{"title":"Authentication Based Primary User Emulation Attack Mitigation in Cognitive Radio","authors":"J. Avila, S. Prem, S. Rajapradeepa, K. Thenmozhi","doi":"10.1109/ICCCI.2018.8441397","DOIUrl":null,"url":null,"abstract":"With the tremendous growth and increased use of wireless technology for communication, corruption of data due to channel noise and hacking of data by the intruders become inevitable. One of the vital attacks in the physical layer of the cognitive radio is Primary User Emulation Attack (PUEA). Cognitive radio has risen as a solution for spectrum shortage issue raised due to the excessive usage of wireless devices. This manuscript focusses on mitigating the PUEA with the aid of some special sequences known as authentication tag. The tag is generated in two ways- gold codes are treated as authentication tag and Pseudo Noise (PN) are considered as tag. The tags are embedded with the signal and transmitted to the cognitive radio. Mitigating the PUEA eliminates the wastage of bandwidth and results in effective dynamic spectrum access.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI.2018.8441397","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
With the tremendous growth and increased use of wireless technology for communication, corruption of data due to channel noise and hacking of data by the intruders become inevitable. One of the vital attacks in the physical layer of the cognitive radio is Primary User Emulation Attack (PUEA). Cognitive radio has risen as a solution for spectrum shortage issue raised due to the excessive usage of wireless devices. This manuscript focusses on mitigating the PUEA with the aid of some special sequences known as authentication tag. The tag is generated in two ways- gold codes are treated as authentication tag and Pseudo Noise (PN) are considered as tag. The tags are embedded with the signal and transmitted to the cognitive radio. Mitigating the PUEA eliminates the wastage of bandwidth and results in effective dynamic spectrum access.