TY - GEN
T1 - Mitigation of primary user emulation attacks in cognitive radio networks using belief propagation
AU - Maric, Sasa
AU - Reisenfeld, Sam
PY - 2015
Y1 - 2015
N2 - In this paper, we introduce a belief propagation based technique to combat the effects of primary user emulation attacks (PUEA) in Cognitive Radio (CR) Networks. Primary user emulation attacks have been identified as the most serious threat to CR security. In a PUEA, a malicious user emulates the characteristics of a primary user and transmits over idle channels. As a result, secondary users that want to use the channels are tricked into believing that they are occupied and avoid transmitting on those channels. This allows the malicious user to use the channels uncontested. To moderate the effects of PUEA, we propose a defence strategy based on belief propagation. In our solution, each secondary user examines the incoming signal and calculates the probability that it was transmitted from a primary user. These probabilities are known as beliefs. The beliefs at secondary users are reconciled to an agreed decision by comparison to a predefined threshold. The decision is made by a secondary user on whether it is believed that received transmission on a channel originated from a legitimate primary user or from a primary user emulation attacker.
AB - In this paper, we introduce a belief propagation based technique to combat the effects of primary user emulation attacks (PUEA) in Cognitive Radio (CR) Networks. Primary user emulation attacks have been identified as the most serious threat to CR security. In a PUEA, a malicious user emulates the characteristics of a primary user and transmits over idle channels. As a result, secondary users that want to use the channels are tricked into believing that they are occupied and avoid transmitting on those channels. This allows the malicious user to use the channels uncontested. To moderate the effects of PUEA, we propose a defence strategy based on belief propagation. In our solution, each secondary user examines the incoming signal and calculates the probability that it was transmitted from a primary user. These probabilities are known as beliefs. The beliefs at secondary users are reconciled to an agreed decision by comparison to a predefined threshold. The decision is made by a secondary user on whether it is believed that received transmission on a channel originated from a legitimate primary user or from a primary user emulation attacker.
UR - http://www.scopus.com/inward/record.url?scp=84952666718&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-24540-9_38
DO - 10.1007/978-3-319-24540-9_38
M3 - Conference proceeding contribution
AN - SCOPUS:84952666718
SN - 9783319245393
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 463
EP - 476
BT - Cognitive Radio Oriented Wireless Networks
A2 - Weichold, Mark
A2 - Hamdi, Mounir
A2 - Zeeshan Shakir, Muhammad
A2 - Abdallah, Mohamed
A2 - Karagiannidis, George K.
A2 - Ismail, Muhammad
PB - Springer, Springer Nature
CY - Cham
T2 - 10th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2015
Y2 - 21 April 2015 through 23 April 2015
ER -