CFP last date
01 January 2025
Reseach Article

Maximum Utility Function Approach for Detection of Primary User Emulation Attack in Cognitive Radio Networks

by Abbas Ali Sharifi, Mohammad Mofarreh-Bonab
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 8
Year of Publication: 2017
Authors: Abbas Ali Sharifi, Mohammad Mofarreh-Bonab
10.5120/cae2017652533

Abbas Ali Sharifi, Mohammad Mofarreh-Bonab . Maximum Utility Function Approach for Detection of Primary User Emulation Attack in Cognitive Radio Networks. Communications on Applied Electronics. 6, 8 ( Mar 2017), 17-21. DOI=10.5120/cae2017652533

@article{ 10.5120/cae2017652533,
author = { Abbas Ali Sharifi, Mohammad Mofarreh-Bonab },
title = { Maximum Utility Function Approach for Detection of Primary User Emulation Attack in Cognitive Radio Networks },
journal = { Communications on Applied Electronics },
issue_date = { Mar 2017 },
volume = { 6 },
number = { 8 },
month = { Mar },
year = { 2017 },
issn = { 2394-4714 },
pages = { 17-21 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume6/number8/712-2017652533/ },
doi = { 10.5120/cae2017652533 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:56:23.968696+05:30
%A Abbas Ali Sharifi
%A Mohammad Mofarreh-Bonab
%T Maximum Utility Function Approach for Detection of Primary User Emulation Attack in Cognitive Radio Networks
%J Communications on Applied Electronics
%@ 2394-4714
%V 6
%N 8
%P 17-21
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Inherent nature of Cognitive Radio (CR) networks has imposed some serious threats to wireless communications. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud CR users to prevent them from accessing the spectrum holes. As a countermeasure against PUEA, we propose Maximum Utility Detection (MUD) approach. A 3-level hypotheses test is considered and maximum utility criterion is applied to choose the hold hypothesis. Simulation results are provided to indicate the superiority of the proposed MUD method against PUEA compared with conventional method.

References
  1. J. Mitola, G. Q. Maguire, “Cognitive radio: making software radios more personal,” IEEE Personal Communication, vol. 6, no. 4, pp. 13-18, 1999.
  2. S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201-220, 2005.
  3. I. F. Akyildiz, W. Y. Lee, M. C. Vuran, S. Mohanty, “NeXt generation/dynamic spectrum access cognitive radio wireless networks: A survey,” Computer Networks, vol. 50, no. 13, pp. 2127-2159, 2006.
  4. R. Chen, J. M. Park, “Ensuring trustworthy spectrum sensing in cognitive radio networks,” In 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, pp. 110-119, 2006.
  5. S. Anand, Z. Jin, K. Subbalakshmi, “An analytical model for primary user emulation attacks in cognitive radio networks,” In Proceeding IEEE International Dynamic Spectrum Access Networks, pp. 1-6, 2008.
  6. R. Chen, J. M. Park, J. H. Reed, “Defense against primary user emulation attacks in cognitive radio networks,” IEEE Journal of Selected Area in Communications, vol. 26, no. 1, pp. 25-37, 2008.
  7. C. Chen, H. Cheng, Y. D. Yao, “Cooperative spectrum sensing in cognitive radio networks in the presence of the primary user emulation attack,” IEEE Transactions on Wireless Communications, vol. 10, no. 7, pp. 2135-2141, 2011.
  8. M. Haghighat, S. M. S. Sadough, “Cooperative spectrum sensing for cognitive radio networks in the presence of smart malicious users,” International Journal of Electronics and Communications (AUE), vol. 68, no. 6, pp. 520-527, 2014.
  9. Haghighat M, Sadough SMS. Smart primary user emulation in cognitive radio networks: defense strategies against radio-aware attacks and robust spectrum sensing. Transactions on Emerging Telecommunications Technologies, vol. 26, no. 9, pp. 1154-1164, 2015.
  10. R. Yu, Y. Zhang, Y. Liu, S. Gjessing and M. Guizani, “Securing Cognitive Radio Networks against Primary User Emulation Attacks,” IEEE Network, vol. 30, no. 6, pp. 62-69, 2016.
  11. A. A. Sharifi, M. Sharifi, M. J. Musevi Niya. “Collaborative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks,” IETE Journal of Research, vol. 62, no. 2, pp. 205-211, 2016.
  12. A. A. Sharifi, M. Sharifi, M. J. Musevi Niya. Secure cooperative spectrum sensing under primary user emulation attack in cognitive radio networks: Attack-aware threshold selection approach. AEU - International Journal of Electronics and Communications, vol. 70, no. 1, pp. 95-104, 2016.
  13. J. Ma, G. Zhao, Y. Li, “Soft combination and detection for cooperative spectrum sensing in cognitive radio networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 11, pp. 4502-4507, 2008.
  14. P. K. Varshney, “Distributed Detection and Data Fusion,” Springer-Verlag, 1997.
Index Terms

Computer Science
Information Sciences

Keywords

Cognitive Radio Spectrum Sensing Primary User Emulation Attack Maximum Utility Detection.