Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks

We investigate the primary user emulation (PUE) attack, which is a serious security problem in cognitive radio (CR) networks. There exist three types of PUE attackers: 1) a selfish one, which aims at maximizing its selfish usage of channel resource; 2) a malicious one, which points for obstructing t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on wireless communications 2015-09, Vol.14 (9), p.4981-4993
Hauptverfasser: Nhan Nguyen Thanh, Ciblat, Philippe, Pham, Anh T., Van-Tam Nguyen
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 4993
container_issue 9
container_start_page 4981
container_title IEEE transactions on wireless communications
container_volume 14
creator Nhan Nguyen Thanh
Ciblat, Philippe
Pham, Anh T.
Van-Tam Nguyen
description We investigate the primary user emulation (PUE) attack, which is a serious security problem in cognitive radio (CR) networks. There exist three types of PUE attackers: 1) a selfish one, which aims at maximizing its selfish usage of channel resource; 2) a malicious one, which points for obstructing the operation of CR network; and 3) a mixed one, which is between a selfish and malicious PUE attacker. For combating a selfish PUE attacker, a channel surveillance process has to be implemented in order to determine active user's identification and so selfish PUE attacker. An extra-sensing process has to be implemented for observing new opportunities to access the channel and so for mitigating the malicious PUE attacker's effect. Relevant strategies for deploying the above processes are obtained through a game theory-based analysis and the exhibition of Nash equilibrium (NE). We show the NE strongly depends on the network demand, the availability of the spectrum resource, and the type of the attacker.
doi_str_mv 10.1109/TWC.2015.2430865
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_02286965v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7103339</ieee_id><sourcerecordid>3855192191</sourcerecordid><originalsourceid>FETCH-LOGICAL-c325t-70ff109982f3e64cb776455e0c5a0915f78646b36b218e17d87aa90d1d7759723</originalsourceid><addsrcrecordid>eNo9kEtLw0AURgdRsFb3gpsBVy5S55F5ZBlKtUJRsS3iapgmkzptmtSZScV_b0JKV_dyOd_l4wBwi9EIY5Q8Lj7HI4IwG5GYIsnZGRhgxmRESCzPu53yCBPBL8GV9xuEsOCMDcDXvHEHY8tSV5mB8-B0MGtrPEzX2lY-wHdnd9r9waU3Dk52TamDrSuYhqCzLbQVHNfrygZ7MPBD57aGryb81m7rr8FFoUtvbo5zCJZPk8V4Gs3enl_G6SzKKGEhEqgo2v6JJAU1PM5WQvCYMYMyplGCWSEkj_mK8hXB0mCRS6F1gnKcC8ESQegQPPR_v3Wp9n1bVWurpulMdTdEiOQJZwfcsvc9u3f1T2N8UJu6cVVbT2FBEsw5krSlUE9lrvbemeL0FiPVyVatbNXJVkfZbeSuj1hjzAkXGFFKE_oPavl5Dg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1729166083</pqid></control><display><type>article</type><title>Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Nhan Nguyen Thanh ; Ciblat, Philippe ; Pham, Anh T. ; Van-Tam Nguyen</creator><creatorcontrib>Nhan Nguyen Thanh ; Ciblat, Philippe ; Pham, Anh T. ; Van-Tam Nguyen</creatorcontrib><description>We investigate the primary user emulation (PUE) attack, which is a serious security problem in cognitive radio (CR) networks. There exist three types of PUE attackers: 1) a selfish one, which aims at maximizing its selfish usage of channel resource; 2) a malicious one, which points for obstructing the operation of CR network; and 3) a mixed one, which is between a selfish and malicious PUE attacker. For combating a selfish PUE attacker, a channel surveillance process has to be implemented in order to determine active user's identification and so selfish PUE attacker. An extra-sensing process has to be implemented for observing new opportunities to access the channel and so for mitigating the malicious PUE attacker's effect. Relevant strategies for deploying the above processes are obtained through a game theory-based analysis and the exhibition of Nash equilibrium (NE). We show the NE strongly depends on the network demand, the availability of the spectrum resource, and the type of the attacker.