Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks
We investigate the primary user emulation (PUE) attack, which is a serious security problem in cognitive radio (CR) networks. There exist three types of PUE attackers: 1) a selfish one, which aims at maximizing its selfish usage of channel resource; 2) a malicious one, which points for obstructing t...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on wireless communications 2015-09, Vol.14 (9), p.4981-4993 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 4993 |
---|---|
container_issue | 9 |
container_start_page | 4981 |
container_title | IEEE transactions on wireless communications |
container_volume | 14 |
creator | Nhan Nguyen Thanh Ciblat, Philippe Pham, Anh T. Van-Tam Nguyen |
description | We investigate the primary user emulation (PUE) attack, which is a serious security problem in cognitive radio (CR) networks. There exist three types of PUE attackers: 1) a selfish one, which aims at maximizing its selfish usage of channel resource; 2) a malicious one, which points for obstructing the operation of CR network; and 3) a mixed one, which is between a selfish and malicious PUE attacker. For combating a selfish PUE attacker, a channel surveillance process has to be implemented in order to determine active user's identification and so selfish PUE attacker. An extra-sensing process has to be implemented for observing new opportunities to access the channel and so for mitigating the malicious PUE attacker's effect. Relevant strategies for deploying the above processes are obtained through a game theory-based analysis and the exhibition of Nash equilibrium (NE). We show the NE strongly depends on the network demand, the availability of the spectrum resource, and the type of the attacker. |
doi_str_mv | 10.1109/TWC.2015.2430865 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_02286965v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7103339</ieee_id><sourcerecordid>3855192191</sourcerecordid><originalsourceid>FETCH-LOGICAL-c325t-70ff109982f3e64cb776455e0c5a0915f78646b36b218e17d87aa90d1d7759723</originalsourceid><addsrcrecordid>eNo9kEtLw0AURgdRsFb3gpsBVy5S55F5ZBlKtUJRsS3iapgmkzptmtSZScV_b0JKV_dyOd_l4wBwi9EIY5Q8Lj7HI4IwG5GYIsnZGRhgxmRESCzPu53yCBPBL8GV9xuEsOCMDcDXvHEHY8tSV5mB8-B0MGtrPEzX2lY-wHdnd9r9waU3Dk52TamDrSuYhqCzLbQVHNfrygZ7MPBD57aGryb81m7rr8FFoUtvbo5zCJZPk8V4Gs3enl_G6SzKKGEhEqgo2v6JJAU1PM5WQvCYMYMyplGCWSEkj_mK8hXB0mCRS6F1gnKcC8ESQegQPPR_v3Wp9n1bVWurpulMdTdEiOQJZwfcsvc9u3f1T2N8UJu6cVVbT2FBEsw5krSlUE9lrvbemeL0FiPVyVatbNXJVkfZbeSuj1hjzAkXGFFKE_oPavl5Dg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1729166083</pqid></control><display><type>article</type><title>Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Nhan Nguyen Thanh ; Ciblat, Philippe ; Pham, Anh T. ; Van-Tam Nguyen</creator><creatorcontrib>Nhan Nguyen Thanh ; Ciblat, Philippe ; Pham, Anh T. ; Van-Tam Nguyen</creatorcontrib><description>We investigate the primary user emulation (PUE) attack, which is a serious security problem in cognitive radio (CR) networks. There exist three types of PUE attackers: 1) a selfish one, which aims at maximizing its selfish usage of channel resource; 2) a malicious one, which points for obstructing the operation of CR network; and 3) a mixed one, which is between a selfish and malicious PUE attacker. For combating a selfish PUE attacker, a channel surveillance process has to be implemented in order to determine active user's identification and so selfish PUE attacker. An extra-sensing process has to be implemented for observing new opportunities to access the channel and so for mitigating the malicious PUE attacker's effect. Relevant strategies for deploying the above processes are obtained through a game theory-based analysis and the exhibition of Nash equilibrium (NE). We show the NE strongly depends on the network demand, the availability of the spectrum resource, and the type of the attacker.