A Single Iteration Belief Propagation Algorithm to Minimize the Effects of Primary User Emulation Attacks

被引:0
|
作者
Maric, Sasa [1 ]
Reisenfeld, Sam [1 ]
Goratti, Leonardo [2 ]
机构
[1] Macquarie Univ, Dept Engn, Sydney, NSW 2109, Australia
[2] Res Ctr CREATE NET, I-38123 Povo, Italy
关键词
Cognitive radio; belief propagation; PUEA; jammer attacks; cognitive radio security; COGNITIVE RADIO NETWORKS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a method to alleviate the effects of primary user emulation attacks in cognitive radio (CR) networks. The proposed method uses a simplified belief propagation (BP) algorithm that is able to identify whether a transmitter is a legitimate primary user or an attacker. In a primary user emulation attack (PUEA) a transmitter impersonates a primary user (PU) in order to deceive secondary users (SU) into believing that a channel is occupied. As a result, secondary users must vacate the channel immediately. This paper presents a simplified belief propagation method as a defence strategy against primary user emulation attacks. In our method each secondary user examines an incoming signal from a transmitter and determines with a certain probability whether the transmitter is a legitimate user or not. This probability is known as the belief. The beliefs at each secondary user are reconciled and a final belief is compared to a predefined threshold. If the final belief is below the threshold, the user is identified as an attacker. If it is above the threshold, the user is deemed a primary user. This result is then propagated throughout the network so that all users on the network are aware of the attacker. In this paper, we present a method based on the belief propagation framework. The proposed method converges in a single iteration; this is the result of a redefined messaging protocol and a simplified belief equation. As a result, the computational complexity of the method is reduced significantly, while still maintaining a high level of accuracy.
引用
收藏
页码:346 / 351
页数:6
相关论文
共 50 条
  • [31] Improved cooperative spectrum sensing under primary user emulation attacks in cognitive radio networks
    Orumwense, Efe
    Oyerinde, Olutayo
    Mneney, Stanley
    JOURNAL OF ENGINEERING RESEARCH, 2017, 5 (03): : 73 - 90
  • [32] Security in Cognitive Radio Network: Defense against Primary User Emulation attacks using Genetic Artificial Bee Colony (GABC) algorithm
    Elghamrawy, Sally M.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 479 - 487
  • [33] Mitigating Primary User Emulation attacks in Cognitive Radio networks using advanced encryption standard
    Jiang, Huichao
    Jing, Xiao Jun
    Sun, Songlin
    Huang, Hai
    Li, Yan
    Wang, Xiaohan
    Cheng, Dongmei
    SIGNAL AND INFORMATION PROCESSING, NETWORKING AND COMPUTERS, 2016, : 185 - 193
  • [34] Online Learning-Based Optimal Primary User Emulation Attacks in Cognitive Radio Networks
    Dabaghchian, Monireh
    Alipour-Fanid, Amir
    Zeng, Kai
    Wang, Qingsi
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 100 - 108
  • [35] On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification
    Nam Tuan Nguyen
    Zheng, Rong
    Han, Zhu
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (03) : 1432 - 1445
  • [36] Mitigating Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard
    Alahmadi, Ahmed
    Abdelhakim, Mai
    Ren, Jian
    Li, Tongtong
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 3229 - 3234
  • [37] Optimal soft combination for multiple antenna energy detection under primary user emulation attacks
    Saber, M. J.
    Sadough, S. M. S.
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (09) : 1181 - 1188
  • [38] A Particle Swarm Optimization Based algorithm for Primary User Emulation attack detection
    Fihri, Wassim Fassi
    Arjoune, Youness
    El Ghazi, Hassan
    Kaabouch, Naima
    Abou El Majd, Badr
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 823 - 827
  • [39] Signal Processing-based Model for Primary User Emulation Attacks Detection in Cognitive Radio Networks
    Lafia D.
    Sanni M.L.
    Adetona R.A.
    Akinyemi B.O.
    Aderounmu G.A.
    Journal of Computing and Information Technology, 2021, 29 (02) : 77 - 88
  • [40] Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding
    Xie, Xiongwei
    Wang, Weichao
    4TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2013) AND THE 3RD INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH), 2013, 21 : 430 - 435