Skip to main content

Research on Anti PUE Attack Based on CAF Spectrum and Repeated-Game

  • Conference paper
  • First Online:
  • 826 Accesses

Abstract

High imitation of primary user (PU) signal, primary user emulation (PUE) signal is difficulty for discrimination. First, a method based on cross ambiguity function (CAF) is proposed for determining PUE signal. For PUE signal different from PU signal in spatial but same in frequency in one sensing slot, the algorithm with two dimension search is reduced to one dimension search, having no inter-modulation signal influence. Moreover, for defending PUE attack (PUEA), a repeated game between malicious user (MU) and secondary user (SU) is formulated. By introducing credit discipline mechanism, the optimal strategies for both players are investigated. The stability of the strategies is analyzed with replicated dynamic equation, which indicates that the strategies are the final choice no matter what initial strategies they choose. Simulation results demonstrate that the method is effective for discriminating and defending PUEA in terms of lower computation, higher detection probability and greater payoff.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Mai, T.V., Molnar, J.A., Rudd, K.: Security vulnerabilities in physical layer of cognitive radio, pp. 1–4 (2011)

    Google Scholar 

  2. Baldini, G., Sturman, T., Biswas, A.R., Leschhorn, R.: Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Commun. Surv. Tutorials 14(2), 355–379 (2012)

    Article  Google Scholar 

  3. Soto, J., Queiroz, S., Nogueira, M.: Taxonomy, flexibility, and open issues on PUE attack defenses in cognitive radio networks. IEEE Wirel. Commun. 20(6), 59–65 (2013)

    Article  Google Scholar 

  4. Rizvi, S., Mitchell, J., Showan, N.: Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks, pp. 1–6 (2014)

    Google Scholar 

  5. Sharma, R.K., Rawat, D.B.: Advances on security threats and countermeasures for cognitive radio networks: a survey. IEEE Commun. Surv. Tutorials 17(2), 1023–1043 (2015)

    Article  Google Scholar 

  6. Naqvi, B., Rashid, I., Riaz, F., Aslam, B.: Primary user emulation attack and their mitigation strategies: a survey, pp. 95–100 (2013)

    Google Scholar 

  7. Blesa, J., Romero, E., Rozas, A., Araujo, A.: PUE attack detection in CWSNs using anomaly detection techniques. EURASIP J. Wirel. Commun. Netw. 1–13 (2013)

    Google Scholar 

  8. Jin, Z., Anand, S., Subbalakshmi, K.P.: Performance analysis of dynamic spectrum access networks under primary user emulation attacks, pp. 1–5 (2010)

    Google Scholar 

  9. Jin, Z., Anand, S., Subbalakshmi, K.P.: Impact of primary user emulation attacks on dynamic spectrum access networks. IEEE Trans. Commun. 60(9), 2635–2643 (2012)

    Article  Google Scholar 

  10. Zhang, C., Yu, R., Zhang, Y.: Performance analysis of primary user emulation attack in cognitive radio networks, pp. 371–376 (2012)

    Google Scholar 

  11. Chen, R., Park, J.M.: Ensuring trustworthy spectrum sensing in cognitive radio networks, pp. 110–119 (2006)

    Google Scholar 

  12. Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008)

    Article  Google Scholar 

  13. Jin, F., Varadharajan, V., Tupakula, U.: Improved detection of primary user emulation attacks in cognitive radio networks, pp. 274–279 (2015)

    Google Scholar 

  14. Pu, D., Wyglinski, A.M.: Primary user emulation detection using frequency domain action recognition, pp. 791–796 (2011)

    Google Scholar 

  15. Pu, D., Wyglinski, A.M.: Primary-user emulation detection using database-assisted frequency-domain action recognition. IEEE Trans. Veh. Technol. 63(9), 4372–4382 (2014)

    Article  Google Scholar 

  16. Xin, C., Song, M.: Detection of PUE attacks in cognitive radio networks based on signal activity pattern. IEEE Trans. Mob. Comput. 13(5), 1022–1034 (2014)

    Article  Google Scholar 

  17. Thomas, R.W., Komali, R.S., Borghetti, B.J., Mahonen, P.: A Bayesian game analysis of emulation attacks in dynamic spectrum access networks, pp. 1–11 (2010)

    Google Scholar 

  18. Thomas, R.W., Borghetti, B.J., Komali, R.S., Mahonen, P.: Understanding conditions that lead to emulation attacks in dynamic spectrum access. IEEE Commun. Mag. 49(3), 32–37 (2011)

    Article  Google Scholar 

  19. Hao, D., Sakurai, K.: A differential game approach to mitigating primary user emulation attacks in cognitive radio networks, pp. 495–502 (2012)

    Google Scholar 

  20. Tan, Y., Sengupta, S., Subbalakshmi, K.P.: Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach. IET Commun. 6(8), 964–973 (2012)

    Article  MathSciNet  Google Scholar 

  21. Nguyen-Thanh, N., Ciblat, P., Pham, A.T., Nguyen, V.T.: Surveillance strategies against primary user emulation attack in cognitive radio networks. IEEE Trans. Wirel. Commun. 14(9), 4981–4993 (2015)

    Article  Google Scholar 

  22. Chen, S., Zeng, K., Mohapatra, P.: Hearing is believing: detecting wireless microphone emulation attacks in white space. IEEE Trans. Mob. Comput. 12(3), 401–411 (2013)

    Article  Google Scholar 

Download references

Acknowledgment

This research was supported in part by the Science Foundation of Shaanxi Provincial Education Office (15JK1649).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chang, H., Li, Y. (2018). Research on Anti PUE Attack Based on CAF Spectrum and Repeated-Game. In: Li, B., Shu, L., Zeng, D. (eds) Communications and Networking. ChinaCom 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 237. Springer, Cham. https://doi.org/10.1007/978-3-319-78139-6_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78139-6_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78138-9

  • Online ISBN: 978-3-319-78139-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics