{"title":"A mitigation strategy against malicious Primary User Emulation Attack in Cognitive Radio networks","authors":"Bilal Naqvi, Shafaq Murtaza, B. Aslam","doi":"10.1109/ICET.2014.7021026","DOIUrl":null,"url":null,"abstract":"The increasing demand of usable spectrum range startled the world of serious shortage in coming years. Cognitive Radio technology emerged to solve this problem by allowing unlicensed users to utilize the spectrum resources whenever the licensed users are not active. With the emergence of this technology many security issues arose, that if successful may hamper all the benefits this promising technology has to offer. Among many other security issues Primary User Emulation Attack is one. In this paper we discuss the Primary User Emulation Attack. We also discuss the existing work in the field, along with its limitations. We also elucidate the effects of this attack through simulation results. In the end we describe our proposed approach to counter the Primary User Emulation Attack.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Emerging Technologies (ICET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICET.2014.7021026","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
The increasing demand of usable spectrum range startled the world of serious shortage in coming years. Cognitive Radio technology emerged to solve this problem by allowing unlicensed users to utilize the spectrum resources whenever the licensed users are not active. With the emergence of this technology many security issues arose, that if successful may hamper all the benefits this promising technology has to offer. Among many other security issues Primary User Emulation Attack is one. In this paper we discuss the Primary User Emulation Attack. We also discuss the existing work in the field, along with its limitations. We also elucidate the effects of this attack through simulation results. In the end we describe our proposed approach to counter the Primary User Emulation Attack.