Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks
- 16 October 2012
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 30 (10), 1850-1860
- https://doi.org/10.1109/jsac.2012.121102
Abstract
Cognitive radio (CR) is a promising technology for future wireless spectrum allocation to improve the usage of the licensed bands. However, CR wireless networks are susceptible to various attacks and cannot offer efficient security. Primary user emulation (PUE) is one of the most serious attacks for CR networks, which can significantly increase the spectrum access failure probability. In this paper, we propose a defense strategy against the PUE attack in CR networks using belief propagation, which avoids the deployment of additional sensor networks and expensive hardware in the networks used in the existing literatures. In our proposed approach, each secondary user calculates the local function and the compatibility function, computes the messages, exchanges messages with the neighboring users, and calculates the beliefs until convergence. Then, the PUE attacker will be detected, and all the secondary users in the network will be notified in a broadcast way about the characteristics of the attacker's signal. Therefore, all SUs can avoid the PUE attacker's primary emulation signal in the future. Simulation results show that our proposed approach converges quickly, and is effective to detect the PUE attacker.Keywords
This publication has 24 references indexed in Scilit:
- Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Cryptographic link signatures for spectrum usage authentication in cognitive radioPublished by Association for Computing Machinery (ACM) ,2011
- Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel StatisticsIEEE Transactions on Wireless Communications, 2010
- Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel StatisticsIEEE Transactions on Wireless Communications, 2010
- Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- A Bayesian Game Analysis of Emulation Attacks in Dynamic Spectrum Access NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link SignaturesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Reliability of Spectrum Sensing Under Noise and Interference UncertaintyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- An Analytical Model for Primary User Emulation Attacks in Cognitive Radio NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Detecting primary receivers for cognitive radio applicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005