Abstract
Cognitive radio is the promising technology for serving the needs of increasing demand for the wireless communications nowadays. Employing cooperative spectrum sensing gives better results as it involves the fusion of sensing reports from more than one secondary user for making the final decision regarding the presence or absence of primary users. Cooperative spectrum sensing is susceptible to security issues such as primary user emulation attack (PUEA) and spectrum sensing data falsification attack (SSDF). In this chapter we compare the performance of the centralized cooperative cognitive radio network in the presence of SSDF and PUEA attacks by applying three hard decision fusion rules AND, OR and K-out-of-N rules. Simulation results show that the K-out-of-N rule performs well in the presence of PUEA attack and AND rule performs well under SSDF attack. A packet delivery ratio of unity is achieved as the simulation time progresses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
FCC, E.: Docket no 03–222 notice of proposed rule making and order (2003)
Mitola, J., Maguire, G.Q.: Cognitive radio: making software radios more personal. IEEE personal communications 6 (1999) 13–18
Yucek, T., Arslan, H.: A survey of spectrum sensing algorithms for cognitive radio applications. IEEE communications surveys & tutorials 11 (2009) 116–130
Umar, R., Sheikh, A.U.: A comparative study of spectrum awareness techniques for cognitive radio oriented wireless networks. Physical Communication 9 (2013) 148–170
Akyildiz, I.F., Lo, B.F., Balakrishnan, R.: Cooperative spectrum sensing in cognitive radio networks: A survey. Physical communication 4 (2011) 40–62
Haghighat, M., Sadough, S.M.S.: Cooperative spectrum sensing for cognitive radio networks in the presence of smart malicious users. AEU-International Journal of Electronics and Communications 68 (2014) 520–527
Hyder, C.S., Grebur, B., Xiao, L.: Defense against spectrum sensing data falsification attacks in cognitive radio networks. In: International Conference on Security and Privacy in Communication Systems, Springer (2011) 154–171
Teguig, D., Scheers, B., Le Nir, V.: Data fusion schemes for cooperative spectrum sensing in cognitive radio networks. In: Communications and Information Systems Conference (MCC), 2012 Military, IEEE (2012) 1–7
Yu, R., Zhang, Y., Liu, Y., Gjessing, S., Guizani, M.: Securing cognitive radio networks against primary user emulation attacks. IEEE Network 29 (2015) 68–74
Sumathi, A., VIDHYAPRIYA, D.R.: Intense explore algorithm–a proactive way to eliminate pue attacks in cognitive radio networks. In: WSEAS Conference. (2015)
Singh, J.S.P., Singh, R., Rai, M.K., Singh, J., Kang, A.: Cooperative sensing for cognitive radio: A powerful access method for shadowing environment. Wireless Personal Communications 80 (2015) 1363–1379
Issariyakul, T., Hossain, E.: Introduction to network simulator NS2. Springer Science & Business Media (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chaitanya, D.L., Manjunatha Chari, K. (2017). Performance Analysis of PUEA and SSDF Attacks in Cognitive Radio Networks. In: Satapathy, S., Bhateja, V., Raju, K., Janakiramaiah, B. (eds) Computer Communication, Networking and Internet Security. Lecture Notes in Networks and Systems, vol 5. Springer, Singapore. https://doi.org/10.1007/978-981-10-3226-4_21
Download citation
DOI: https://doi.org/10.1007/978-981-10-3226-4_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3225-7
Online ISBN: 978-981-10-3226-4
eBook Packages: EngineeringEngineering (R0)