Research on Anti PUE Attack Based on CAF Spectrum and Repeated-Game
High imitation of primary user (PU) signal, primary user emulation (PUE) signal is difficulty for discrimination. First, a method based on cross ambiguity function (CAF) is proposed for determining PUE signal. For PUE signal different from PU signal in spatial but same in frequency in one sensing slot, the algorithm with two dimension search is reduced to one dimension search, having no inter-modulation signal influence. Moreover, for defending PUE attack (PUEA), a repeated game between malicious user (MU) and secondary user (SU) is formulated. By introducing credit discipline mechanism, the optimal strategies for both players are investigated. The stability of the strategies is analyzed with replicated dynamic equation, which indicates that the strategies are the final choice no matter what initial strategies they choose. Simulation results demonstrate that the method is effective for discriminating and defending PUEA in terms of lower computation, higher detection probability and greater payoff.
KeywordsPUE attack Cross ambiguity function Repeated game Credit discipline mechanism Replicated dynamic equation
This research was supported in part by the Science Foundation of Shaanxi Provincial Education Office (15JK1649).
- 1.Mai, T.V., Molnar, J.A., Rudd, K.: Security vulnerabilities in physical layer of cognitive radio, pp. 1–4 (2011)Google Scholar
- 4.Rizvi, S., Mitchell, J., Showan, N.: Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks, pp. 1–6 (2014)Google Scholar
- 6.Naqvi, B., Rashid, I., Riaz, F., Aslam, B.: Primary user emulation attack and their mitigation strategies: a survey, pp. 95–100 (2013)Google Scholar
- 7.Blesa, J., Romero, E., Rozas, A., Araujo, A.: PUE attack detection in CWSNs using anomaly detection techniques. EURASIP J. Wirel. Commun. Netw. 1–13 (2013)Google Scholar
- 8.Jin, Z., Anand, S., Subbalakshmi, K.P.: Performance analysis of dynamic spectrum access networks under primary user emulation attacks, pp. 1–5 (2010)Google Scholar
- 10.Zhang, C., Yu, R., Zhang, Y.: Performance analysis of primary user emulation attack in cognitive radio networks, pp. 371–376 (2012)Google Scholar
- 11.Chen, R., Park, J.M.: Ensuring trustworthy spectrum sensing in cognitive radio networks, pp. 110–119 (2006)Google Scholar
- 13.Jin, F., Varadharajan, V., Tupakula, U.: Improved detection of primary user emulation attacks in cognitive radio networks, pp. 274–279 (2015)Google Scholar
- 14.Pu, D., Wyglinski, A.M.: Primary user emulation detection using frequency domain action recognition, pp. 791–796 (2011)Google Scholar
- 17.Thomas, R.W., Komali, R.S., Borghetti, B.J., Mahonen, P.: A Bayesian game analysis of emulation attacks in dynamic spectrum access networks, pp. 1–11 (2010)Google Scholar
- 19.Hao, D., Sakurai, K.: A differential game approach to mitigating primary user emulation attacks in cognitive radio networks, pp. 495–502 (2012)Google Scholar