2008
DOI: 10.1109/jsac.2008.080104
|View full text |Cite
|
Sign up to set email alerts
|

Defense against Primary User Emulation Attacks in Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
327
0
4

Year Published

2008
2008
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 560 publications
(331 citation statements)
references
References 19 publications
0
327
0
4
Order By: Relevance
“…We consider the mean Rayleigh fading, ∆, to be unity. The transmit power from the malicious users, P m , is taken to be 4 Watts as in [9]. Fig.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…We consider the mean Rayleigh fading, ∆, to be unity. The transmit power from the malicious users, P m , is taken to be 4 Watts as in [9]. Fig.…”
Section: Resultsmentioning
confidence: 99%
“…PUEA in cognitive radio networks was studied in [8], [9], [10]. In [8], Chen and Park propose two mechanisms to detect a PUEA namely the distance ratio test (DRT) and the distance difference test (DDT), which use the ratio and the difference, respectively, of the distances of the primary and malicious transmitters from the secondary user to detect a PUEA.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, from Eqns. (6), (8) and (9), it is observed that the expressions are independent of θ 1 , θ 2 , · · ·, θ M . Therefore, it is sufficient if the averaging (and integrations) are performed over r 1 , r 2 , · · ·, r M .…”
Section: A Received Signal Pdfmentioning
confidence: 96%
“…The Federal Communications Commission (FCC) [5] mandates that the secondary users must evacuate the spectral bands as soon as a primary transmission is detected. However, since there is no policing in place to ensure this, several denial-of service (DoS) attacks are possible on either the primary users [6] or the secondary users [7], [8], [9]. For example, a set of secondary users (called "malicious users") could transmit signals with characteristics identical to that of a primary transmitter, leading other "good" secondary users (that follow the normal spectrum evacuation etiquette) to vacate the spectrum unnecessarily.…”
Section: Introductionmentioning
confidence: 99%