Primary user emulation (PUE) attacks and mitigation for cognitive radio (CR) network security

  • Shweta K. Kanhere
  • Amol D. Potgantwar
  • Vijay M. Wadhai
Conference paper


The need to meet the ever-increasing spectrum demands of emerging wireless applications and the need to better utilize spectrum have led the Federal Communications Commission (FCC) to revisit the problem of spectrum management. In the conventional spectrum management paradigm, most of the spectrum is allocated to licensed users for exclusive use. Recognizing the significance of the spectrum shortage problem, the FCC is considering opening up licensed bands to unlicensed operations on a non-interference basis to licensed users. In this new paradigm, unlicensed users (a.k.a. secondary users) “opportunistically” operate in fallow licensed spectrum bands without interfering with licensed users (a.k.a. primary or incumbent users), thereby increasing the efficiency of spectrum utilization. This method of sharing is often called Dynamic Spectrum Access (DSA).


Medium Access Control Cognitive Radio Primary User Secondary User Federal Communication Commission 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    I.F. Akyildiz, W. Y. Lee, M. C. Vuran, Shantidev Mohanty, NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey”, Computer Networks, 50, pp. 2127-2159, 2006MATHCrossRefGoogle Scholar
  2. 2.
    T. X. Brown, “Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment”, Mobile Networks and Applications, Vol.(5), Oct. 2008, pp. 516-532CrossRefGoogle Scholar
  3. 3.
    R. Chen, Jung-Min Park, and J. H. Reed, “Defense against Primary User Emulation Attacks in Cognitive Radio Networks”, Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University Blacksburg, VA 24061Google Scholar
  4. 4.
    T. C. Clancy & N. Goergen, “Security Cognitive Radio in Networks: Threats and Mitigation”, Laboratory for Telecommunication Sciences,US Department of DefenseGoogle Scholar
  5. 5.
    J. L. Burbank, “Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security” Johns Hopkins University, Laurel, MD 2072Google Scholar
  6. 6.
    Cabric, D.; Mishra, S; Willkomm, D.; Broderson, R; Wolisz, A.;―A cognitive radio approach for usage of virtual unlicensed spectrum, White paper 2004Google Scholar
  7. 7.
    The Federal Communications and Commissions, Spectrum Policy Task Force Report, ET Docket No. 02-155, November 2002Google Scholar
  8. 8.
    J. Mitola III and G. Q. Maguire Jr., Cognitive Radio: Making Software Radios More Personal, IEEE Personal Communication. vol. 6, no. 4, Aug. 1999, pp. 13–18CrossRefGoogle Scholar
  9. 9.
    J. Mitola, Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio, Ph.D. dissertation Royal Institute of Technology (KTH), 2000Google Scholar
  10. 10.
    Mathworks Inc. (2005) MATLAB and Simulink Release 14 user‘s guide. [Online]. Available: http://

Copyright information

© Springer India Pvt. Ltd 2011

Authors and Affiliations

  • Shweta K. Kanhere
    • 1
  • Amol D. Potgantwar
    • 2
  • Vijay M. Wadhai
    • 3
  1. 1.Department of ElectornicsMITSOT, MAEPuneIndia
  2. 2.Department of Comp. EnggSITRCNashik (MS)India
  3. 3.MITSOT, MAEPuneIndia

Personalised recommendations