A Single Iteration Belief Propagation Algorithm to Minimize the Effects of Primary User Emulation Attacks

被引:0
|
作者
Maric, Sasa [1 ]
Reisenfeld, Sam [1 ]
Goratti, Leonardo [2 ]
机构
[1] Macquarie Univ, Dept Engn, Sydney, NSW 2109, Australia
[2] Res Ctr CREATE NET, I-38123 Povo, Italy
关键词
Cognitive radio; belief propagation; PUEA; jammer attacks; cognitive radio security; COGNITIVE RADIO NETWORKS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a method to alleviate the effects of primary user emulation attacks in cognitive radio (CR) networks. The proposed method uses a simplified belief propagation (BP) algorithm that is able to identify whether a transmitter is a legitimate primary user or an attacker. In a primary user emulation attack (PUEA) a transmitter impersonates a primary user (PU) in order to deceive secondary users (SU) into believing that a channel is occupied. As a result, secondary users must vacate the channel immediately. This paper presents a simplified belief propagation method as a defence strategy against primary user emulation attacks. In our method each secondary user examines an incoming signal from a transmitter and determines with a certain probability whether the transmitter is a legitimate user or not. This probability is known as the belief. The beliefs at each secondary user are reconciled and a final belief is compared to a predefined threshold. If the final belief is below the threshold, the user is identified as an attacker. If it is above the threshold, the user is deemed a primary user. This result is then propagated throughout the network so that all users on the network are aware of the attacker. In this paper, we present a method based on the belief propagation framework. The proposed method converges in a single iteration; this is the result of a redefined messaging protocol and a simplified belief equation. As a result, the computational complexity of the method is reduced significantly, while still maintaining a high level of accuracy.
引用
收藏
页码:346 / 351
页数:6
相关论文
共 50 条
  • [1] Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks
    Yuan, Zhou
    Niyato, Dusit
    Li, Husheng
    Song, Ju Bin
    Han, Zhu
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (10) : 1850 - 1860
  • [2] Defense Against Primary User Emulation Attacks Using Belief Propagation of Location Information in Cognitive Radio Networks
    Yuan, Zhou
    Niyato, Dusit
    Li, Husheng
    Han, Zhu
    2011 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2011, : 599 - 604
  • [3] Cooperative detection of primary user emulation attacks in CRNs
    Leon, Olga
    Hernandez-Serrano, Juan
    Soriano, Miguel
    COMPUTER NETWORKS, 2012, 56 (14) : 3374 - 3384
  • [4] An Optimized Scheme to Resist Primary User Emulation Attacks
    Xiao, Jie
    Chen, Yuebin
    Xing, Chuanxi
    Yang, Jiangfeng
    Yang, Zhenling
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 176 - 180
  • [5] Detecting primary user emulation attacks based on PDF-BP algorithm in cognitive radio networks
    Chen, Yueyun
    Yang, Liuqing
    Ma, Shuaishuai
    Yuan, Xiaopan
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 660 - 666
  • [6] EM-Based Algorithm for Defeating Against Primary User Emulation Attacks in Cognitive Wireless Networks
    Liu, Long
    Zhang, Zhi
    Li, Jianwu
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1450 - 1455
  • [7] A Simplified Counter Approach to Primary User Emulation Attacks from Secondary User Perspective
    Shrivastava, Shivanshu
    Rajesh, A.
    Bora, P. K.
    2015 IEEE 26TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2015, : 2149 - 2154
  • [8] Defense against primary user emulation attacks from the secondary user throughput perspective
    Shrivastava, Shivanshu
    Rajesh, A.
    Bora, P. K.
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2018, 84 : 131 - 143
  • [9] Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
    Jin, Z.
    Anand, S.
    Subbalakshmi, K. P.
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 2749 - 2753
  • [10] Defense against primary user emulation attacks in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Reed, Jeffrey H.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) : 25 - 37