Defense Against Primary User Emulation Attacks Using Belief Propagation of Location Information in Cognitive Radio Networks

被引:0
|
作者
Yuan, Zhou [1 ]
Niyato, Dusit [2 ]
Li, Husheng [3 ]
Han, Zhu [1 ]
机构
[1] Univ Houston, ECE Dept, Houston, TX 77204 USA
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
[3] Univ Tennessee, Dept EECS, Knoxville, TN 37996 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cognitive radio (CR) is a promising technology for future wireless spectrum allocation to improve the usage of the licensed bands. However, CR wireless networks are susceptible to various attacks and cannot offer efficient security. Primary user emulation (PUE) is one of the discovered attacks for CR networks, which can significantly increase the spectrum access failure probability. In this paper, we propose a defense strategy against the PUE attack in CR networks using belief propagation (BP), which avoids the deployment of additional sensor networks and expensive hardware in the networks used in existing literatures. In our proposed approach, each secondary user calculates the local functions based on location information, computes the messages, exchanges messages with the neighboring users, and calculates the beliefs until convergence. Then, the PUE attacker will be detected according to the mean of the final beliefs. After that, all the secondary users in the network will be notified in a broadcast way about the characteristics of the attacker's signal, and avoid the attacker's primary emulation signal in the future. Simulation results show that our proposed technique converges quickly, and is effective to detect the PUE attacker.
引用
收藏
页码:599 / 604
页数:6
相关论文
共 50 条
  • [1] Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks
    Yuan, Zhou
    Niyato, Dusit
    Li, Husheng
    Song, Ju Bin
    Han, Zhu
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (10) : 1850 - 1860
  • [2] Defense against primary user emulation attacks in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Reed, Jeffrey H.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) : 25 - 37
  • [3] Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard
    Alahmadi, Ahmed
    Abdelhakim, Mai
    Ren, Jian
    Li, Tongtong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) : 772 - 781
  • [4] Securing Cognitive Radio Networks against Primary User Emulation Attacks
    Yu, Rong
    Zhang, Yan
    Liu, Yi
    Gjessing, Stein
    Guizani, Mohsen
    IEEE NETWORK, 2015, 29 (04): : 68 - 74
  • [5] Securing Cognitive Radio Networks against Primary User Emulation Attacks
    Yu, Rong
    Zhang, Yan
    Liu, Yi
    Gjessing, Stein
    Guizani, Mohsen
    IEEE NETWORK, 2016, 30 (06): : 62 - 69
  • [6] Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks
    Duc-Tuyen Ta
    Nhan Nguyen-Thanh
    Maille, Patrick
    Van-Tam Nguyen
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2018, 4 (03) : 582 - 596
  • [7] Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks
    Chen, Zesheng
    Cooklev, Todor
    Chen, Chao
    Pomalaza-Raez, Carlos
    2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009), 2009, : 208 - 215
  • [8] A Mitigation Strategy for Primary User Emulation Attacks in Cognitive Radio Networks
    Harini, S. V. Vidhya
    Aruna, T.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [9] Improved Detection of Primary User Emulation Attacks in Cognitive Radio Networks
    Jin, Fan
    Varadharajan, Vijay
    Tupakula, Udaya
    25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 274 - 279
  • [10] Online Primary User Emulation Attacks in Cognitive Radio Networks Using Thompson Sampling
    Sheng, Xiang
    Wang, Shaowei
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (12) : 8264 - 8273