A novel system model for detecting primary user emulation attack in cognitive radio networks

L. Thulasimani, A. Magdalene
{"title":"A novel system model for detecting primary user emulation attack in cognitive radio networks","authors":"L. Thulasimani, A. Magdalene","doi":"10.1504/ijwmc.2020.10030321","DOIUrl":null,"url":null,"abstract":"The recent advances in wireless communication have addressed the problem of spectrum scarcity. The available wireless spectrum has become insufficient due to the increasing spectrum demand. The largest portion of the allocated spectrum is periodically used that guides to the underutilisation of the spectrum. The idea of Cognitive Radio (CR) technology is introduced to improve the spectrum efficiency. This concept provides a solution for the issue of spectrum demand in wireless networks. Owing the security issues, the CR network poses new challenges in wireless communications. In this article, a Primary User Emulation (PUE) attack is studied from the Neyman-Pearson criterion point of view and a novel system is proposed to overcome the PUE attack. A novel system model contains a different configuration of Primary Users (PUs) which is proposed and studied. The novel system model with maximum likelihood criterion will solve the PUE attack issues as efficiently as possible. The experimental result shows the characteristics of the false alarm and missed detection probability, during the implementation of the proposed system.","PeriodicalId":53709,"journal":{"name":"International Journal of Wireless and Mobile Computing","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Wireless and Mobile Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijwmc.2020.10030321","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

Abstract

The recent advances in wireless communication have addressed the problem of spectrum scarcity. The available wireless spectrum has become insufficient due to the increasing spectrum demand. The largest portion of the allocated spectrum is periodically used that guides to the underutilisation of the spectrum. The idea of Cognitive Radio (CR) technology is introduced to improve the spectrum efficiency. This concept provides a solution for the issue of spectrum demand in wireless networks. Owing the security issues, the CR network poses new challenges in wireless communications. In this article, a Primary User Emulation (PUE) attack is studied from the Neyman-Pearson criterion point of view and a novel system is proposed to overcome the PUE attack. A novel system model contains a different configuration of Primary Users (PUs) which is proposed and studied. The novel system model with maximum likelihood criterion will solve the PUE attack issues as efficiently as possible. The experimental result shows the characteristics of the false alarm and missed detection probability, during the implementation of the proposed system.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种新的认知无线电网络主用户仿真攻击检测系统模型
无线通信的最新进展已经解决了频谱稀缺的问题。由于频谱需求的增加,可用的无线频谱已经变得不足。所分配频谱的最大部分被周期性地使用,这导致频谱的利用不足。为了提高频谱效率,引入了认知无线电(CR)技术的思想。这一概念为无线网络中的频谱需求问题提供了解决方案。由于安全问题,CR网络在无线通信中提出了新的挑战。本文从Neyman-Pearson准则的角度研究了一种主要用户仿真(PUE)攻击,并提出了一种新的系统来克服PUE攻击。提出并研究了一种新的包含不同配置的主用户(PU)的系统模型。新的具有最大似然准则的系统模型将尽可能有效地解决PUE攻击问题。实验结果表明,该系统在实现过程中具有虚警和漏检概率的特点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Wireless and Mobile Computing
International Journal of Wireless and Mobile Computing Computer Science-Computer Science (all)
CiteScore
0.80
自引率
0.00%
发文量
76
期刊介绍: The explosive growth of wide-area cellular systems and local area wireless networks which promise to make integrated networks a reality, and the development of "wearable" computers and the emergence of "pervasive" computing paradigm, are just the beginning of "The Wireless and Mobile Revolution". The realisation of wireless connectivity is bringing fundamental changes to telecommunications and computing and profoundly affects the way we compute, communicate, and interact. It provides fully distributed and ubiquitous mobile computing and communications, thus bringing an end to the tyranny of geography.
期刊最新文献
Robust min-norm algorithms for coherent sources DOA estimation based on Toeplitz matrix reconstruction methods The construction of the competency model and its application in talent cultivation Bifurcation analysis of a predator-prey model with volume-filling mechanism An improved resource allocation architecture using swarm intelligence for mm-Wave MIMO communication architecture Compatibility issues of wireless sensor network routing in internet of things applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1