Defense Against Primary User Emulation Attacks Using Belief Propagation of Location Information in Cognitive Radio Networks

被引:0
|
作者
Yuan, Zhou [1 ]
Niyato, Dusit [2 ]
Li, Husheng [3 ]
Han, Zhu [1 ]
机构
[1] Univ Houston, ECE Dept, Houston, TX 77204 USA
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
[3] Univ Tennessee, Dept EECS, Knoxville, TN 37996 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cognitive radio (CR) is a promising technology for future wireless spectrum allocation to improve the usage of the licensed bands. However, CR wireless networks are susceptible to various attacks and cannot offer efficient security. Primary user emulation (PUE) is one of the discovered attacks for CR networks, which can significantly increase the spectrum access failure probability. In this paper, we propose a defense strategy against the PUE attack in CR networks using belief propagation (BP), which avoids the deployment of additional sensor networks and expensive hardware in the networks used in existing literatures. In our proposed approach, each secondary user calculates the local functions based on location information, computes the messages, exchanges messages with the neighboring users, and calculates the beliefs until convergence. Then, the PUE attacker will be detected according to the mean of the final beliefs. After that, all the secondary users in the network will be notified in a broadcast way about the characteristics of the attacker's signal, and avoid the attacker's primary emulation signal in the future. Simulation results show that our proposed technique converges quickly, and is effective to detect the PUE attacker.
引用
收藏
页码:599 / 604
页数:6
相关论文
共 50 条
  • [41] Defense Against Objective Function Attacks in Cognitive Radio Networks
    Pei Qingqi
    Li Hongning
    Ma Jianfeng
    Fan Kefeng
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (01): : 138 - 142
  • [42] Defense against PUEA and SSDF Attacks in Cognitive Radio Networks
    Chaitanya, D. L.
    Chari, K. Manjunatha
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [43] Performance Analysis of Primary User Emulation Attack in Cognitive Radio Networks
    Zhang, Chaorui
    Yu, Rong
    Zhang, Yan
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 371 - 376
  • [44] EM-Based Algorithm for Defeating Against Primary User Emulation Attacks in Cognitive Wireless Networks
    Liu, Long
    Zhang, Zhi
    Li, Jianwu
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1450 - 1455
  • [45] Mitigating Smart Primary User Emulation Attackers in Cognitive Radio Networks
    Taggu, Amar
    Marchang, Ningrinla
    2019 4TH TECHNOLOGY INNOVATION MANAGEMENT AND ENGINEERING SCIENCE INTERNATIONAL CONFERENCE (TIMES-ICON), 2019,
  • [46] Robust Cooperative Spectrum Sensing in Cognitive Radio Networks under Multiple Smart Primary User Emulation Attacks
    Saber, Mohammad Javad
    Sadough, Seyed Mohammad Sajad
    2014 22ND IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2014, : 1745 - 1748
  • [47] Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks
    Alahmadi, Ahmed
    Song, Tianlong
    Li, Tongtong
    2014 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2014, : 1165 - 1169
  • [48] A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Network
    Hao, Dong
    Sakurai, Kouichi
    2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 495 - 502
  • [49] Optimal Cooperative Detection of Primary User Emulation Attacks in Distributed Cognitive Radio Network
    Dang, Manman
    Zhao, Zhifeng
    Zhang, Honggang
    2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 368 - 373
  • [50] Self B - Adaptive Key Generation for Primary Users in Cognitive Radio Networks for Less Prone Primary User Emulation Attacks
    Lakshmibai, T.
    Parthasarathy, C.
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2018, 11 (01): : 1 - 12