An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks

04/24/2018
by   Qi Dong, et al.
0

The proliferation of advanced information technologies (IT), especially the wide spread of Internet of Things (IoTs) makes wireless spectrum a precious resource. Cognitive radio network (CRN) has been recognized as the key to achieve efficient utility of communication bands. Because of the great difficulty, high complexity and regulations in dynamic spectrum access (DSA), it is very challenging to protect CRNs from malicious attackers or selfish abusers. Primary user emulation (PUE) attacks is one type of easy-to-launch but hard-to-detect attacks in CRNs that malicious entities mimic PU signals in order to either occupy spectrum resource selfishly or conduct Denial of Service (DoS) attacks. Inspired by the physical features widely used as the fingerprint of variant electronic devices, an adaptive and realistic PUE attack detection technique is proposed in this paper. It leverages the PU transmission features that attackers are not able to mimic. In this work, the transmission power is selected as one of the hard-to-mimic features due to the intrinsic discrepancy between PUs and attackers, while considering constraints in real implementations. Our experimental results verified the effectiveness and correctness of the proposed mechanism.

READ FULL TEXT
research
05/01/2018

Explore Recurrent Neural Network for PUE Attack Detection in Practical CRN Models

The proliferation of the Internet of Things (IoTs) and pervasive use of ...
research
06/21/2021

Detection Of Primary User Emulation Attack (PUEA) In Cognitive Radio Networks Using One-Class Classification

Opportunistic usage of spectrum owned by licensed (or primary) users is ...
research
03/08/2019

Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter

Cognitive radio technology addresses the problem of spectrum scarcity by...
research
12/20/2019

Game-theory-based analysis on interactions among secondary and malicious users in coordinated jamming attack in cognitive radio systems

IEEE 802.22 standard utilizes cognitive radio (CR) techniques to allow s...
research
06/29/2020

Towards Learning-automation IoT Attack Detection through Reinforcement Learning

As a massive number of the Internet of Things (IoT) devices are deployed...
research
06/15/2021

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals

The Controller Area Network (CAN) is used for communication between in-v...
research
06/25/2020

On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities

Traffic Collision Avoidance Systems (TCAS) are safety-critical systems r...

Please sign up or login with your details

Forgot password? Click here to reset