking conference, pp 1293–1298Google Scholar
  5. 5.
    Vizvari S, Berangi R, Nematollahi K (2016) Authentication and authorizing scheme based on UMTS AKA protocol for cognitive radio network. IEEE KBEI, pp 118–123Google Scholar
  6. 6.
    Zheng J, Chen C-H, Cheng J-y, Shi L (2009) Cognitive radio: methods for the detection of free bands. IEEE Int Conf Netw Secur Wireless Commun Trust Comput 2:343–345Google Scholar
  7. 7.
    Gope J, Dutta P, Bhadra S, Das S, Jana S, Dalmia N, Choudhury S (2017) Analytical study of primary user emulsion attack detection techniques in cognitive radio ad hoc network. IEEE 8th annual ubiquitous computing, electronics and Mobile communication conference (UEMCON), October, pp 392–395Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Neelaveni Rangaraj
    • 1
  • Sridevi Balu
    • 2
  1. 1.MNM Jain Engineering collegeChennaiIndia
  2. 2.Velammal Institute of TechnologyChennaiIndia

Personalised recommendations