“…We consider the mean Rayleigh fading, ∆, to be unity. The transmit power from the malicious users, P m , is taken to be 4 Watts as in [9]. Fig.…”
Section: Resultsmentioning
confidence: 99%
“…PUEA in cognitive radio networks was studied in [8], [9], [10]. In [8], Chen and Park propose two mechanisms to detect a PUEA namely the distance ratio test (DRT) and the distance difference test (DDT), which use the ratio and the difference, respectively, of the distances of the primary and malicious transmitters from the secondary user to detect a PUEA.…”
Section: Introductionmentioning
confidence: 99%
“…In [8], Chen and Park propose two mechanisms to detect a PUEA namely the distance ratio test (DRT) and the distance difference test (DDT), which use the ratio and the difference, respectively, of the distances of the primary and malicious transmitters from the secondary user to detect a PUEA. In [9], Chen et al discuss defense against PUEA by localization of primary transmitters. Directional antennas were proposed to determine the angle of arrival of the primary signal, and using this, the time of arrival and the received signal strength, the secondary users determine the location of the primary transmitter.…”
Abstract-In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognitive radio network by primary user emulation (PUE). Most approaches in the literature on primary user emulation attacks (PUEA) discuss mechanisms to deal with the attacks but not analytical models. Simulation studies and results from test beds have been presented but no analytical model relating the various parameters that could cause a PUE attack has been proposed and studied. We propose an analytical approach based on Fenton's approximation and Markov inequality and obtain a lower bound on the probability of a successful PUEA on a secondary user by a set of co-operating malicious users. We consider a fading wireless environment and discuss the various parameters that can affect the feasibility of a PUEA. We show that the probability of a successful PUEA increases with the distance between the primary transmitter and secondary users. This is the first analytical treatment to study the feasibility of a PUEA.
“…We consider the mean Rayleigh fading, ∆, to be unity. The transmit power from the malicious users, P m , is taken to be 4 Watts as in [9]. Fig.…”
Section: Resultsmentioning
confidence: 99%
“…PUEA in cognitive radio networks was studied in [8], [9], [10]. In [8], Chen and Park propose two mechanisms to detect a PUEA namely the distance ratio test (DRT) and the distance difference test (DDT), which use the ratio and the difference, respectively, of the distances of the primary and malicious transmitters from the secondary user to detect a PUEA.…”
Section: Introductionmentioning
confidence: 99%
“…In [8], Chen and Park propose two mechanisms to detect a PUEA namely the distance ratio test (DRT) and the distance difference test (DDT), which use the ratio and the difference, respectively, of the distances of the primary and malicious transmitters from the secondary user to detect a PUEA. In [9], Chen et al discuss defense against PUEA by localization of primary transmitters. Directional antennas were proposed to determine the angle of arrival of the primary signal, and using this, the time of arrival and the received signal strength, the secondary users determine the location of the primary transmitter.…”
Abstract-In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognitive radio network by primary user emulation (PUE). Most approaches in the literature on primary user emulation attacks (PUEA) discuss mechanisms to deal with the attacks but not analytical models. Simulation studies and results from test beds have been presented but no analytical model relating the various parameters that could cause a PUE attack has been proposed and studied. We propose an analytical approach based on Fenton's approximation and Markov inequality and obtain a lower bound on the probability of a successful PUEA on a secondary user by a set of co-operating malicious users. We consider a fading wireless environment and discuss the various parameters that can affect the feasibility of a PUEA. We show that the probability of a successful PUEA increases with the distance between the primary transmitter and secondary users. This is the first analytical treatment to study the feasibility of a PUEA.
“…However, from Eqns. (6), (8) and (9), it is observed that the expressions are independent of θ 1 , θ 2 , · · ·, θ M . Therefore, it is sufficient if the averaging (and integrations) are performed over r 1 , r 2 , · · ·, r M .…”
Section: A Received Signal Pdfmentioning
confidence: 96%
“…The Federal Communications Commission (FCC) [5] mandates that the secondary users must evacuate the spectral bands as soon as a primary transmission is detected. However, since there is no policing in place to ensure this, several denial-of service (DoS) attacks are possible on either the primary users [6] or the secondary users [7], [8], [9]. For example, a set of secondary users (called "malicious users") could transmit signals with characteristics identical to that of a primary transmitter, leading other "good" secondary users (that follow the normal spectrum evacuation etiquette) to vacate the spectrum unnecessarily.…”
Abstract-In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) networks. In particular, we analyze primary user emulation attacks (PUEA) in cognitive radio networks without using any location information and therefore can do away with any dedicated sensor network. To the best of our knowledge, there are no studies available that detect PUEA using analytical models. We present an analysis using Fenton's approximation and Wald's sequential probability ratio test (WSPRT) to detect PUEA. Simulation results demonstrate that it is possible to keep the probability of missing the primary below a desired threshold while at the same time keeping the probability of successful PUEA low.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.