By Topic

Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Zhou Yuan ; ECE Dept., Univ. of Houston, Houston, TX, USA ; Niyato, D. ; Husheng Li ; Zhu Han

Cognitive radio (CR) is a promising technology for future wireless spectrum allocation to improve the usage of the licensed bands. However, CR wireless networks are susceptible to various attacks and cannot offer efficient security. Primary user emulation (PUE) is one of the discovered attacks for CR networks, which can significantly increase the spectrum access failure probability. In this paper, we propose a defense strategy against the PUE attack in CR networks using belief propagation (BP), which avoids the deployment of additional sensor networks and expensive hardware in the networks used in existing literatures. In our proposed approach, each secondary user calculates the local functions based on location information, computes the messages, exchanges messages with the neighboring users, and calculates the beliefs until convergence. Then, the PUE attacker will be detected according to the mean of the final beliefs. After that, all the secondary users in the network will be notified in a broadcast way about the characteristics of the attacker's signal, and avoid the attacker's primary emulation signal in the future. Simulation results show that our proposed technique converges quickly, and is effective to detect the PUE attacker.

Published in:

Wireless Communications and Networking Conference (WCNC), 2011 IEEE

Date of Conference:

28-31 March 2011