Advertisement

Performance Analysis of PUEA and SSDF Attacks in Cognitive Radio Networks

  • D. L. Chaitanya
  • K. Manjunatha Chari
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 5)

Abstract

Cognitive radio is the promising technology for serving the needs of increasing demand for the wireless communications nowadays. Employing cooperative spectrum sensing gives better results as it involves the fusion of sensing reports from more than one secondary user for making the final decision regarding the presence or absence of primary users. Cooperative spectrum sensing is susceptible to security issues such as primary user emulation attack (PUEA) and spectrum sensing data falsification attack (SSDF). In this chapter we compare the performance of the centralized cooperative cognitive radio network in the presence of SSDF and PUEA attacks by applying three hard decision fusion rules AND, OR and K-out-of-N rules. Simulation results show that the K-out-of-N rule performs well in the presence of PUEA attack and AND rule performs well under SSDF attack. A packet delivery ratio of unity is achieved as the simulation time progresses.

Keywords

Energy detection SSDF attack PUEA attack 

References

  1. 1.
    FCC, E.: Docket no 03–222 notice of proposed rule making and order (2003)Google Scholar
  2. 2.
    Mitola, J., Maguire, G.Q.: Cognitive radio: making software radios more personal. IEEE personal communications 6 (1999) 13–18Google Scholar
  3. 3.
    Yucek, T., Arslan, H.: A survey of spectrum sensing algorithms for cognitive radio applications. IEEE communications surveys & tutorials 11 (2009) 116–130Google Scholar
  4. 4.
    Umar, R., Sheikh, A.U.: A comparative study of spectrum awareness techniques for cognitive radio oriented wireless networks. Physical Communication 9 (2013) 148–170Google Scholar
  5. 5.
    Akyildiz, I.F., Lo, B.F., Balakrishnan, R.: Cooperative spectrum sensing in cognitive radio networks: A survey. Physical communication 4 (2011) 40–62Google Scholar
  6. 6.
    Haghighat, M., Sadough, S.M.S.: Cooperative spectrum sensing for cognitive radio networks in the presence of smart malicious users. AEU-International Journal of Electronics and Communications 68 (2014) 520–527Google Scholar
  7. 7.
    Hyder, C.S., Grebur, B., Xiao, L.: Defense against spectrum sensing data falsification attacks in cognitive radio networks. In: International Conference on Security and Privacy in Communication Systems, Springer (2011) 154–171Google Scholar
  8. 8.
    Teguig, D., Scheers, B., Le Nir, V.: Data fusion schemes for cooperative spectrum sensing in cognitive radio networks. In: Communications and Information Systems Conference (MCC), 2012 Military, IEEE (2012) 1–7Google Scholar
  9. 9.
    Yu, R., Zhang, Y., Liu, Y., Gjessing, S., Guizani, M.: Securing cognitive radio networks against primary user emulation attacks. IEEE Network 29 (2015) 68–74Google Scholar
  10. 10.
    Sumathi, A., VIDHYAPRIYA, D.R.: Intense explore algorithm–a proactive way to eliminate pue attacks in cognitive radio networks. In: WSEAS Conference. (2015)Google Scholar
  11. 11.
    Singh, J.S.P., Singh, R., Rai, M.K., Singh, J., Kang, A.: Cooperative sensing for cognitive radio: A powerful access method for shadowing environment. Wireless Personal Communications 80 (2015) 1363–1379Google Scholar
  12. 12.
    Issariyakul, T., Hossain, E.: Introduction to network simulator NS2. Springer Science & Business Media (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.GRIETHyderabadIndia
  2. 2.GITAM UniversityVisakhapatnamIndia

Personalised recommendations