Skip to main content

Mitigating Primary User Emulation Attack in Cognitive Radio Network Using Localization and Variance Detection

  • Conference paper
  • First Online:
Proceedings of First International Conference on Smart System, Innovations and Computing

Abstract

Cognitive Radio (CR) mechanism brings the solution to the difficulty of spectrum inadequacy by distributing the unexploited spectrum to unlicensed users (Secondary Users) when the licensed users (Primary Users) are not using them so that transmission by primary user would not be distorted. To attain this, the CR dynamically regulates their physical and transmission parameters. The key characteristics of Cognitive radio, Cognitive Capability and Reconfigurability make the radio network vulnerable to security threats. One of the foremost intimidations is Primary User Emulation Attack (PUEA) performed by secondary user (or an attacker) by imitating the primary user characteristics at physical layer. In this paper, an algorithm is projected to distinguish primary user signal from others, through an energy-efficient localization mechanism and channel parameter variance, which is simulated in MATLAB environment and it is found to be an effective mechanism to authenticate primary user and mitigate the primary user emulation attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Gao, Jason: Channel Capacity of a Cognitive Radio Network in GSM Uplink Band. In: Communications and Information Technologies, 2007. ISCIT’07, International Symposium on, pp. 1511–1515. IEEE (2007).

    Google Scholar 

  2. Sharma, Himanshu, and Kuldip Kumar: Primary User Emulation Attack Analysis on Cognitive Radio. Indian Journal of Science and Technology 9.14 (2016).

    Google Scholar 

  3. Akyildiz, Ian F.: NeXt Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey. Computer networks 50.13, 2127–2159 (2006).

    Google Scholar 

  4. Parvin, S., Hussain, F.K., Hussain, O.K., Han, S., Tian, B. and Chang, E.: Cognitive Radio Network Security: A Survey. Journal of Network and Computer Applications, 35(6), pp. 1691–1708.

    Google Scholar 

  5. Suditi Choudhary and Muzzammil Hussain: Primary User Authentication in Cognitive Radio Network using Signal Properties. In: Proceeding of the Third International Symposium on Women in Computing and Informatics, pp. 290–296. ACM (2015).

    Google Scholar 

  6. Chen, Zesheng: Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks. In: 2009 IEEE 28th International Performance Computing and Communications Conference, pp. 208–215. IEEE (2009).

    Google Scholar 

  7. Lakshmi Phani G, Venkat Sayeesh K, Vinod Kumar K, Rammurthy: ERFLA: Energy Efficient Combined Routing, Fusion, Localization Algorithm in Cognitive Wsn. In: 2010 7th International Conference on Wireless and Optical Communication Networks, Colombo -(WOCN), pp. 1–5. IEEE (2010).

    Google Scholar 

  8. Md. Aquil Mirza, Rama Murthy Garimella: PASCAL: Power Aware Sectoring based Clustering Algorithm for Wireless Sensor Networks. In: 2009 International Conference on Information Networking, pp. 1–6. IEEE (2009).

    Google Scholar 

  9. Bore Gowda S B, Puttamadappa C, Mruthyunjaya H S, Babu N V: Sector based Multi-hop Clustering Protocol for Wireless Sensor Networks. In: International Journal of Computer Applications (0975–8887) vol 43– No.13 (2012).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rukhsar Sultana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sultana, R., Hussain, M. (2018). Mitigating Primary User Emulation Attack in Cognitive Radio Network Using Localization and Variance Detection . In: Somani, A., Srivastava, S., Mundra, A., Rawat, S. (eds) Proceedings of First International Conference on Smart System, Innovations and Computing. Smart Innovation, Systems and Technologies, vol 79. Springer, Singapore. https://doi.org/10.1007/978-981-10-5828-8_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5828-8_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5827-1

  • Online ISBN: 978-981-10-5828-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics