Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 4/2021

07.02.2021 | Research Article-Computer Engineering and Computer Science

Detection and Defense of PUEA in Cognitive Radio Network

verfasst von: Avila Jayapalan, Prem Savarinathan, Jagathi Chenna Reddy, Janani Divyadharshini Baskar

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In wireless communication, there is an enormous increase in the number of users which results in spectrum shortage. This can be defeated through dynamic spectrum access scheme and cognitive radio is the best solution to achieve this. A cognitive radio (CR) is programmable, configurable and can dynamically use the spectrum in the wireless environment. One of the important tasks of CR is to perform spectrum sensing. Sensing done on spectrum facilitates the cognitive radio user to find the unoccupied area of the spectrum. This CR is prone to many attacks in the wireless environment like primary user emulation attack (PUEA), denial of service attack, replay attack, etc. Among them, the most important attack is PUEA. When a user mimics the primary user and acquires priority over other users to access the spectrum then it is termed as PUEA. In this work, PUEA detection and its defense techniques have been modeled to avoid the degradation of spectrum. To detect the malicious users feature detection-based sensing with double threshold has been proposed. If the detected signal falls above the upper threshold or below the lower threshold then it is considered as primary user signal, whereas if the signal falls in between the thresholds then that signal is identified as malicious user signal. The detection of PUEA cannot be accurate due to factors like false alarm and miss detection. Hence, a game model has been designed for the legitimate nodes to reach strategic defense decisions in the presence of multiple attackers. Based on the actions of the players, the defenders’ payoff is determined to obtain optimal defense decisions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mitola, J., III.: Cognitive radio for flexible mobile multimedia communications. In: Mobile Networks and Applications, pp. 435–441 (2001) Mitola, J., III.: Cognitive radio for flexible mobile multimedia communications. In: Mobile Networks and Applications, pp. 435–441 (2001)
2.
Zurück zum Zitat Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23(2), 201–220 (2005)CrossRef Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23(2), 201–220 (2005)CrossRef
3.
Zurück zum Zitat Bayrakdar, M.E.; Caihan, A.: Artificial bee colony-based spectrum handoff algorithm in wireless cognitive radio networks. Int. J. Commun. Syst. 31, e3495 (2018)CrossRef Bayrakdar, M.E.; Caihan, A.: Artificial bee colony-based spectrum handoff algorithm in wireless cognitive radio networks. Int. J. Commun. Syst. 31, e3495 (2018)CrossRef
4.
Zurück zum Zitat Igbinosa, I.E.; Oyerinde, O.O.; Srivastava, V.M.; Mneney, S.: Spectrum sensing methodologies for cognitive radio systems: a review. Int. J. Adv. Comput. Sci. Appl. 6(12), 13–22 (2015) Igbinosa, I.E.; Oyerinde, O.O.; Srivastava, V.M.; Mneney, S.: Spectrum sensing methodologies for cognitive radio systems: a review. Int. J. Adv. Comput. Sci. Appl. 6(12), 13–22 (2015)
5.
Zurück zum Zitat Zhou, X.; Jing, X.; Huang, H.; Li, J.: An enhanced double threshold energy detection in cognitive radio. In: International Conference on Signal and Information Processing, Networking and Computers, pp. 80–86 (2017) Zhou, X.; Jing, X.; Huang, H.; Li, J.: An enhanced double threshold energy detection in cognitive radio. In: International Conference on Signal and Information Processing, Networking and Computers, pp. 80–86 (2017)
7.
Zurück zum Zitat Kumar, A.; Thakur, P.; Pandit, S.; Singh, G.: Analysis of optimal threshold selection for spectrum sensing in a cognitive radio network: an energy detection approach. Wirel. Netw. 25, 3917–3931 (2019)CrossRef Kumar, A.; Thakur, P.; Pandit, S.; Singh, G.: Analysis of optimal threshold selection for spectrum sensing in a cognitive radio network: an energy detection approach. Wirel. Netw. 25, 3917–3931 (2019)CrossRef
8.
