Mitigation of primary user emulation attacks in cognitive radio networks using belief propagation

Sasa Maric*, Sam Reisenfeld

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)

Abstract

In this paper, we introduce a belief propagation based technique to combat the effects of primary user emulation attacks (PUEA) in Cognitive Radio (CR) Networks. Primary user emulation attacks have been identified as the most serious threat to CR security. In a PUEA, a malicious user emulates the characteristics of a primary user and transmits over idle channels. As a result, secondary users that want to use the channels are tricked into believing that they are occupied and avoid transmitting on those channels. This allows the malicious user to use the channels uncontested. To moderate the effects of PUEA, we propose a defence strategy based on belief propagation. In our solution, each secondary user examines the incoming signal and calculates the probability that it was transmitted from a primary user. These probabilities are known as beliefs. The beliefs at secondary users are reconciled to an agreed decision by comparison to a predefined threshold. The decision is made by a secondary user on whether it is believed that received transmission on a channel originated from a legitimate primary user or from a primary user emulation attacker.

Original languageEnglish
Title of host publicationCognitive Radio Oriented Wireless Networks
Subtitle of host publication10th International Conference, CROWNCOM 2015, Doha, Qatar, April 21-23, 2015, Revised Selected Papers
EditorsMark Weichold, Mounir Hamdi, Muhammad Zeeshan Shakir, Mohamed Abdallah, George K. Karagiannidis, Muhammad Ismail
Place of PublicationCham
PublisherSpringer, Springer Nature
Pages463-476
Number of pages14
ISBN (Electronic)9783319245409
ISBN (Print)9783319245393
DOIs
Publication statusPublished - 2015
Event10th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2015 - Doha, Qatar
Duration: 21 Apr 201523 Apr 2015

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
PublisherSpringer International Publishing
Volume156
ISSN (Print)1867-8211
ISSN (Electronic)1867-822X

Other

Other10th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2015
CountryQatar
CityDoha
Period21/04/1523/04/15

Fingerprint Dive into the research topics of 'Mitigation of primary user emulation attacks in cognitive radio networks using belief propagation'. Together they form a unique fingerprint.

Cite this