Defense Against Primary User Emulation Attacks Using Belief Propagation of Location Information in Cognitive Radio Networks

被引:0
|
作者
Yuan, Zhou [1 ]
Niyato, Dusit [2 ]
Li, Husheng [3 ]
Han, Zhu [1 ]
机构
[1] Univ Houston, ECE Dept, Houston, TX 77204 USA
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
[3] Univ Tennessee, Dept EECS, Knoxville, TN 37996 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cognitive radio (CR) is a promising technology for future wireless spectrum allocation to improve the usage of the licensed bands. However, CR wireless networks are susceptible to various attacks and cannot offer efficient security. Primary user emulation (PUE) is one of the discovered attacks for CR networks, which can significantly increase the spectrum access failure probability. In this paper, we propose a defense strategy against the PUE attack in CR networks using belief propagation (BP), which avoids the deployment of additional sensor networks and expensive hardware in the networks used in existing literatures. In our proposed approach, each secondary user calculates the local functions based on location information, computes the messages, exchanges messages with the neighboring users, and calculates the beliefs until convergence. Then, the PUE attacker will be detected according to the mean of the final beliefs. After that, all the secondary users in the network will be notified in a broadcast way about the characteristics of the attacker's signal, and avoid the attacker's primary emulation signal in the future. Simulation results show that our proposed technique converges quickly, and is effective to detect the PUE attacker.
引用
收藏
页码:599 / 604
页数:6
相关论文
共 50 条
  • [21] Cooperative Spectrum Sensing in Cognitive Radio Networks under Primary User Emulation Attacks
    Haghighat, Maryam
    Sadough, Seyed Mohammad-Sajad
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 148 - 151
  • [22] Optimal Joining Strategies in Cognitive Radio Networks Under Primary User Emulation Attacks
    Li, Kaili
    Wang, Jinting
    IEEE ACCESS, 2019, 7 : 183812 - 183822
  • [23] Defense against primary user emulation attackers based on adaptive Bayesian learning automata in cognitive radio networks
    Mahmoudi, Mohsen
    Faez, Karim
    Ghasemi, Abdorasoul
    AD HOC NETWORKS, 2020, 102
  • [24] Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks
    Nguyen-Thanh, Nhan
    Ciblat, Philippe
    Pham, Anh T.
    Nguyen, Van-Tam
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (09) : 4981 - 4993
  • [25] Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks
    Yuan, Zhou
    Han, Zhu
    Sun, Yan Lindsay
    Li, Husheng
    Song, Ju Bin
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (09) : 1750 - 1760
  • [26] Improved cooperative spectrum sensing under primary user emulation attacks in cognitive radio networks
    Orumwense, Efe
    Oyerinde, Olutayo
    Mneney, Stanley
    JOURNAL OF ENGINEERING RESEARCH, 2017, 5 (03): : 73 - 90
  • [27] Smart primary user emulation in cognitive radio networks: defence strategies against radio-aware attacks and robust spectrum sensing
    Haghighat, M.
    Sadough, S. M. S.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (09): : 1154 - 1164
  • [28] Online Learning-Based Optimal Primary User Emulation Attacks in Cognitive Radio Networks
    Dabaghchian, Monireh
    Alipour-Fanid, Amir
    Zeng, Kai
    Wang, Qingsi
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 100 - 108
  • [29] Defense against primary user emulation attacks from the secondary user throughput perspective
    Shrivastava, Shivanshu
    Rajesh, A.
    Bora, P. K.
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2018, 84 : 131 - 143
  • [30] An Overview of Primary User Emulation Attack in Cognitive Radio Networks
    Gupta, Ishu
    Sahu, O. P.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 27 - 31