Research on Anti PUE Attack Based on CAF Spectrum and Repeated-Game

  • Hong Chang
  • Yong Li
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 237)


High imitation of primary user (PU) signal, primary user emulation (PUE) signal is difficulty for discrimination. First, a method based on cross ambiguity function (CAF) is proposed for determining PUE signal. For PUE signal different from PU signal in spatial but same in frequency in one sensing slot, the algorithm with two dimension search is reduced to one dimension search, having no inter-modulation signal influence. Moreover, for defending PUE attack (PUEA), a repeated game between malicious user (MU) and secondary user (SU) is formulated. By introducing credit discipline mechanism, the optimal strategies for both players are investigated. The stability of the strategies is analyzed with replicated dynamic equation, which indicates that the strategies are the final choice no matter what initial strategies they choose. Simulation results demonstrate that the method is effective for discriminating and defending PUEA in terms of lower computation, higher detection probability and greater payoff.


PUE attack Cross ambiguity function Repeated game Credit discipline mechanism Replicated dynamic equation 



This research was supported in part by the Science Foundation of Shaanxi Provincial Education Office (15JK1649).


  1. 1.
    Mai, T.V., Molnar, J.A., Rudd, K.: Security vulnerabilities in physical layer of cognitive radio, pp. 1–4 (2011)Google Scholar
  2. 2.
    Baldini, G., Sturman, T., Biswas, A.R., Leschhorn, R.: Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Commun. Surv. Tutorials 14(2), 355–379 (2012)CrossRefGoogle Scholar
  3. 3.
    Soto, J., Queiroz, S., Nogueira, M.: Taxonomy, flexibility, and open issues on PUE attack defenses in cognitive radio networks. IEEE Wirel. Commun. 20(6), 59–65 (2013)CrossRefGoogle Scholar
  4. 4.
    Rizvi, S., Mitchell, J., Showan, N.: Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks, pp. 1–6 (2014)Google Scholar
  5. 5.
    Sharma, R.K., Rawat, D.B.: Advances on security threats and countermeasures for cognitive radio networks: a survey. IEEE Commun. Surv. Tutorials 17(2), 1023–1043 (2015)CrossRefGoogle Scholar
  6. 6.
    Naqvi, B., Rashid, I., Riaz, F., Aslam, B.: Primary user emulation attack and their mitigation strategies: a survey, pp. 95–100 (2013)Google Scholar
  7. 7.
    Blesa, J., Romero, E., Rozas, A., Araujo, A.: PUE attack detection in CWSNs using anomaly detection techniques. EURASIP J. Wirel. Commun. Netw. 1–13 (2013)Google Scholar
  8. 8.
    Jin, Z., Anand, S., Subbalakshmi, K.P.: Performance analysis of dynamic spectrum access networks under primary user emulation attacks, pp. 1–5 (2010)Google Scholar
  9. 9.
    Jin, Z., Anand, S., Subbalakshmi, K.P.: Impact of primary user emulation attacks on dynamic spectrum access networks. IEEE Trans. Commun. 60(9), 2635–2643 (2012)CrossRefGoogle Scholar
  10. 10.
    Zhang, C., Yu, R., Zhang, Y.: Performance analysis of primary user emulation attack in cognitive radio networks, pp. 371–376 (2012)Google Scholar
  11. 11.
    Chen, R., Park, J.M.: Ensuring trustworthy spectrum sensing in cognitive radio networks, pp. 110–119 (2006)Google Scholar
  12. 12.
    Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008)CrossRefGoogle Scholar
  13. 13.
    Jin, F., Varadharajan, V., Tupakula, U.: Improved detection of primary user emulation attacks in cognitive radio networks, pp. 274–279 (2015)Google Scholar
  14. 14.
    Pu, D., Wyglinski, A.M.: Primary user emulation detection using frequency domain action recognition, pp. 791–796 (2011)Google Scholar
  15. 15.
    Pu, D., Wyglinski, A.M.: Primary-user emulation detection using database-assisted frequency-domain action recognition. IEEE Trans. Veh. Technol. 63(9), 4372–4382 (2014)CrossRefGoogle Scholar
  16. 16.
    Xin, C., Song, M.: Detection of PUE attacks in cognitive radio networks based on signal activity pattern. IEEE Trans. Mob. Comput. 13(5), 1022–1034 (2014)CrossRefGoogle Scholar
  17. 17.
    Thomas, R.W., Komali, R.S., Borghetti, B.J., Mahonen, P.: A Bayesian game analysis of emulation attacks in dynamic spectrum access networks, pp. 1–11 (2010)Google Scholar
  18. 18.
    Thomas, R.W., Borghetti, B.J., Komali, R.S., Mahonen, P.: Understanding conditions that lead to emulation attacks in dynamic spectrum access. IEEE Commun. Mag. 49(3), 32–37 (2011)CrossRefGoogle Scholar
  19. 19.
    Hao, D., Sakurai, K.: A differential game approach to mitigating primary user emulation attacks in cognitive radio networks, pp. 495–502 (2012)Google Scholar
  20. 20.
    Tan, Y., Sengupta, S., Subbalakshmi, K.P.: Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach. IET Commun. 6(8), 964–973 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  21. 21.
    Nguyen-Thanh, N., Ciblat, P., Pham, A.T., Nguyen, V.T.: Surveillance strategies against primary user emulation attack in cognitive radio networks. IEEE Trans. Wirel. Commun. 14(9), 4981–4993 (2015)CrossRefGoogle Scholar
  22. 22.
    Chen, S., Zeng, K., Mohapatra, P.: Hearing is believing: detecting wireless microphone emulation attacks in white space. IEEE Trans. Mob. Comput. 12(3), 401–411 (2013)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  1. 1.Department of Communication EngineeringXi’an University of Posts and TelecommunicationsXi’anChina
  2. 2.School of Electronics and InformationNorthwestern Polytechnical UniversityXi’anChina

Personalised recommendations