Authentication Based Primary User Emulation Attack Mitigation in Cognitive Radio

J. Avila, S. Prem, S. Rajapradeepa, K. Thenmozhi
{"title":"Authentication Based Primary User Emulation Attack Mitigation in Cognitive Radio","authors":"J. Avila, S. Prem, S. Rajapradeepa, K. Thenmozhi","doi":"10.1109/ICCCI.2018.8441397","DOIUrl":null,"url":null,"abstract":"With the tremendous growth and increased use of wireless technology for communication, corruption of data due to channel noise and hacking of data by the intruders become inevitable. One of the vital attacks in the physical layer of the cognitive radio is Primary User Emulation Attack (PUEA). Cognitive radio has risen as a solution for spectrum shortage issue raised due to the excessive usage of wireless devices. This manuscript focusses on mitigating the PUEA with the aid of some special sequences known as authentication tag. The tag is generated in two ways- gold codes are treated as authentication tag and Pseudo Noise (PN) are considered as tag. The tags are embedded with the signal and transmitted to the cognitive radio. Mitigating the PUEA eliminates the wastage of bandwidth and results in effective dynamic spectrum access.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI.2018.8441397","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

With the tremendous growth and increased use of wireless technology for communication, corruption of data due to channel noise and hacking of data by the intruders become inevitable. One of the vital attacks in the physical layer of the cognitive radio is Primary User Emulation Attack (PUEA). Cognitive radio has risen as a solution for spectrum shortage issue raised due to the excessive usage of wireless devices. This manuscript focusses on mitigating the PUEA with the aid of some special sequences known as authentication tag. The tag is generated in two ways- gold codes are treated as authentication tag and Pseudo Noise (PN) are considered as tag. The tags are embedded with the signal and transmitted to the cognitive radio. Mitigating the PUEA eliminates the wastage of bandwidth and results in effective dynamic spectrum access.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于认证的认知无线电主用户仿真攻击缓解
随着无线通信技术的飞速发展和使用的增加,由于信道噪声和入侵者入侵数据而导致的数据损坏是不可避免的。主要用户仿真攻击是认知无线电物理层的重要攻击之一。认知无线电是为解决因过度使用无线设备而出现的频谱不足问题而兴起的。本文的重点是通过一些称为身份验证标签的特殊序列来减轻PUEA。该标签有两种生成方式:将金码作为认证标签,将伪噪声(PN)作为标签。标签嵌入信号并传输到认知无线电。减小PUEA可以消除带宽的浪费,实现有效的动态频谱接入。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Critical review of machine learning approaches to apply big data analytics in DDoS forensics Detection of the effect of exercise on APG signals Categorisation of security threats for smart home appliances Rotation-based LTE downlink resource scheduling using queue status monitoring Design and Analysis of Booth Multiplier with Optimised Power Delay Product
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1