</description><identifier>ISSN: 1536-1276</identifier><identifier>EISSN: 1558-2248</identifier><identifier>DOI: 10.1109/TWC.2015.2430865</identifier><identifier>CODEN: ITWCAX</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Bandwidth ; cognitive radio ; Engineering Sciences ; Engines ; Game theory ; Games ; Nash equilibrium ; primary user emulation attack ; security ; Sensors ; Signal and Image processing ; spectrum sensing ; Surveillance ; Wireless communication</subject><ispartof>IEEE transactions on wireless communications, 2015-09, Vol.14 (9), p.4981-4993</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Sep 2015</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c325t-70ff109982f3e64cb776455e0c5a0915f78646b36b218e17d87aa90d1d7759723</citedby><cites>FETCH-LOGICAL-c325t-70ff109982f3e64cb776455e0c5a0915f78646b36b218e17d87aa90d1d7759723</cites><orcidid>0000-0003-3884-9520 ; 0000-0002-2310-4115</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7103339$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,776,780,792,881,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7103339$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://telecom-paris.hal.science/hal-02286965$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Nhan Nguyen Thanh</creatorcontrib><creatorcontrib>Ciblat, Philippe</creatorcontrib><creatorcontrib>Pham, Anh T.</creatorcontrib><creatorcontrib>Van-Tam Nguyen</creatorcontrib><title>Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks</title><title>IEEE transactions on wireless communications</title><addtitle>TWC</addtitle><description>We investigate the primary user emulation (PUE) attack, which is a serious security problem in cognitive radio (CR) networks. There exist three types of PUE attackers: 1) a selfish one, which aims at maximizing its selfish usage of channel resource; 2) a malicious one, which points for obstructing the operation of CR network; and 3) a mixed one, which is between a selfish and malicious PUE attacker. For combating a selfish PUE attacker, a channel surveillance process has to be implemented in order to determine active user's identification and so selfish PUE attacker. An extra-sensing process has to be implemented for observing new opportunities to access the channel and so for mitigating the malicious PUE attacker's effect. Relevant strategies for deploying the above processes are obtained through a game theory-based analysis and the exhibition of Nash equilibrium (NE). We show the NE strongly depends on the network demand, the availability of the spectrum resource, and the type of the attacker.</description><subject>Bandwidth</subject><subject>cognitive radio</subject><subject>Engineering Sciences</subject><subject>Engines</subject><subject>Game theory</subject><subject>Games</subject><subject>Nash equilibrium</subject><subject>primary user emulation attack</subject><subject>security</subject><subject>Sensors</subject><subject>Signal and Image processing</subject><subject>spectrum sensing</subject><subject>Surveillance</subject><subject>Wireless communication</subject><issn>1536-1276</issn><issn>1558-2248</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kEtLw0AURgdRsFb3gpsBVy5S55F5ZBlKtUJRsS3iapgmkzptmtSZScV_b0JKV_dyOd_l4wBwi9EIY5Q8Lj7HI4IwG5GYIsnZGRhgxmRESCzPu53yCBPBL8GV9xuEsOCMDcDXvHEHY8tSV5mB8-B0MGtrPEzX2lY-wHdnd9r9waU3Dk52TamDrSuYhqCzLbQVHNfrygZ7MPBD57aGryb81m7rr8FFoUtvbo5zCJZPk8V4Gs3enl_G6SzKKGEhEqgo2v6JJAU1PM5WQvCYMYMyplGCWSEkj_mK8hXB0mCRS6F1gnKcC8ESQegQPPR_v3Wp9n1bVWurpulMdTdEiOQJZwfcsvc9u3f1T2N8UJu6cVVbT2FBEsw5krSlUE9lrvbemeL0FiPVyVatbNXJVkfZbeSuj1hjzAkXGFFKE_oPavl5Dg</recordid><startdate>201509</startdate><enddate>201509</enddate><creator>Nhan Nguyen Thanh</creator><creator>Ciblat, Philippe</creator><creator>Pham, Anh T.