2009 IEEE International Conference on Communications 2009
DOI: 10.1109/icc.2009.5198911
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks

Abstract: Abstract-In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) networks. In particular, we analyze primary user emulation attacks (PUEA) in cognitive radio networks without using any location information and therefore can do away with any dedicated sensor network. To the best of our knowledge, there are no studies available that detect PUEA using analytical models. We present an analysis using… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
71
0
4

Year Published

2010
2010
2018
2018

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 135 publications
(75 citation statements)
references
References 13 publications
0
71
0
4
Order By: Relevance
“…However, they employ a mono-criterion, the received signal strength, to infer distance and analyze the presence of a PUE in the CRN. As in [7], other works have employed a unique criterion to analyze the presence of PUE attacks [8], [9].…”
Section: Introductionmentioning
confidence: 99%
“…However, they employ a mono-criterion, the received signal strength, to infer distance and analyze the presence of a PUE in the CRN. As in [7], other works have employed a unique criterion to analyze the presence of PUE attacks [8], [9].…”
Section: Introductionmentioning
confidence: 99%
“…Based on the expressions of µ i , λ i and π, we can see that they are also independent of p j i . Thus, according to Eqn (19), U m s is independent of p j i . That is, as the system reaches steady state, the net payoff of malicious nodes does not depend on their switching probabilities.…”
Section: B Markov Model Analysismentioning
confidence: 99%
“…Based on the induction hypothesis, U k s follows the Eqn (19), and so C 1 = 0. We now write U k+1 s as:…”
Section: B Markov Model Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…They disturb the transmission by generating signal same as that of secondary user. The attack caused by generating the signal same as that of primary user is called Primary User Emulation Attack (PUEA) [2].…”
Section: Introductionmentioning
confidence: 99%