2012
DOI: 10.1109/jsac.2012.121102
|View full text |Cite
|
Sign up to set email alerts
|

Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
58
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 97 publications
(59 citation statements)
references
References 24 publications
0
58
0
Order By: Relevance
“…We must also consider the possibility of attackers being able to predict which channels will be used by the SUs and emulate PU activity on those specific channels, increasing significantly the effectiveness of the attacks [44]. In fact, a PU emulation attack can result in a DoS attack to a legitimate SU when the attacker has enough intelligence to transmit a fake signal on the selected channel any time that SU performs sensing [45].…”
Section: Primary User Emulation In Cr Environmentsmentioning
confidence: 99%
See 2 more Smart Citations
“…We must also consider the possibility of attackers being able to predict which channels will be used by the SUs and emulate PU activity on those specific channels, increasing significantly the effectiveness of the attacks [44]. In fact, a PU emulation attack can result in a DoS attack to a legitimate SU when the attacker has enough intelligence to transmit a fake signal on the selected channel any time that SU performs sensing [45].…”
Section: Primary User Emulation In Cr Environmentsmentioning
confidence: 99%
“…Most existing proposals address the detection of PU emulation attacks by estimation of the location of the transmitters and comparing it with the a priori known locations of the legitimate PUs, as in IEEE 802.22 through the access to geo-location databases [5,6,43,44,48,49]. If the estimated location of an emitter deviates from the known locations of the PUs, then the likelihood of this being a PU emulation attacker increases.…”
Section: Location-and Distance-based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…In PUE, an attacker can simulate a signal that resembles the signal of the PU, thereby misleading the SU [2,12,18,58,[69][70][71][72][73]. In this case, the attacker has a chance to focus on the physical layer, pretending to be an authorised user by sending CR signals that are similar to PU signals, allowing them to deceive other SUs.…”
Section: ) Security In Spectrum Sensingmentioning
confidence: 99%
“…By evaluating the received signal's coverage area [4], [5] or channel characteristics [6], [7], one can differentiate between the signal from a PUE attacker This material is based upon work supported by the National Science Foundation (NSF) CAREER award under Grant Number (CNS-1149500), and co-supported by NSF under Grant Number 1002113. and the real TV signal. However, these detection techniques cannot be applied to detect the attack that emulates WM signals, named WM user emulation (WMUE) attack, because both locations and channel characteristics of legitimate WM systems are hard to acquire and validate.…”
Section: Introductionmentioning
confidence: 99%