</creator><creator>Van-Tam Nguyen</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><general>Institute of Electrical and Electronics Engineers</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>1XC</scope><orcidid>https://orcid.org/0000-0003-3884-9520</orcidid><orcidid>https://orcid.org/0000-0002-2310-4115</orcidid></search><sort><creationdate>201509</creationdate><title>Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks</title><author>Nhan Nguyen Thanh ; Ciblat, Philippe ; Pham, Anh T. ; Van-Tam Nguyen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c325t-70ff109982f3e64cb776455e0c5a0915f78646b36b218e17d87aa90d1d7759723</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Bandwidth</topic><topic>cognitive radio</topic><topic>Engineering Sciences</topic><topic>Engines</topic><topic>Game theory</topic><topic>Games</topic><topic>Nash equilibrium</topic><topic>primary user emulation attack</topic><topic>security</topic><topic>Sensors</topic><topic>Signal and Image processing</topic><topic>spectrum sensing</topic><topic>Surveillance</topic><topic>Wireless communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nhan Nguyen Thanh</creatorcontrib><creatorcontrib>Ciblat, Philippe</creatorcontrib><creatorcontrib>Pham, Anh T.</creatorcontrib><creatorcontrib>Van-Tam Nguyen</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>IEEE transactions on wireless communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Nhan Nguyen Thanh</au><au>Ciblat, Philippe</au><au>Pham, Anh T.</au><au>Van-Tam Nguyen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks</atitle><jtitle>IEEE transactions on wireless communications</jtitle><stitle>TWC</stitle><date>2015-09</date><risdate>2015</risdate><volume>14</volume><issue>9</issue><spage>4981</spage><epage>4993</epage><pages>4981-4993</pages><issn>1536-1276</issn><eissn>1558-2248</eissn><coden>ITWCAX</coden><abstract>We investigate the primary user emulation (PUE) attack, which is a serious security problem in cognitive radio (CR) networks. There exist three types of PUE attackers: 1) a selfish one, which aims at maximizing its selfish usage of channel resource; 2) a malicious one, which points for obstructing the operation of CR network; and 3) a mixed one, which is between a selfish and malicious PUE attacker. For combating a selfish PUE attacker, a channel surveillance process has to be implemented in order to determine active user's identification and so selfish PUE attacker. An extra-sensing process has to be implemented for observing new opportunities to access the channel and so for mitigating the malicious PUE attacker's effect. Relevant strategies for deploying the above processes are obtained through a game theory-based analysis and the exhibition of Nash equilibrium (NE). We show the NE strongly depends on the network demand, the availability of the spectrum resource, and the type of the attacker.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TWC.2015.2430865</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0003-3884-9520</orcidid><orcidid>https://orcid.org/0000-0002-2310-4115</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1536-1276
ispartof IEEE transactions on wireless communications, 2015-09, Vol.14 (9), p.4981-4993
issn 1536-1276
1558-2248
language eng
recordid cdi_hal_primary_oai_HAL_hal_02286965v1
source IEEE Electronic Library (IEL)
subjects Bandwidth
cognitive radio
Engineering Sciences
Engines
Game theory
Games
Nash equilibrium
primary user emulation attack
security
Sensors
Signal and Image processing
spectrum sensing
Surveillance
Wireless communication
title Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T22%3A10%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Surveillance%20Strategies%20Against%20Primary%20User%20Emulation%20Attack%20in%20Cognitive%20Radio%20Networks&rft.jtitle=IEEE%20transactions%20on%20wireless%20communications&rft.au=Nhan%20Nguyen%20Thanh&rft.date=2015-09&rft.volume=14&rft.issue=9&rft.spage=4981&rft.epage=4993&rft.pages=4981-4993&rft.issn=1536-1276&rft.eissn=1558-2248&rft.coden=ITWCAX&rft_id=info:doi/10.1109/TWC.2015.2430865&rft_dat=%3Cproquest_RIE%3E3855192191%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1729166083&rft_id=info:pmid/&rft_ieee_id=7103339&rfr_iscdi=true