Detection and Defense of PUEA in Cognitive Radio Network
In wireless communication, there is an enormous increase in the number of users which results in spectrum shortage. This can be defeated through dynamic spectrum access scheme and cognitive radio is the best solution to achieve this. A cognitive radio (CR) is programmable, configurable and can dynam...
Gespeichert in:
Veröffentlicht in: | Arabian journal for science and engineering (2011) 2021-04, Vol.46 (4), p.4039-4048 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In wireless communication, there is an enormous increase in the number of users which results in spectrum shortage. This can be defeated through dynamic spectrum access scheme and cognitive radio is the best solution to achieve this. A cognitive radio (CR) is programmable, configurable and can dynamically use the spectrum in the wireless environment. One of the important tasks of CR is to perform spectrum sensing. Sensing done on spectrum facilitates the cognitive radio user to find the unoccupied area of the spectrum. This CR is prone to many attacks in the wireless environment like primary user emulation attack (PUEA), denial of service attack, replay attack, etc. Among them, the most important attack is PUEA. When a user mimics the primary user and acquires priority over other users to access the spectrum then it is termed as PUEA. In this work, PUEA detection and its defense techniques have been modeled to avoid the degradation of spectrum. To detect the malicious users feature detection-based sensing with double threshold has been proposed. If the detected signal falls above the upper threshold or below the lower threshold then it is considered as primary user signal, whereas if the signal falls in between the thresholds then that signal is identified as malicious user signal. The detection of PUEA cannot be accurate due to factors like false alarm and miss detection. Hence, a game model has been designed for the legitimate nodes to reach strategic defense decisions in the presence of multiple attackers. Based on the actions of the players, the defenders’ payoff is determined to obtain optimal defense decisions. |
---|---|
ISSN: | 2193-567X 1319-8025 2191-4281 |
DOI: | 10.1007/s13369-020-05278-9 |