Skip to main content

Mitigation of Primary User Emulation Attacks in Cognitive Radio Networks Using Belief Propagation

  • Conference paper
  • First Online:
Cognitive Radio Oriented Wireless Networks (CrownCom 2015)

Abstract

In this paper, we introduce a belief propagation based technique to combat the effects of primary user emulation attacks (PUEA) in Cognitive Radio (CR) Networks. Primary user emulation attacks have been identified as the most serious threat to CR security. In a PUEA, a malicious user emulates the characteristics of a primary user and transmits over idle channels. As a result, secondary users that want to use the channels are tricked into believing that they are occupied and avoid transmitting on those channels. This allows the malicious user to use the channels uncontested. To moderate the effects of PUEA, we propose a defence strategy based on belief propagation. In our solution, each secondary user examines the incoming signal and calculates the probability that it was transmitted from a primary user. These probabilities are known as beliefs. The beliefs at secondary users are reconciled to an agreed decision by comparison to a predefined threshold. The decision is made by a secondary user on whether it is believed that received transmission on a channel originated from a legitimate primary user or from a primary user emulation attacker.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yuan, Z., Niyato, D., Li, H., Song, J.B., Han, Z.: Defeating primary user emulation attacks using belief propagation in cognitive radio networks. Selected Areas in Communications 30(10), 1850–1860 (2012)

    Article  Google Scholar 

  2. Hossain, E., Niyato, D., Han, Z.: Dynamic spectrum access in cognitive radio networks. Chapter 2, 39–72, June 2009

    Google Scholar 

  3. Mitola III, J., Maguire Jr., G.Q.: Cognitive radio: Making software radios more personal. IEEE Personal Communications 6, 13–18 (1999)

    Article  Google Scholar 

  4. Chen, R., Park, J.-M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. Selected Areas in Communications 26(1), 25–37 (2008)

    Article  Google Scholar 

  5. Thanu, M.: Detection of primary user emulation attacks in cognitive radio networks. Collaboration Technologies and Systems 26(4), 605–608 (2012)

    Google Scholar 

  6. Zhou, X., Xiao, Y., Li, Y.: Encryption and displacement based scheme of defense against primary user emulation attack. Wireless, Mobile & Multimedia Networks 4, 44–49 (2011)

    Google Scholar 

  7. Yedidia, J.S., Freeman, W.T., Weiss, Y.: Understanding belief propagation and its generalizations. Exploring Artificial Intelligence in the New Millennium, Chapter 8, 2282–2312, November 2012

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sasa Maric .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Maric, S., Reisenfeld, S. (2015). Mitigation of Primary User Emulation Attacks in Cognitive Radio Networks Using Belief Propagation. In: Weichold, M., Hamdi, M., Shakir, M., Abdallah, M., Karagiannidis, G., Ismail, M. (eds) Cognitive Radio Oriented Wireless Networks. CrownCom 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 156. Springer, Cham. https://doi.org/10.1007/978-3-319-24540-9_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24540-9_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24539-3

  • Online ISBN: 978-3-319-24540-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics