On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification

被引:51
|
作者
Nam Tuan Nguyen [1 ]
Zheng, Rong [2 ,3 ]
Han, Zhu [1 ,4 ]
机构
[1] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
[2] Univ Houston, Dept Comp Sci, Houston, TX 77204 USA
[3] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[4] Kyung Hee Univ, Dept Elect & Radio Engn, Seoul, South Korea
基金
美国国家科学基金会;
关键词
Cognitive radio; device finger print; Gibbs sampler; infinite Gaussian mixture model; nonparametric Bayesian classification; primary user emulation attack;
D O I
10.1109/TSP.2011.2178407
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Primary user emulation (PUE) attacks, where attackers mimic the signals of primary users (PUs), can cause significant performance degradation in cognitive radio (CR) systems. Detection of the presence of PUE attackers is thus an important problem. In this paper, using device-specific features, we propose a passive, nonparametric classification method to determine the number of transmitting devices in the PU spectrum. Our method, called DECLOAK, is passive since the sensing device listens and captures signals without injecting any signal to the wireless environment. It is nonparametric because the number of active devices needs not to be known as a priori. Channel independent features are selected forming fingerprints for devices, which cannot be altered postproduction. The infinite Gaussian mixture model (IGMM) is adopted and a modified collapsed Gibbs sampling method is proposed to classify the extracted fingerprints. Due to its unsupervised nature, there is no need to collect legitimate PU fingerprints. In combination with received power and device MAC address, we show through simulation studies that the proposed method can efficiently detect the PUE attack. The performance of DECLOAK is also shown to be superior than that of the classical non-parametric mean shift (MS) based clustering method.
引用
收藏
页码:1432 / 1445
页数:14
相关论文
共 50 条
  • [1] Online Primary User Emulation Attacks in Cognitive Radio Networks Using Thompson Sampling
    Sheng, Xiang
    Wang, Shaowei
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (12) : 8264 - 8273
  • [2] Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks
    Yuan, Zhou
    Niyato, Dusit
    Li, Husheng
    Song, Ju Bin
    Han, Zhu
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (10) : 1850 - 1860
  • [3] Defense against primary user emulation attacks in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Reed, Jeffrey H.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) : 25 - 37
  • [4] Securing Cognitive Radio Networks against Primary User Emulation Attacks
    Yu, Rong
    Zhang, Yan
    Liu, Yi
    Gjessing, Stein
    Guizani, Mohsen
    IEEE NETWORK, 2015, 29 (04): : 68 - 74
  • [5] Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks
    Chen, Zesheng
    Cooklev, Todor
    Chen, Chao
    Pomalaza-Raez, Carlos
    2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009), 2009, : 208 - 215
  • [6] A Mitigation Strategy for Primary User Emulation Attacks in Cognitive Radio Networks
    Harini, S. V. Vidhya
    Aruna, T.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [7] Securing Cognitive Radio Networks against Primary User Emulation Attacks
    Yu, Rong
    Zhang, Yan
    Liu, Yi
    Gjessing, Stein
    Guizani, Mohsen
    IEEE NETWORK, 2016, 30 (06): : 62 - 69
  • [8] Improved Detection of Primary User Emulation Attacks in Cognitive Radio Networks
    Jin, Fan
    Varadharajan, Vijay
    Tupakula, Udaya
    25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 274 - 279
  • [9] Mitigating Primary User Emulation attacks in Cognitive Radio networks using advanced encryption standard
    Jiang, Huichao
    Jing, Xiao Jun
    Sun, Songlin
    Huang, Hai
    Li, Yan
    Wang, Xiaohan
    Cheng, Dongmei
    SIGNAL AND INFORMATION PROCESSING, NETWORKING AND COMPUTERS, 2016, : 185 - 193
  • [10] Mitigating Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard
    Alahmadi, Ahmed
    Abdelhakim, Mai
    Ren, Jian
    Li, Tongtong
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 3229 - 3234