Skip to main content

Mitigating Primary User Emulation Attacks Using Analytical Model

  • Conference paper
  • First Online:
Engineering Vibration, Communication and Information Processing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 478))

Abstract

Cognitive radio has been a widely studied area to increase the efficiency of the spectrum. Most of the present work focuses on sensing techniques but very less work has been done for security in Cognitive Radio Networks (CRNs). Primary User Emulation Attack (PUEA) is a very prominent Denial of Service (DoS) attack that degrades the performance of the network to a large extent. This paper deals with an analytical model which depends on Neyman–Pearson Composite Hypothesis Test (NPCHT) to determine whether a PUEA is present in CRN. Log-normal shadowing and Rayleigh fading have been taken for the signals received from the primary transmitters as well as the attackers. The movement of good secondary user has been assumed in vertical direction ranging from an angle of (–π/4) to (π/4) with respect to primary transmitter. The performance of the system model has been evaluated by plotting the Receiver Operating Characteristic (ROC) curve. Variation in miss detection and false alarm probabilities has been studied for different angles. Results demonstrate that the likelihood of successful PUEA increments with the increasing distance between the good secondary user and primary transmitter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Force, S.: Spectrum policy task force report. Federal Commun. Comm. ET Docket 02, 135 (2002)

    Google Scholar 

  2. Mitola, J., Gerald, Q.: Maguire.: cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)

    Article  Google Scholar 

  3. Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23(2), 201–220 (2005)

    Article  Google Scholar 

  4. Yucek, T., Arslan, H.: A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surv. Tutor. 11(1), 116–130 (2009)

    Article  Google Scholar 

  5. Umar, R., Sheikh, A.U.H.: A comparative study of spectrum awareness techniques for cognitive radio oriented wireless networks. Phys. Commun. 9, 148–170 (2013)

    Article  Google Scholar 

  6. Fragkiadakis, A.G., Tragos, E.Z., Askoxylakis, I.G.: A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun. Surv. Tutor. 15(1), 428–445 (2013)

    Article  Google Scholar 

  7. Chen, R., Park, J.M., Reed, J.H..: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1) (2008)

    Article  Google Scholar 

  8. Jin, Z., Anand, S., Subbalakshmi, K.P.: Impact of primary user emulation attacks on dynamic spectrum access networks. IEEE Trans. Commun. 60(9), 2635–2643 (2012)

    Article  Google Scholar 

  9. Shrivastava, S.: Security Issues in Cognitive Radios. Diss (2017)

    Google Scholar 

  10. Anand, S., Jin, Z., Subbalakshmi, K.P.: An analytical model for primary user emulation attacks in cognitive radio networks. In: 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2008. IEEE (2008)

    Google Scholar 

  11. Jin, Z., Anand, S., Subbalakshmi, K.P.: Detecting primary user emulation attacks in dynamic spectrum access networks. In: IEEE International Conference on Communications, ICC’09. IEEE (2009)

    Google Scholar 

  12. Jin, Z., Anand, S., Subbalakshmi, K.P.: Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing. ACM SIGMOBILE Mob. Comput. Commun. Rev. 13(2), 74–85 (2009)

    Article  Google Scholar 

  13. Kay, S.M.: Fundamentals of Statistical Signal Processing, Volume 2: Detection Theory, Series. Prentice Hall Signal Processing Series, AV Oppenheim, Ed. Prentice Hall PTR (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ishu Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, I., Sahu, O.P. (2019). Mitigating Primary User Emulation Attacks Using Analytical Model. In: Ray, K., Sharan, S., Rawat, S., Jain, S., Srivastava, S., Bandyopadhyay, A. (eds) Engineering Vibration, Communication and Information Processing. Lecture Notes in Electrical Engineering, vol 478. Springer, Singapore. https://doi.org/10.1007/978-981-13-1642-5_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1642-5_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1641-8

  • Online ISBN: 978-981-13-1642-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics