A Novel Technique to Prevent PUE Attack in Cognitive Radio Network

Full Text (PDF, 336KB), PP.44-50

Views: 0 Downloads: 0

Author(s)

Poonam 1,* Ekta gupta 1 C.K. Nagpal 1

1. YMCA University of Science and Technology, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.12.06

Received: 11 May 2016 / Revised: 26 Aug. 2016 / Accepted: 1 Oct. 2016 / Published: 8 Dec. 2016

Index Terms

Cognitive radio network, security, primary user emulation attack, trust-based mitigation, reputation-based mitigation, primary user emulation attack prevention

Abstract

Need of wireless communication is increasing to work from distance. That is why new applications are made everyday which increases demand of spectrum but due to limitation of spectrum and inefficient utilization of spectrum. A new paradigm is constituted which is called Cognitive Radio Network (CRN). It get more attention in recent times due to most promising solution for the efficient utilization of spectrum. Spectrum sensing in CRN makes it prone to many attacks on each layer. One of these attacks is PUE attack where a malicious user pretends to be a primary user and not let others to use primary user's channel in its absence. It may cause Denial of Service attack in the network. There are many techniques available in the literature for detection and prevention of PUE attack but still there are some limitations in these approaches. Current research provides detection results based on the energy level of all users in the network. In this paper we provide a novel approach to prevent PUE attacker based on signal activity patterns. Simulation is done in MATLAB-2013 and results show that proposed method gives excellent performance.

Cite This Paper

Poonam, Ekta gupta, C.K. Nagpal, "A Novel Technique to Prevent PUE Attack in Cognitive Radio Network", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.12, pp.44-50, 2016. DOI:10.5815/ijcnis.2016.12.06

