MODELING BASED APPROACH FOR THE PRIMARY USER EMULATION ATTACK USING LOCATION, FEATURE DETECTION TECHNIQUE & POWER ESTIMATION METHODS IN COGNITIVE RADIO NETWORKS

  • Mahesh Kumar N. et al.

Abstract

Cognitive radio technology addresses the problem of the spectrum scarcity by allowing
secondary users to use the vacant spectrum bands without causing interference to the primary
users. However, several attacks could disturb the normal functioning of the cognitive radio
network. Primary user emulation attack is one of the most severe attacks in which a malicious
user emulates the primary user signal characteristics to either prevent other legitimate
secondary users from accessing the idle channels or causing harmful interference to the
primary users. There are several proposed approaches to detect the primary user emulation
attackers. However, most of these techniques assume that the primary user location is fixed
which does not make them valid when the primary user is mobile. The growth in wireless
communication has increased the demand for wireless radio spectrum to utilize many social
and individual benefits. Cognitive radio is a technology that provides a possible solution for
improving spectrum efficiency by allowing opportunistic access to the spectrum for unlicensed
users (CRs). In this work, we mainly focus on Primary User Emulation attack (PUEA) is one
such major threat posed on spectrum sensing, which decreases the spectrum access probability.
We propose a mathematical model of the mitigation techniques based transmitter location using
received signal strength (RSS) and based on feature detection, which employs a cyclostationary
calculation to represent the modulation features of the user signals & use the model to simulate
the results, which would be taken as a future work initiative.

Published
2020-07-10
Section
Articles