Abstract
In this paper, we introduce a belief propagation based technique to combat the effects of primary user emulation attacks (PUEA) in Cognitive Radio (CR) Networks. Primary user emulation attacks have been identified as the most serious threat to CR security. In a PUEA, a malicious user emulates the characteristics of a primary user and transmits over idle channels. As a result, secondary users that want to use the channels are tricked into believing that they are occupied and avoid transmitting on those channels. This allows the malicious user to use the channels uncontested. To moderate the effects of PUEA, we propose a defence strategy based on belief propagation. In our solution, each secondary user examines the incoming signal and calculates the probability that it was transmitted from a primary user. These probabilities are known as beliefs. The beliefs at secondary users are reconciled to an agreed decision by comparison to a predefined threshold. The decision is made by a secondary user on whether it is believed that received transmission on a channel originated from a legitimate primary user or from a primary user emulation attacker.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yuan, Z., Niyato, D., Li, H., Song, J.B., Han, Z.: Defeating primary user emulation attacks using belief propagation in cognitive radio networks. Selected Areas in Communications 30(10), 1850–1860 (2012)
Hossain, E., Niyato, D., Han, Z.: Dynamic spectrum access in cognitive radio networks. Chapter 2, 39–72, June 2009
Mitola III, J., Maguire Jr., G.Q.: Cognitive radio: Making software radios more personal. IEEE Personal Communications 6, 13–18 (1999)
Chen, R., Park, J.-M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. Selected Areas in Communications 26(1), 25–37 (2008)
Thanu, M.: Detection of primary user emulation attacks in cognitive radio networks. Collaboration Technologies and Systems 26(4), 605–608 (2012)
Zhou, X., Xiao, Y., Li, Y.: Encryption and displacement based scheme of defense against primary user emulation attack. Wireless, Mobile & Multimedia Networks 4, 44–49 (2011)
Yedidia, J.S., Freeman, W.T., Weiss, Y.: Understanding belief propagation and its generalizations. Exploring Artificial Intelligence in the New Millennium, Chapter 8, 2282–2312, November 2012
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Maric, S., Reisenfeld, S. (2015). Mitigation of Primary User Emulation Attacks in Cognitive Radio Networks Using Belief Propagation. In: Weichold, M., Hamdi, M., Shakir, M., Abdallah, M., Karagiannidis, G., Ismail, M. (eds) Cognitive Radio Oriented Wireless Networks. CrownCom 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 156. Springer, Cham. https://doi.org/10.1007/978-3-319-24540-9_38
Download citation
DOI: https://doi.org/10.1007/978-3-319-24540-9_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24539-3
Online ISBN: 978-3-319-24540-9
eBook Packages: Computer ScienceComputer Science (R0)