A Single Iteration Belief Propagation Algorithm to Minimize the Effects of Primary User Emulation Attacks

被引:0
|
作者
Maric, Sasa [1 ]
Reisenfeld, Sam [1 ]
Goratti, Leonardo [2 ]
机构
[1] Macquarie Univ, Dept Engn, Sydney, NSW 2109, Australia
[2] Res Ctr CREATE NET, I-38123 Povo, Italy
关键词
Cognitive radio; belief propagation; PUEA; jammer attacks; cognitive radio security; COGNITIVE RADIO NETWORKS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a method to alleviate the effects of primary user emulation attacks in cognitive radio (CR) networks. The proposed method uses a simplified belief propagation (BP) algorithm that is able to identify whether a transmitter is a legitimate primary user or an attacker. In a primary user emulation attack (PUEA) a transmitter impersonates a primary user (PU) in order to deceive secondary users (SU) into believing that a channel is occupied. As a result, secondary users must vacate the channel immediately. This paper presents a simplified belief propagation method as a defence strategy against primary user emulation attacks. In our method each secondary user examines an incoming signal from a transmitter and determines with a certain probability whether the transmitter is a legitimate user or not. This probability is known as the belief. The beliefs at each secondary user are reconciled and a final belief is compared to a predefined threshold. If the final belief is below the threshold, the user is identified as an attacker. If it is above the threshold, the user is deemed a primary user. This result is then propagated throughout the network so that all users on the network are aware of the attacker. In this paper, we present a method based on the belief propagation framework. The proposed method converges in a single iteration; this is the result of a redefined messaging protocol and a simplified belief equation. As a result, the computational complexity of the method is reduced significantly, while still maintaining a high level of accuracy.
引用
收藏
页码:346 / 351
页数:6
相关论文
共 50 条
  • [21] A New Method to Detect Primary User Emulation Attacks in Cognitive Radio Networks
    Peng, Kai
    Zeng, Fanzi
    Zeng, Qingguang
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 674 - 677
  • [22] Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks
    Duc-Tuyen Ta
    Nhan Nguyen-Thanh
    Maille, Patrick
    Van-Tam Nguyen
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2018, 4 (03) : 582 - 596
  • [23] Detection of Primary User Emulation Attacks Based on Compressive Sensing in Cognitive Radio Networks
    Dang, Manman
    Zhao, Zhifeng
    Zhang, Honggang
    2013 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2013), 2013,
  • [24] Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks
    Jin, Z.
    Anand, S.
    Subbalakshmi, K. P.
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [25] Online Primary User Emulation Attacks in Cognitive Radio Networks Using Thompson Sampling
    Sheng, Xiang
    Wang, Shaowei
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (12) : 8264 - 8273
  • [26] Primary User Emulation Detection Algorithm Based on Distributed Sensor Networks
    Pu D.
    Aygun B.
    Wyglinski A.M.
    International Journal of Wireless Information Networks, 2017, 24 (4) : 344 - 355
  • [27] Cooperative Spectrum Sensing in Cognitive Radio Networks under Primary User Emulation Attacks
    Haghighat, Maryam
    Sadough, Seyed Mohammad-Sajad
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 148 - 151
  • [28] A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Network
    Hao, Dong
    Sakurai, Kouichi
    2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 495 - 502
  • [29] Optimal Cooperative Detection of Primary User Emulation Attacks in Distributed Cognitive Radio Network
    Dang, Manman
    Zhao, Zhifeng
    Zhang, Honggang
    2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 368 - 373
  • [30] Optimal Joining Strategies in Cognitive Radio Networks Under Primary User Emulation Attacks
    Li, Kaili
    Wang, Jinting
    IEEE ACCESS, 2019, 7 : 183812 - 183822