Reference

[1]C. Sumathi, & R. Vidhyapriya, “Intense explore algorithm-A Proactive Way to Eliminate PUE attacks in cognitive radio networks”. International Journal of Applied Engineering Research, 2015, 10 (2), 3827–3842.
[2]Y. Zeng, & Y.C. Liang,, “Maximum-Minimum Eigen-value Detection for Cognitive Radio”. IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications, 2007, 1-5.
[3]S. Anand, Z. Jin, & K. P. Subbalakshmi, “Analytical model for primary user emulation attacks in cognitive radio networks”. IEEE Symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN’2008), 1-6.
[4]R. Chen, J.-M. Park & J. H. Reed, “Defense against Primary User Emulation Attacks in Cognitive Radio Networks”. IEEE Journal on Selected Area in Communications, 2008, 26(1), 25-37.
[5]Z. Jin, S. Anand, & K. P. Subbalakshmi, “Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing”. ACM Mobile Computing and Communications Review (MC2R): Special Issue on Cognitive Radio Networks, 2009, 13(2), 74-85.
[6]W. Wang, “Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks”, 130–134.
[7]S. Bhattacharjee, S. Sengupta, & M. Chatterjee, “Vulnerabilities in cognitive radio networks” A survey. Elsevier-Computer Communications, 2013, 36(13), 1387–1398.
[8]Chen, H. Cheng, & Y. Yao, “Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack”, IEEE Transactions on Wireless Communications, 2011,10(7), 2135–2141.
[9]Z. Yuan, D. Niyato, H. Li, J.B. Song & Z. Han,“ Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks”. Selected Areas in Communications, IEEE Journal, 2012, 30 (10), 1850-1860.
[10]R. Chen & J.-M. Park, “Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks” Networking Technologies for Software Defined Radio Networks. SDR ’06.1st IEEE Workshop on, 2006, 110–119.
[11]X. Xie, & W. Wang, “ Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding”, Proceeding of Computer Science, 2013, 21, 430–435.
[12]Alahmadi, M. Abdelhakim, J. Ren, & T. Li, “Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard”. Global Communications Conference (GLOBECOM), IEEE, 2013, 3229–3234.
[13]R. Yu, Y. Zhang, Y. Liu, S. Gjessin, & M. Guizani, “Securing cognitive radio networks against primary user emulation attacks”. IEEE Networks, 2015, 29(4), 68–74.
[14]Sorrells, P. Potier, L. Qian & X. Li, “Anomalous spectrum usage attack detection in Cognitive Radio Wireless Networks”. IEEE International Conference on Technologies for Homeland Security (HST), 2011, 384-389.
[15]Meena Thanu, “Detection of Primary User Emulation Attacks in Cognitive Radio Networks”. International Conference on Collaboration Technologies and Systems (CTS), 2012, 605-608
[16]Clancy, C., Hecker, J., Stuntebeck, E., and O'Shea, T., “Applications of machine learning to cognitive radio networks”, Wireless Communications, IEEE, 14(4):47-52, (2007).
[17]S. Haykin, “Cognitive Radio?: Brain-Empowered wireless communications”, IEEE Journal on Selected Areas in Communications , 2005, 23(2), 201–220.
[18]Das, “Primary User Emulation Attack in Cognitive Radio Networks?” A Survey. International Journal of Computer Networks and Wireless Communications, 2013, 3(3), 312–318.
[19]Y. C. Liang, K. C. Chen, G. Y. Li, &, P. Mahonen, “Cognitive radio networking and communications: An overview. IEEE Transactions on Vehicular Technology”, 2011, 60(7), 3386–3407.
[20]Z. Jin, S. Anand& K. P. Subbalakshmi, “Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks”. IEEE Transaction Communications, 2012, 60(9), 2635–2643.
[21]Abhilasha Singh, Anita Sharma,” A Survey of various Defense Techniques to detect Primary User Emulation Attacks”, International Journal of Current Engineering and Technology, Vol.4, No. 2, April 2014.
[22]Deepa Das, Susmita Das, “Primary User Emulation Attack in Cognitive Radio Networks: A Survey”, IRACST, Vol.3, No3, June 2013.
[23]Carl R. Stevenson, Gerald Chouinard, “IEEE 802.22: The First Cognitive Radio Wireless Regional Area Network Standard”, IEEE Communications Magazine, January 2009.
[24]Zeng, Y., Liang, Y.-C., Hoang, A. T., and Zhang, R., “A review on spectrum sensing for cognitive radio: challenges and solutions”, EURASIP J. Adv. Signal Process, 2010.
[25]V. Kukreja, S. Gupta, B. Bhushan, & P. Mittal, “Enhancement of Spectrum Efficacy using Cognitive Radio Networks”. International Journal of Future Generation Communication and Networking, 2015 8(2), 265–272.
[26]C. Kiruthika, A.C. Sumathi, “A Study on Primary User Emulation Attack in Cognitive Radio Networks”, International Journal of Computer Science Engineering and Technology (IJCSET), 2014, 4(10), 260–262.
[27]Adelantado, & C. Verikoukis, “Detection of malicioususers in cognitive radio ad hoc networks”, A non-parametric statistical approach. Ad Hoc Networks, 2013, 11 (8), 2367–2380.
[28]Jin, Z. Anand, S., "Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks, "Communications, IEEE Transactions, vol.60, no.9, pp.2635, 2643, September 2012.
[29]Z. Jin, S. Anand, & K.P. Subbalakshmi, “Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks”. Global Telecommunications Conference (GLOBECOM) IEEE, 2010, 1-5.
[30]E. Gupta, Poonam & C. K. Nagpal, “Survey on PUE Attack Detection and Prevention Techniques”, International Journal of Emerging Technologies in Engineering Research (IJETER-2016), 4(4), 90–95.
[31]Vivek Kukreja, Shailender Gupta, Bharat Bhushan and Chander Kumar, “Towards Performance Evaluation of Cognitive Radio Networks in Realistic Environment”, published in IJCNIS-2014, pp. 61-77, DOI: 10.5815.
[32]Poonam Mittal, Mehak Jain and C. K. Nagpal, “A Throughput and spectrum aware fuzzy logic based routing protocol for CRN”, published in IJCNIS-2016, pp. 58-64, DOI: 10.5815.