Skip to main content

Performance Analysis of PUEA and SSDF Attacks in Cognitive Radio Networks

  • Conference paper
  • First Online:
Computer Communication, Networking and Internet Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 5))

Abstract

Cognitive radio is the promising technology for serving the needs of increasing demand for the wireless communications nowadays. Employing cooperative spectrum sensing gives better results as it involves the fusion of sensing reports from more than one secondary user for making the final decision regarding the presence or absence of primary users. Cooperative spectrum sensing is susceptible to security issues such as primary user emulation attack (PUEA) and spectrum sensing data falsification attack (SSDF). In this chapter we compare the performance of the centralized cooperative cognitive radio network in the presence of SSDF and PUEA attacks by applying three hard decision fusion rules AND, OR and K-out-of-N rules. Simulation results show that the K-out-of-N rule performs well in the presence of PUEA attack and AND rule performs well under SSDF attack. A packet delivery ratio of unity is achieved as the simulation time progresses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. FCC, E.: Docket no 03–222 notice of proposed rule making and order (2003)

    Google Scholar 

  2. Mitola, J., Maguire, G.Q.: Cognitive radio: making software radios more personal. IEEE personal communications 6 (1999) 13–18

    Google Scholar 

  3. Yucek, T., Arslan, H.: A survey of spectrum sensing algorithms for cognitive radio applications. IEEE communications surveys & tutorials 11 (2009) 116–130

    Google Scholar 

  4. Umar, R., Sheikh, A.U.: A comparative study of spectrum awareness techniques for cognitive radio oriented wireless networks. Physical Communication 9 (2013) 148–170

    Google Scholar 

  5. Akyildiz, I.F., Lo, B.F., Balakrishnan, R.: Cooperative spectrum sensing in cognitive radio networks: A survey. Physical communication 4 (2011) 40–62

    Google Scholar 

  6. Haghighat, M., Sadough, S.M.S.: Cooperative spectrum sensing for cognitive radio networks in the presence of smart malicious users. AEU-International Journal of Electronics and Communications 68 (2014) 520–527

    Google Scholar 

  7. Hyder, C.S., Grebur, B., Xiao, L.: Defense against spectrum sensing data falsification attacks in cognitive radio networks. In: International Conference on Security and Privacy in Communication Systems, Springer (2011) 154–171

    Google Scholar 

  8. Teguig, D., Scheers, B., Le Nir, V.: Data fusion schemes for cooperative spectrum sensing in cognitive radio networks. In: Communications and Information Systems Conference (MCC), 2012 Military, IEEE (2012) 1–7

    Google Scholar 

  9. Yu, R., Zhang, Y., Liu, Y., Gjessing, S., Guizani, M.: Securing cognitive radio networks against primary user emulation attacks. IEEE Network 29 (2015) 68–74

    Google Scholar 

  10. Sumathi, A., VIDHYAPRIYA, D.R.: Intense explore algorithm–a proactive way to eliminate pue attacks in cognitive radio networks. In: WSEAS Conference. (2015)

    Google Scholar 

  11. Singh, J.S.P., Singh, R., Rai, M.K., Singh, J., Kang, A.: Cooperative sensing for cognitive radio: A powerful access method for shadowing environment. Wireless Personal Communications 80 (2015) 1363–1379

    Google Scholar 

  12. Issariyakul, T., Hossain, E.: Introduction to network simulator NS2. Springer Science & Business Media (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. L. Chaitanya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Chaitanya, D.L., Manjunatha Chari, K. (2017). Performance Analysis of PUEA and SSDF Attacks in Cognitive Radio Networks. In: Satapathy, S., Bhateja, V., Raju, K., Janakiramaiah, B. (eds) Computer Communication, Networking and Internet Security. Lecture Notes in Networks and Systems, vol 5. Springer, Singapore. https://doi.org/10.1007/978-981-10-3226-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3226-4_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3225-7

  • Online ISBN: 978-981-10-3226-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics