Abstract
High imitation of primary user (PU) signal, primary user emulation (PUE) signal is difficulty for discrimination. First, a method based on cross ambiguity function (CAF) is proposed for determining PUE signal. For PUE signal different from PU signal in spatial but same in frequency in one sensing slot, the algorithm with two dimension search is reduced to one dimension search, having no inter-modulation signal influence. Moreover, for defending PUE attack (PUEA), a repeated game between malicious user (MU) and secondary user (SU) is formulated. By introducing credit discipline mechanism, the optimal strategies for both players are investigated. The stability of the strategies is analyzed with replicated dynamic equation, which indicates that the strategies are the final choice no matter what initial strategies they choose. Simulation results demonstrate that the method is effective for discriminating and defending PUEA in terms of lower computation, higher detection probability and greater payoff.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Mai, T.V., Molnar, J.A., Rudd, K.: Security vulnerabilities in physical layer of cognitive radio, pp. 1–4 (2011)
Baldini, G., Sturman, T., Biswas, A.R., Leschhorn, R.: Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Commun. Surv. Tutorials 14(2), 355–379 (2012)
Soto, J., Queiroz, S., Nogueira, M.: Taxonomy, flexibility, and open issues on PUE attack defenses in cognitive radio networks. IEEE Wirel. Commun. 20(6), 59–65 (2013)
Rizvi, S., Mitchell, J., Showan, N.: Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks, pp. 1–6 (2014)
Sharma, R.K., Rawat, D.B.: Advances on security threats and countermeasures for cognitive radio networks: a survey. IEEE Commun. Surv. Tutorials 17(2), 1023–1043 (2015)
Naqvi, B., Rashid, I., Riaz, F., Aslam, B.: Primary user emulation attack and their mitigation strategies: a survey, pp. 95–100 (2013)
Blesa, J., Romero, E., Rozas, A., Araujo, A.: PUE attack detection in CWSNs using anomaly detection techniques. EURASIP J. Wirel. Commun. Netw. 1–13 (2013)
Jin, Z., Anand, S., Subbalakshmi, K.P.: Performance analysis of dynamic spectrum access networks under primary user emulation attacks, pp. 1–5 (2010)
Jin, Z., Anand, S., Subbalakshmi, K.P.: Impact of primary user emulation attacks on dynamic spectrum access networks. IEEE Trans. Commun. 60(9), 2635–2643 (2012)
Zhang, C., Yu, R., Zhang, Y.: Performance analysis of primary user emulation attack in cognitive radio networks, pp. 371–376 (2012)
Chen, R., Park, J.M.: Ensuring trustworthy spectrum sensing in cognitive radio networks, pp. 110–119 (2006)
Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008)
Jin, F., Varadharajan, V., Tupakula, U.: Improved detection of primary user emulation attacks in cognitive radio networks, pp. 274–279 (2015)
Pu, D., Wyglinski, A.M.: Primary user emulation detection using frequency domain action recognition, pp. 791–796 (2011)
Pu, D., Wyglinski, A.M.: Primary-user emulation detection using database-assisted frequency-domain action recognition. IEEE Trans. Veh. Technol. 63(9), 4372–4382 (2014)
Xin, C., Song, M.: Detection of PUE attacks in cognitive radio networks based on signal activity pattern. IEEE Trans. Mob. Comput. 13(5), 1022–1034 (2014)
Thomas, R.W., Komali, R.S., Borghetti, B.J., Mahonen, P.: A Bayesian game analysis of emulation attacks in dynamic spectrum access networks, pp. 1–11 (2010)
Thomas, R.W., Borghetti, B.J., Komali, R.S., Mahonen, P.: Understanding conditions that lead to emulation attacks in dynamic spectrum access. IEEE Commun. Mag. 49(3), 32–37 (2011)
Hao, D., Sakurai, K.: A differential game approach to mitigating primary user emulation attacks in cognitive radio networks, pp. 495–502 (2012)
Tan, Y., Sengupta, S., Subbalakshmi, K.P.: Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach. IET Commun. 6(8), 964–973 (2012)
Nguyen-Thanh, N., Ciblat, P., Pham, A.T., Nguyen, V.T.: Surveillance strategies against primary user emulation attack in cognitive radio networks. IEEE Trans. Wirel. Commun. 14(9), 4981–4993 (2015)
Chen, S., Zeng, K., Mohapatra, P.: Hearing is believing: detecting wireless microphone emulation attacks in white space. IEEE Trans. Mob. Comput. 12(3), 401–411 (2013)
Acknowledgment
This research was supported in part by the Science Foundation of Shaanxi Provincial Education Office (15JK1649).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chang, H., Li, Y. (2018). Research on Anti PUE Attack Based on CAF Spectrum and Repeated-Game. In: Li, B., Shu, L., Zeng, D. (eds) Communications and Networking. ChinaCom 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 237. Springer, Cham. https://doi.org/10.1007/978-3-319-78139-6_45
Download citation
DOI: https://doi.org/10.1007/978-3-319-78139-6_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78138-9
Online ISBN: 978-3-319-78139-6
eBook Packages: Computer ScienceComputer Science (R0)