</description><identifier>ISSN: 1536-1276</identifier><identifier>EISSN: 1558-2248</identifier><identifier>DOI: 10.1109/TWC.2015.2430865</identifier><identifier>CODEN: ITWCAX</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Bandwidth ; cognitive radio ; Engineering Sciences ; Engines ; Game theory ; Games ; Nash equilibrium ; primary user emulation attack ; security ; Sensors ; Signal and Image processing ; spectrum sensing ; Surveillance ; Wireless communication</subject><ispartof>IEEE transactions on wireless communications, 2015-09, Vol.14 (9), p.4981-4993</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Sep 2015</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c325t-70ff109982f3e64cb776455e0c5a0915f78646b36b218e17d87aa90d1d7759723</citedby><cites>FETCH-LOGICAL-c325t-70ff109982f3e64cb776455e0c5a0915f78646b36b218e17d87aa90d1d7759723</cites><orcidid>0000-0003-3884-9520 ; 0000-0002-2310-4115</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7103339$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,776,780,792,881,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7103339$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://telecom-paris.hal.science/hal-02286965$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Nhan Nguyen Thanh</creatorcontrib><creatorcontrib>Ciblat, Philippe</creatorcontrib><creatorcontrib>Pham, Anh T.</creatorcontrib><creatorcontrib>Van-Tam Nguyen</creatorcontrib><title>Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks</title><title>IEEE transactions on wireless communications</title><addtitle>TWC</addtitle><description>We investigate the primary user emulation (PUE) attack, which is a serious security problem in cognitive radio (CR) networks. There exist three types of PUE attackers: 1) a selfish one, which aims at maximizing its selfish usage of channel resource; 2) a malicious one, which points for obstructing the operation of CR network; and 3) a mixed one, which is between a selfish and malicious PUE attacker. For combating a selfish PUE attacker, a channel surveillance process has to be implemented in order to determine active user's identification and so selfish PUE attacker. An extra-sensing process has to be implemented for observing new opportunities to access the channel and so for mitigating the malicious PUE attacker's effect. Relevant strategies for deploying the above processes are obtained through a game theory-based analysis and the exhibition of Nash equilibrium (NE). We show the NE strongly depends on the network demand, the availability of the spectrum resource, and the type of the attacker.</description><subject>Bandwidth</subject><subject>cognitive radio</subject><subject>Engineering Sciences</subject><subject>Engines</subject><subject>Game theory</subject><subject>Games</subject><subject>Nash equilibrium</subject><subject>primary user emulation attack</subject><subject>security</subject><subject>Sensors</subject><subject>Signal and Image processing</subject><subject>spectrum sensing</subject><subject>Surveillance</subject><subject>Wireless communication</subject><issn>1536-1276</issn><issn>1558-2248</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kEtLw0AURgdRsFb3gpsBVy5S55F5ZBlKtUJRsS3iapgmkzptmtSZScV_b0JKV_dyOd_l4wBwi9EIY5Q8Lj7HI4IwG5GYIsnZGRhgxmRESCzPu53yCBPBL8GV9xuEsOCMDcDXvHEHY8tSV5mB8-B0MGtrPEzX2lY-wHdnd9r9waU3Dk52TamDrSuYhqCzLbQVHNfrygZ7MPBD57aGryb81m7rr8FFoUtvbo5zCJZPk8V4Gs3enl_G6SzKKGEhEqgo2v6JJAU1PM5WQvCYMYMyplGCWSEkj_mK8hXB0mCRS6F1gnKcC8ESQegQPPR_v3Wp9n1bVWurpulMdTdEiOQJZwfcsvc9u3f1T2N8UJu6cVVbT2FBEsw5krSlUE9lrvbemeL0FiPVyVatbNXJVkfZbeSuj1hjzAkXGFFKE_oPavl5Dg</recordid><startdate>201509</startdate><enddate>201509</enddate><creator>Nhan Nguyen Thanh</creator><creator>Ciblat, Philippe</creator><creator>Pham, Anh T.