Visible to the public Detection Defense against Primary User Emulation Attack in Dynamic Cognitive Radio Networks

TitleDetection Defense against Primary User Emulation Attack in Dynamic Cognitive Radio Networks
Publication TypeConference Paper
Year of Publication2019
AuthorsSureka, N., Gunaseelan, K.
Conference Name2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM)
KeywordsAnalytical models, Cognitive radio, Cognitive radio (CR) network, Cognitive Radio Security, dynamic cognitive radio networks, emulation, Estimation, free spectrum, licensed primary user, ns2, Primary User (PU), primary user emulation attack, Primary User Emulation Attack (PUEA), pubcrawl, radio spectrum management, radiofrequency interference, resilience, Resiliency, Resource management, Secondary User (SUs), Sensors, spectrum access probability, spectrum scarcity problem, spectrum sensing, STEM, telecommunication security, unlicensed secondary users, X-graph, Yardstick based Threshold Allocation (YTA), yardstick based threshold allocation technique
AbstractCognitive radio is a promising technology that intends on solving the spectrum scarcity problem by allocating free spectrum dynamically to the unlicensed Secondary Users (SUs) in order to establish coexistence between the licensed Primary User (PU) & SUs, without causing any interference to the incumbent transmission. Primary user emulation attack (PUEA) is one such major threat posed on spectrum sensing, which decreases the spectrum access probability. Detection and defense against PUEA is realized using Yardstick based Threshold Allocation technique (YTA), by assigning threshold level to the base station thereby efficiently enhancing the spectrum sensing ability in a dynamic CR network. The simulation is performed using NS2 and analysis by using X-graph. The results shows minimum interference to primary transmissions by letting SUs spontaneously predict the prospective spectrum availability and aiding in effective prevention of potential emulation attacks along with proficient improvement of throughput in a dynamic cognitive radio environment.
DOI10.1109/ICONSTEM.2019.8918819
Citation Keysureka_detection_2019