Zurück zum Zitat Krishnana, K.V.; Sajitha, R.M.; Kharab, S.: Dynamic resource allocation in OFDM based cognitive radio system considering primary user QoS and secondary user proportional constraints. J. Commun. Technol. Electron. 60, 1269–1275 (2015)CrossRef Krishnana, K.V.; Sajitha, R.M.; Kharab, S.: Dynamic resource allocation in OFDM based cognitive radio system considering primary user QoS and secondary user proportional constraints. J. Commun. Technol. Electron. 60, 1269–1275 (2015)CrossRef
10.
Zurück zum Zitat Ivanov, A.: Feature extraction in local spectrum sensing for next generation cognitive radios—a review. J. Mobile Multimed. 15(1–2), 111–140 (2020)CrossRef Ivanov, A.: Feature extraction in local spectrum sensing for next generation cognitive radios—a review. J. Mobile Multimed. 15(1–2), 111–140 (2020)CrossRef
11.
Zurück zum Zitat Kakalou, I.; Psannis, K.E.: Coordination without collaboration in imperfect games: the primary user emulation attack example. IEEE Access 6, 5402–5414 (2018)CrossRef Kakalou, I.; Psannis, K.E.: Coordination without collaboration in imperfect games: the primary user emulation attack example. IEEE Access 6, 5402–5414 (2018)CrossRef
12.
Zurück zum Zitat Pei, Y.; Liang, Y.; Zhang, L.; The, K.C.; Li, K.H.: Secure communication over MISO cognitive radio channels. IEEE Trans. Wirel. Commun. 9, 1494–1502 (2010)CrossRef Pei, Y.; Liang, Y.; Zhang, L.; The, K.C.; Li, K.H.: Secure communication over MISO cognitive radio channels. IEEE Trans. Wirel. Commun. 9, 1494–1502 (2010)CrossRef
13.
Zurück zum Zitat Fudenberg, D.; Tirole, J.: Game Theory. MIT Press, Cambridge (1991)MATH Fudenberg, D.; Tirole, J.: Game Theory. MIT Press, Cambridge (1991)MATH
14.
Zurück zum Zitat Wan, R.; Ding, L.; Xiong, N.; Shu, W.; Yang, L.: Dynamic dual threshold cooperative spectrum sensing for cognitive radio under noise power uncertainity. Hum. Centric Comput. Inf. Sci. 9, 1–21 (2019)CrossRef Wan, R.; Ding, L.; Xiong, N.; Shu, W.; Yang, L.: Dynamic dual threshold cooperative spectrum sensing for cognitive radio under noise power uncertainity. Hum. Centric Comput. Inf. Sci. 9, 1–21 (2019)CrossRef
16.
Zurück zum Zitat Felegyhazi, M.; Hubaux, J.: Game theory in wireless networks: a tutorial. Technical Report, pp. 1–16 (2006) Felegyhazi, M.; Hubaux, J.: Game theory in wireless networks: a tutorial. Technical Report, pp. 1–16 (2006)
17.
Zurück zum Zitat Liang, X.; Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutor. 15, 472–486 (2013)CrossRef Liang, X.; Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutor. 15, 472–486 (2013)CrossRef
18.
Zurück zum Zitat Wang, Y.; Yu, F.; Tang, H.; Huang, M.: A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Transa. Wirel. Commun. 13, 1616–1627 (2014)CrossRef Wang, Y.; Yu, F.; Tang, H.; Huang, M.: A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Transa. Wirel. Commun. 13, 1616–1627 (2014)CrossRef
19.
Zurück zum Zitat Elnouran, M.G.A.: Cognitive Radio and Game Theory: Overview and Simulation. Blekinge Institute of Technology, Karlskrona (2008) Elnouran, M.G.A.: Cognitive Radio and Game Theory: Overview and Simulation. Blekinge Institute of Technology, Karlskrona (2008)
20.
Zurück zum Zitat Whalen, A.: Statistical theory of signal detection and parameter estimation. IEEE Commun. Mag. 22, 37–44 (1984)CrossRef Whalen, A.: Statistical theory of signal detection and parameter estimation. IEEE Commun. Mag. 22, 37–44 (1984)CrossRef
21.
Zurück zum Zitat Li, F.; Wu, J.: Hit and run: a Bayesian game between malicious and regular nodes in MANETS. In: 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Adhoc Communications and Networks, pp. 432–440 (2008) Li, F.; Wu, J.: Hit and run: a Bayesian game between malicious and regular nodes in MANETS. In: 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Adhoc Communications and Networks, pp. 432–440 (2008)
Metadaten
Titel
Detection and Defense of PUEA in Cognitive Radio Network
verfasst von
Avila Jayapalan
Prem Savarinathan
Jagathi Chenna Reddy
Janani Divyadharshini Baskar
Publikationsdatum
07.02.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 4/2021
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-020-05278-9

Weitere Artikel der Ausgabe 4/2021

Arabian Journal for Science and Engineering 4/2021 Zur Ausgabe

Research Article-Computer Engineering and Computer Science

Input–Output Modeling and Multi-objective Optimization of Weld Attributes in EBW

Research Article-Computer Engineering and Computer Science

Prolong Network Lifetime in the Wireless Sensor Networks: An Improved Approach

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.