Spectrum Sensing in Cognitive Radio Networks Under Security Threats and Hybrid Spectrum Access
Spectrum sensing in cognitive radio networks (CRNs) is subjected to some security threats such as primary user emulation (PUE) attack. In PUE attack, malicious users (MUPUE) transmit an emulated primary signal throughout the spectrum sensing interval of secondary users (SUs) to prevent them from accessing the primary user (PU) spectrum band. The performance of spectrum sensing under PUE attack is studied for two types of energy detectors: conventional energy detector (CED) and improved energy detector (IED). In spectrum access, a hybrid spectrum access scheme (a combination of overlay mode and underlay mode) is often promising. A novel analytical expression for SU network throughput under the PUE attack is developed under hybrid spectrum access in this chapter. A threshold optimization technique is studied to reduce the sensing error and improve the network throughput in the presence of attacker. Impact of several parameters such as sensing time, IED parameter, probability of attacker’s presence, attacker strength, maximum allowable SU transmit power, and tolerable interference limit at PU on the SU throughput is investigated. A simulation model is developed based on MATLAB to support our analytical formulations.
- 3.Amjad M, Rehmani MH, Mao S (2018) Wireless multimedia cognitive radio networks: a comprehensive survey. IEEE Commun Sur Tutorials:1–49. https://doi.org/10.1109/COMST.2018.2794358
- 4.Federal Communications Commission (2003) Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies, notice of proposed rulemaking and order, FCC 03–322Google Scholar
- 8.Singh A, Bhatnagar MR, Mallik RK (2011) Cooperative spectrum sensing with an Improved energy detector in cognitive radio network. In: Proceedings of NCC 2011, Indian Institute of Science, Bangalore, pp 1–5. https://doi.org/10.1109/NCC.2011.5734777
- 15.Chen R, Park JM (2006) Ensuring trustworthy spectrum sensing in cognitive radio networks. 1st IEEE workshop on networking technologies for software defined radio networks. pp 110–119. https://doi.org/10.1109/SDR.2006.4286333
- 17.Anand S, Jin Z, Subbalakshmi KP (2008) An analytical model for primary user emulation attacks in cognitive radio networks. In: Proceedings of the IEEE 3rd international symposium of new frontiers in dynamic spectrum access networks. pp 1–6. https://doi.org/10.1109/DYSPAN.2008.16
- 19.Shrivastava S, Rajesh A, Bora PK (2015) A simplified counter approach to primary user emulation attacks from secondary user perspective. IEEE 26th annual international symposium on personal, indoor, and mobile radio communications. pp 2149–2154. https://doi.org/10.1109/pimrc.2015.7343653