A Single Iteration Belief Propagation Algorithm to Minimize the Effects of Primary User Emulation Attacks

被引:0
|
作者
Maric, Sasa [1 ]
Reisenfeld, Sam [1 ]
Goratti, Leonardo [2 ]
机构
[1] Macquarie Univ, Dept Engn, Sydney, NSW 2109, Australia
[2] Res Ctr CREATE NET, I-38123 Povo, Italy
关键词
Cognitive radio; belief propagation; PUEA; jammer attacks; cognitive radio security; COGNITIVE RADIO NETWORKS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a method to alleviate the effects of primary user emulation attacks in cognitive radio (CR) networks. The proposed method uses a simplified belief propagation (BP) algorithm that is able to identify whether a transmitter is a legitimate primary user or an attacker. In a primary user emulation attack (PUEA) a transmitter impersonates a primary user (PU) in order to deceive secondary users (SU) into believing that a channel is occupied. As a result, secondary users must vacate the channel immediately. This paper presents a simplified belief propagation method as a defence strategy against primary user emulation attacks. In our method each secondary user examines an incoming signal from a transmitter and determines with a certain probability whether the transmitter is a legitimate user or not. This probability is known as the belief. The beliefs at each secondary user are reconciled and a final belief is compared to a predefined threshold. If the final belief is below the threshold, the user is identified as an attacker. If it is above the threshold, the user is deemed a primary user. This result is then propagated throughout the network so that all users on the network are aware of the attacker. In this paper, we present a method based on the belief propagation framework. The proposed method converges in a single iteration; this is the result of a redefined messaging protocol and a simplified belief equation. As a result, the computational complexity of the method is reduced significantly, while still maintaining a high level of accuracy.
引用
收藏
页码:346 / 351
页数:6
相关论文
共 50 条
  • [41] Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks
    Jin, Z.
    Anand, S.
    Subbalakshmi, K. P.
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [42] A Game Approach to Combat Primary User Emulation Attacks in Multi-channel Cognitive Radio Systems
    Wang Naichao
    Xu Yitao
    Zhang, Deng
    Lin, Zhang
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1639 - 1642
  • [43] DQN Learning Based Defense Against Smart Primary User Emulation Attacks in Cooperative Sensing Systems
    Shrivastava, Shivanshu
    Chen, Bin
    Wang, Hui
    IEEE ACCESS, 2021, 9 : 163791 - 163814
  • [44] Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard
    Alahmadi, Ahmed
    Abdelhakim, Mai
    Ren, Jian
    Li, Tongtong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) : 772 - 781
  • [45] Cross-Layer Design for Primary User Emulation Attacks Detection in Mobile Cognitive Radio Networks
    Trong Nghia Le
    Chin, Wen-Long
    Kao, Wei-Che
    IEEE COMMUNICATIONS LETTERS, 2015, 19 (05) : 799 - 802
  • [46] Self B - Adaptive Key Generation for Primary Users in Cognitive Radio Networks for Less Prone Primary User Emulation Attacks
    Lakshmibai, T.
    Parthasarathy, C.
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2018, 11 (01): : 1 - 12
  • [47] Blind Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems with Unknown Channel Statistics
    Li, Husheng
    Han, Zhu
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [48] Robust Cooperative Spectrum Sensing in Cognitive Radio Networks under Multiple Smart Primary User Emulation Attacks
    Saber, Mohammad Javad
    Sadough, Seyed Mohammad Sajad
    2014 22ND IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2014, : 1745 - 1748
  • [49] Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks
    Alahmadi, Ahmed
    Song, Tianlong
    Li, Tongtong
    2014 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2014, : 1165 - 1169
  • [50] Detection of Primary User Emulation Attack Using the Differential Evolution Algorithm in Cognitive Radio Networks
    Batool, Rehna
    Bibi, Nargis
    Muhammad, Nazeer
    Alhazmi, Samah
    APPLIED SCIENCES-BASEL, 2023, 13 (01):