Abstract
Cognitive Radio (CR) mechanism brings the solution to the difficulty of spectrum inadequacy by distributing the unexploited spectrum to unlicensed users (Secondary Users) when the licensed users (Primary Users) are not using them so that transmission by primary user would not be distorted. To attain this, the CR dynamically regulates their physical and transmission parameters. The key characteristics of Cognitive radio, Cognitive Capability and Reconfigurability make the radio network vulnerable to security threats. One of the foremost intimidations is Primary User Emulation Attack (PUEA) performed by secondary user (or an attacker) by imitating the primary user characteristics at physical layer. In this paper, an algorithm is projected to distinguish primary user signal from others, through an energy-efficient localization mechanism and channel parameter variance, which is simulated in MATLAB environment and it is found to be an effective mechanism to authenticate primary user and mitigate the primary user emulation attack.
Keywords
This is a preview of subscription content, log in via an institution.
References
Gao, Jason: Channel Capacity of a Cognitive Radio Network in GSM Uplink Band. In: Communications and Information Technologies, 2007. ISCIT’07, International Symposium on, pp. 1511–1515. IEEE (2007).
Sharma, Himanshu, and Kuldip Kumar: Primary User Emulation Attack Analysis on Cognitive Radio. Indian Journal of Science and Technology 9.14 (2016).
Akyildiz, Ian F.: NeXt Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey. Computer networks 50.13, 2127–2159 (2006).
Parvin, S., Hussain, F.K., Hussain, O.K., Han, S., Tian, B. and Chang, E.: Cognitive Radio Network Security: A Survey. Journal of Network and Computer Applications, 35(6), pp. 1691–1708.
Suditi Choudhary and Muzzammil Hussain: Primary User Authentication in Cognitive Radio Network using Signal Properties. In: Proceeding of the Third International Symposium on Women in Computing and Informatics, pp. 290–296. ACM (2015).
Chen, Zesheng: Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks. In: 2009 IEEE 28th International Performance Computing and Communications Conference, pp. 208–215. IEEE (2009).
Lakshmi Phani G, Venkat Sayeesh K, Vinod Kumar K, Rammurthy: ERFLA: Energy Efficient Combined Routing, Fusion, Localization Algorithm in Cognitive Wsn. In: 2010 7th International Conference on Wireless and Optical Communication Networks, Colombo -(WOCN), pp. 1–5. IEEE (2010).
Md. Aquil Mirza, Rama Murthy Garimella: PASCAL: Power Aware Sectoring based Clustering Algorithm for Wireless Sensor Networks. In: 2009 International Conference on Information Networking, pp. 1–6. IEEE (2009).
Bore Gowda S B, Puttamadappa C, Mruthyunjaya H S, Babu N V: Sector based Multi-hop Clustering Protocol for Wireless Sensor Networks. In: International Journal of Computer Applications (0975–8887) vol 43– No.13 (2012).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sultana, R., Hussain, M. (2018). Mitigating Primary User Emulation Attack in Cognitive Radio Network Using Localization and Variance Detection . In: Somani, A., Srivastava, S., Mundra, A., Rawat, S. (eds) Proceedings of First International Conference on Smart System, Innovations and Computing. Smart Innovation, Systems and Technologies, vol 79. Springer, Singapore. https://doi.org/10.1007/978-981-10-5828-8_41
Download citation
DOI: https://doi.org/10.1007/978-981-10-5828-8_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5827-1
Online ISBN: 978-981-10-5828-8
eBook Packages: EngineeringEngineering (R0)