CFP last date
20 June 2024
Reseach Article

A Survey on Security Issues and Primary User Emulation Attack Detection Techniques in Cognitive Radio Network

Published on July 2016 by Nikita Thalia, Archana Ingle, Karishma Raut, Madhura Tilak
National Conference on Role of Engineers in National Building
Foundation of Computer Science USA
NCRENB2016 - Number 3
July 2016
Authors: Nikita Thalia, Archana Ingle, Karishma Raut, Madhura Tilak
1dd82f78-fbfb-4f06-8f64-dbe986ba2c85

Nikita Thalia, Archana Ingle, Karishma Raut, Madhura Tilak . A Survey on Security Issues and Primary User Emulation Attack Detection Techniques in Cognitive Radio Network. National Conference on Role of Engineers in National Building. NCRENB2016, 3 (July 2016), 10-15.

@article{
author = { Nikita Thalia, Archana Ingle, Karishma Raut, Madhura Tilak },
title = { A Survey on Security Issues and Primary User Emulation Attack Detection Techniques in Cognitive Radio Network },
journal = { National Conference on Role of Engineers in National Building },
issue_date = { July 2016 },
volume = { NCRENB2016 },
number = { 3 },
month = { July },
year = { 2016 },
issn = 0975-8887,
pages = { 10-15 },
numpages = 6,
url = { /proceedings/ncrenb2016/number3/25566-4056/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Role of Engineers in National Building
%A Nikita Thalia
%A Archana Ingle
%A Karishma Raut
%A Madhura Tilak
%T A Survey on Security Issues and Primary User Emulation Attack Detection Techniques in Cognitive Radio Network
%J National Conference on Role of Engineers in National Building
%@ 0975-8887
%V NCRENB2016
%N 3
%P 10-15
%D 2016
%I International Journal of Computer Applications
Abstract

With the improvement in wireless technology and services, unlicensed, Industrial, Medical and Scienti?c (ISM) band is getting overloaded, which leads to spectrum shortage problem. On the other hand, several part of fixed allocated spectrum is underutilized. Cognitive Radio is new and intriguing technology that enables a more flexible and efficacious usage of the radio spectrum. Basically, this technology allows unlicensed users to use licensed spectrum, without interfering with the incumbent transmission. As Cognitive radio networks are wireless in nature, they suffer from all the classic threats present in traditional wireless networks. This paper focuses on an attack that poses a threat to spectrum sensing function of CR, known as Primary User Emulation Attack (PUEA). In this attack is a malicious secondary user mimics signal characteristics of a primary user to acquire channel resources without sharing with other secondary users, thus reducing spectrum usage probability and efficiency. The objective of this paper is to highlight various security issues related to dynamic spectrum access then discuss the PUEA with the existing countermeasures to mitigate it. In addition, future security challenges are addressed.

References
  1. Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran and Shantidev Mohanty, Next Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey, Elsevier Computer Networks, Vol. 50, 2006, pp. 2127-2159.
  2. Mitola, J. ; Maguire, G. Q. , Jr. , "Cognitive radio: making software radios more personal," Personal Communications, IEEE , vol. 6, no. 4, pp. 13,18, Aug 1999.
  3. Haykin, S. , "Cognitive radio: brain-empowered wireless communications," Selected Areas in Communications, IEEE Journal on , Vol. 23, no. 2, pp. 201,220, Feb. 2005.
  4. Wassim El-Hajj; Haider Safa; Mohsen Guizani, "Survey of Security issues in Cognitive Radio Network," journal of internet technology, volume 12 2011
  5. Ruiliang Chen and Jung-Min Park, Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks, First IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR), Reston, VA, September, 2006, pp. 110-119.
  6. Ruiliang Chen; Jung-Min Park; Reed, J. H. , "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," Selected Areas in Communications, IEEE Journal on , vol. 26, no. 1, pp. 25,37, Jan. 2008.
  7. Olga León, Juan Hernández-Serrano, Miguel Soriano, Cooperative detection of primary user emulation attacks in CRNs, Computer Networks, Volume 56, Issue 14, 28 September 2012.
  8. Z. Jin and K. Subbalakshmi, "Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks," in Proc. ICC, 2009, pp. 1–5
  9. Z. Jin, S. Anand, and K. Subbalakshmi, "Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing," in Proc. ACM SigMobile Computing and Communication Review, 2009, pp. 74–85.
  10. Y. Liu, P. Ning, and H. Dai, "Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures," in Proc. 2010 IEEE Symposium on Security and Privacy, 2010, pp. 286–301.
  11. Z. Chen, T. Cooklev, C. Chen, and C. Pomalaza-Raez, "Modeling primary user emulation attacks and defenses in cognitive radio networks," in Proc. of IPCCC, 2009, pp. 208–215.
  12. C. Mathur and P. Subbalakshmi, "Digital signatures for centralized DSA networks," in Proc. 1st IEEE Workshop on Cognitive Radio Networks, 2007, pp. 1037–1041.
  13. Shaxun Chen; Kai Zeng; Mohapatra, P. , "Hearing is believing: Detecting mobile primary user emulation attack in white space," INFOCOM, 2011 Proceedings IEEE, vol. , no. , pp. 36, 40, 10-15 April 2011.
  14. Zhou Yuan; Niyato, D. ; Husheng Li; Zhu Han, "Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks," Wireless Communications and Networking Conference (WCNC), 2011 IEEE , vol. , no. , pp. 599,604, 28-31 March 2011.
  15. Zhou Yuan; Niyato, D. ; Husheng Li; Ju Bin Song; Zhu Han, "Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks," Selected Areas in Communications, IEEE Journal on , vol. 30, no. 10, pp. 1850,1860, November 2012.
  16. Zhou, Xiao; Xiao, Yang; Li, Yuanyuan, "Encryption and displacement based scheme of defense against Primary User Emulation Attack," Wireless, Mobile & Multimedia Networks (ICWMMN 2011), 4th IET International Conference on , vol. , no. , pp. 44,49, 27-30 Nov. 2011. .
  17. Chandrashekar, S. ; Lazos, L. , "A Primary User authentication system for mobile cognitive radio networks," Applied Sciences in Biomedical and Communication Technologies (ISABEL), 2010 3rd International Symposium on, vol. , no. , pp. 1, 5, 7-10 Nov. 2010.
  18. Jin, Z. ; Anand, S. ; Subbalakshmi, K. P. , "Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks," Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE , vol. , no. , pp. 1,5, 6-10 Dec. 2010. Y
  19. T. Charles Clancy and Nathan Goergen, Security in Cognitive Radio Networks: Threats and Mitigation, International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), Singapore, May, 2008, pp. 1-8.
  20. Anand, S. ; Jin, Z. ; Subbalakshmi, K. P. , "An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks," New Frontiers in Dynamic Spectrum Access Networks, 2008. DySPAN 2008. 3rd IEEE Symposium on, vol. , no. , pp. 1, 6, 14-17 Oct. 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Radio Spectrum Defense Techniques Security Issues Dynamic Spectrum Access