Skip to main content

An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks

  • Conference paper
  • First Online:
Security and Privacy in Communication Networks (SecureComm 2018)

Abstract

The proliferation of advanced information technologies (IT), especially the wide spread of Internet of Things (IoTs) makes wireless spectrum a precious resource. Cognitive radio network (CRN) has been recognized as the key to achieve efficient utility of communication bands. Because of the great difficulty, high complexity and regulations in dynamic spectrum access (DSA), it is very challenging to protect CRNs from malicious attackers or selfish abusers. Primary user emulation (PUE) attacks is one type of easy-to-launch but hard-to-detect attacks in CRNs that malicious entities mimic PU signals in order to either occupy spectrum resource selfishly or conduct Denial of Service (DoS) attacks. Inspired by the physical features widely used as the fingerprint of variant electronic devices, an adaptive and realistic PUE attack detection technique is proposed in this paper. It leverages the PU transmission features that attackers are not able to mimic. In this work, the transmission power is selected as one of the hard-to-mimic features due to the intrinsic discrepancy between PUs and attackers, while considering constraints in real implementations. Our experimental results verified the effectiveness and correctness of the proposed mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Federal Communications Commission: Facilitating opportunities for flexible, efficient, and reliable spectrum use employing spectrum agile radio technologies. Et et docket (03–108) edn, December 2003

    Google Scholar 

  2. Federal Communications Commission: Enabling innovative small cell use in 3.5 GHz band NPRM & order, December 2012

    Google Scholar 

  3. Adelantado, F., Verikoukis, C.: Detection of malicious users in cognitive radio ad hoc networks: a non-parametric statistical approach. Ad Hoc Netw. 11, 2367–2380 (2013)

    Article  Google Scholar 

  4. Baker, M.A.: Introductory remarks: panel on the future of radio technology. Technical report, Federal Communications Commission (2010)

    Google Scholar 

  5. Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. ACM (2008)

    Google Scholar 

  6. Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008)

    Article  Google Scholar 

  7. Chen, Z., Cooklev, T., Chen, C., Pomalaza-Ráez, C.: Modeling primary user emulation attacks and defenses in cognitive radio networks. In: 2009 IEEE 28th International Performance Computing and Communications Conference (IPCCC), pp. 208–215. IEEE (2009)

    Google Scholar 

  8. Das, D., Das, S.: Primary user emulation attack in cognitive radio networks: a survey. IRACST-Int. J. Comput. Netw. Wirel. Commun. 3(3), 312–318 (2013)

    Google Scholar 

  9. Dong, Q., Yang, Z., Chen, Y., Li, X., Zeng, K.: Anomaly detection in cognitive radio networks exploiting singular spectrum analysis. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-ACNS 2017. LNCS, vol. 10446, pp. 247–259. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65127-9_20

    Chapter  Google Scholar 

  10. Dong, Q., Yang, Z., Chen, Y., Li, X., Zeng, K.: Exploration of singular spectrum analysis for online anomaly detection in CRNs. EAI Endorsed Trans. Secur. Saf. 4(12), e3 (2017)

    Google Scholar 

  11. Feng, X., Zhang, J., Zhang, Q.: Database-assisted multi-AP network on TV white spaces: architecture, spectrum allocation and AP discovery. In: 2011 IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), pp. 265–276. IEEE (2011)

    Google Scholar 

  12. Goldsmith, A.: Wireless Communications. Cambridge University Press, Cambridge (2005)

    Book  Google Scholar 

  13. Huang, L., Xie, L., Yu, H., Wang, W., Yao, Y.: Anti-PUE attack based on joint position verification in cognitive radio networks, vol. 2. IEEE (2010)

    Google Scholar 

  14. Kawalec, A., Owczarek, R.: Specific emitter identification using intrapulse data. In: Radar Conference, 2004. EURAD. First European, pp. 249–252. IEEE (2004)

    Google Scholar 

  15. Langley, L.E.: Specific emitter identification (SEI) and classical parameter fusion technology. In: WESCON/1993. Conference Record, pp. 377–381. IEEE (1993). 0780399706

    Google Scholar 

  16. Liu, Y., Ning, P., Dai, H.: Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures, pp. 286–301. IEEE (2010)

    Google Scholar 

  17. Marinho, J., Granjal, J., Monteiro, E.: A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP J. Inf. Secur. 2015(1), 4 (2015). ISSN 1687-417X

    Article  Google Scholar 

  18. Murty, R., Chandra, R., Moscibroda, T., Bahl, P.V.: Senseless: a database-driven white spaces network. IEEE Trans. Mob. Comput. 11, 189–203 (2012)

    Article  Google Scholar 

  19. Paisana, F., Marchetti, N., DaSilva, L.A.: Radar, TV and cellular bands: which spectrum access techniques for which bands? IEEE Commun. Surv. Tutor. 16(3), 1193–1220 (2014)

    Article  Google Scholar 

  20. Peng, K., Zeng, F., Zeng, Q.: A new method to detect primary user emulation attacks in cognitive radio networks. In: International Conference on Computer Science and Service System (CSSS 2014) (2014)

    Google Scholar 

  21. Pesko, M., Javornik, T., Kosir, A., Stular, M., Mohorcic, M.: Radio environment maps: the survey of construction methods. TIIS 8(11), 3789–3809 (2014)

    Google Scholar 

  22. Rasmussen, K.B., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp. 331–340. IEEE (2007)

    Google Scholar 

  23. Roos, T., Myllymaki, P., Tirri, H.: A statistical modeling approach to location estimation. IEEE Trans. Mob. Comput. 99(1), 59–69 (2002)

    Article  Google Scholar 

  24. Yilmaz, H.B., Tugcu, T., Alagoz, F., Bayhan, S.: Radio environment map as enabler for practical cognitive radio networks. IEEE Commun. Mag. 51(12), 162–169 (2013)

    Article  Google Scholar 

  25. Zhang, X., Jia, Q., Guo, L.: Secure and optimized unauthorized secondary user detection in dynamic spectrum access. In: IEEE Conference on Communications and Network Security (CNS), pp. 1–9, October 2017

    Google Scholar 

Download references

Acknowledgement

Q. Dong, Y. Chen and X. Li are supported by the NSF via grant CNS-1443885. K. Zeng is partially supported by the NSF under grant No. CNS-1502584 and CNS-1464487.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qi Dong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dong, Q., Chen, Y., Li, X., Zeng, K., Zimmermann, R. (2018). An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds) Security and Privacy in Communication Networks. SecureComm 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 254. Springer, Cham. https://doi.org/10.1007/978-3-030-01701-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01701-9_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01700-2

  • Online ISBN: 978-3-030-01701-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics