Base Station Controlled Spectrum Allocation Technique to Detect the PUE Attack in CWSN

  • Pinaki Sankar Chatterjee
  • Monideepa Roy
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 31)


Primary User Emulation (PUE) attack is a type of Denial-of-Service (DoS) attack which is commonly faced by Cognitive Wireless Sensor Networks (CWSNs). In CWSNs, malicious secondary users try to emulate primary users to maximize their own spectrum usage or to obstruct secondary users from accessing the spectrum. In this paper we have proposed a base station controlled spectrum allocation protocol for the secondary users to deal with PUE attacks in CWSNs. We have used the well-known lightweight hash function SHA-1 for the authentication process of a secondary user to the base station. We demonstrate that our authentication protocol can be implemented efficiently on CWSN nodes. Our experimental results show that the Base Station controlled Primary User Emulation Attack performs well in CWSN scenario.


Cognitive wireless sensor network Hash function Authentication PUE Dos 


  1. 1.
    Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23(2), 201–220 (2005)CrossRefGoogle Scholar
  2. 2.
    Mitola, J.: Cognitive radio: an integrated agent architecture for software defined radio, Ph.D. Dissertation, Royal Institute of Technology (KTH), Stockholm, Sweden (June 2000)Google Scholar
  3. 3.
    Blesa, J., Romero, E., Rozas, A., Araujo, A.: PUE attack detection in CWSNs using anomaly detection techniques. Proc. EURASIP J. Wirel. Commun. Netw. 2013(1), 1–13 (2013)CrossRefGoogle Scholar
  4. 4.
    Chen, R., Park, J.-M.: Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks. In: Proceedings of the 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR’06), pp. 110–119 (2006) Google Scholar
  5. 5.
    Anand, S., Jin, Z., Subbalakshmi, K.P.: An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks. In: proceedings of 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, pp. 1–6 (2008)Google Scholar
  6. 6.
    Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008). (Special Issue on Cognitive Radio Theory and Applications)CrossRefGoogle Scholar
  7. 7.
    Chen, R., Park, J.M., Bian, K.: Robust distributed spectrum sensing in cognitive radio networks. In: Proceedings of IEEE Conference on Computer Communications (INFOCOM) 2008 Mini-conference (2008)Google Scholar
  8. 8.
    Federal Communication Commission: Notice for proposed rulemaking (NPRM 03–22), facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies (2003)Google Scholar
  9. 9.
    Chen, Z., Cooklev, T., Chen, C., Pomalaza-Ráez, C.: Modeling primary user emulation attacks and defenses in cognitive radio networks. In: Proceedings of the IEEE 28th International Performance Computing and Communications Conference (IPCCC’09), pp. 208–2015 (Dec 2009)Google Scholar
  10. 10.
    Hao, D., Sakurai, K.: A differential game approach to mitigating primary user emulation attacks in cognitive radio networks. In: Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications (AINA’12), pp. 495–502 (Mar 2012)Google Scholar
  11. 11.
    Li, B., Batten, L.M., Doss, R.: Lightweight Authentication for Recovery in Wireless Sensor Networks. In: Proceeding of 5th International Conference on Mobile Ad-hoc and Sensor Networks, pp. 465–471 (2009)Google Scholar
  12. 12.
    Sen, J.: Security and privacy challenges in cognitive wireless sensor networks. In: Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks (2013)Google Scholar
  13. 13.
    Shi, E., Perrig, A.: Designing Secure Sensor Networks. Proc. IEEE Wirel. Commun. 11(6), 38–43 (2004)CrossRefGoogle Scholar
  14. 14.
    Araujo Pinto, A., Romero, E., Blesa, J., Nieto-Taladriz, O.: A framework for the design, development and evaluation of cognitive wireless sensor networks. Proc. Int. J. Adv. Telecommun. 5(3–4), 141–152 (2012)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Kalinga Institute of Industrial TechnologyBhubaneswarIndia

Personalised recommendations