</creator><creator>Van-Tam Nguyen</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><general>Institute of Electrical and Electronics Engineers</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>1XC</scope><orcidid>https://orcid.org/0000-0003-3884-9520</orcidid><orcidid>https://orcid.org/0000-0002-2310-4115</orcidid></search><sort><creationdate>201509</creationdate><title>Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks</title><author>Nhan Nguyen Thanh ; Ciblat, Philippe ; Pham, Anh T. ; Van-Tam Nguyen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c325t-70ff109982f3e64cb776455e0c5a0915f78646b36b218e17d87aa90d1d7759723</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Bandwidth</topic><topic>cognitive radio</topic><topic>Engineering Sciences</topic><topic>Engines</topic><topic>Game theory</topic><topic>Games</topic><topic>Nash equilibrium</topic><topic>primary user emulation attack</topic><topic>security</topic><topic>Sensors</topic><topic>Signal and Image processing</topic><topic>spectrum sensing</topic><topic>Surveillance</topic><topic>Wireless communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nhan Nguyen Thanh</creatorcontrib><creatorcontrib>Ciblat, Philippe</creatorcontrib><creatorcontrib>Pham, Anh T.</creatorcontrib><creatorcontrib>Van-Tam Nguyen</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>IEEE transactions on wireless communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Nhan Nguyen Thanh</au><au>Ciblat, Philippe</au><au>Pham, Anh T.</au><au>Van-Tam Nguyen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks</atitle><jtitle>IEEE transactions on wireless communications</jtitle><stitle>TWC</stitle><date>2015-09</date><risdate>2015</risdate><volume>14</volume><issue>9</issue><spage>4981</spage><epage>4993</epage><pages>4981-4993</pages><issn>1536-1276</issn><eissn>1558-2248</eissn><coden>ITWCAX</coden><abstract>We investigate the primary user emulation (PUE) attack, which is a serious security problem in cognitive radio (CR) networks. There exist three types of PUE attackers: 1) a selfish one, which aims at maximizing its selfish usage of channel resource; 2) a malicious one, which points for obstructing the operation of CR network; and 3) a mixed one, which is between a selfish and malicious PUE attacker. For combating a selfish PUE attacker, a channel surveillance process has to be implemented in order to determine active user's identification and so selfish PUE attacker. An extra-sensing process has to be implemented for observing new opportunities to access the channel and so for mitigating the malicious PUE attacker's effect. Relevant strategies for deploying the above processes are obtained through a game theory-based analysis and the exhibition of Nash equilibrium (NE). We show the NE strongly depends on the network demand, the availability of the spectrum resource, and the type of the attacker.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TWC.2015.2430865</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0003-3884-9520</orcidid><orcidid>https://orcid.org/0000-0002-2310-4115</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1536-1276 |
ispartof | IEEE transactions on wireless communications, 2015-09, Vol.14 (9), p.4981-4993 |
issn | 1536-1276 1558-2248 |
language | eng |
recordid | cdi_hal_primary_oai_HAL_hal_02286965v1 |
source | IEEE Electronic Library (IEL) |
subjects | Bandwidth cognitive radio Engineering Sciences Engines Game theory Games Nash equilibrium primary user emulation attack security Sensors Signal and Image processing spectrum sensing Surveillance Wireless communication |
title | Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T22%3A10%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Surveillance%20Strategies%20Against%20Primary%20User%20Emulation%20Attack%20in%20Cognitive%20Radio%20Networks&rft.jtitle=IEEE%20transactions%20on%20wireless%20communications&rft.au=Nhan%20Nguyen%20Thanh&rft.date=2015-09&rft.volume=14&rft.issue=9&rft.spage=4981&rft.epage=4993&rft.pages=4981-4993&rft.issn=1536-1276&rft.eissn=1558-2248&rft.coden=ITWCAX&rft_id=info:doi/10.1109/TWC.2015.2430865&rft_dat=%3Cproquest_RIE%3E3855192191%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1729166083&rft_id=info:pmid/&rft_ieee_id=7103339&rfr_iscdi=true |