2013
DOI: 10.1016/j.procs.2013.09.057
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(17 citation statements)
references
References 14 publications
0
17
0
Order By: Relevance
“…In a PUE attack, a malicious node attains the PU characteristics; thus, causing the CR nodes to perceive the malicious node as a PU [230], [231]. The malicious node may force the CR node to vacate the occupied channel or the malicious node may jam the CR user's spectrum sensing process.…”
Section: Referencementioning
confidence: 99%
“…In a PUE attack, a malicious node attains the PU characteristics; thus, causing the CR nodes to perceive the malicious node as a PU [230], [231]. The malicious node may force the CR node to vacate the occupied channel or the malicious node may jam the CR user's spectrum sensing process.…”
Section: Referencementioning
confidence: 99%
“…In [13], Jin et al argue that location-based solutions like the ones proposed in [11,12,14] usually require a dedicated wireless sensor network to assist the localization of transmitters. Thus, they design a different scheme that employ the received signal strength as decision criterion.…”
Section: Related Workmentioning
confidence: 99%
“…There are two types of malicious attacks in CSS [7,8]. The first one is the incumbent emulation attack (IEA), where some malicious users know the characteristics of the primary signal and transmit a signal with similar characteristics so that other secondary users would believe that a primary user is present [9][10][11]. The second one is the spectrum sensing data falsification attack (SSDF) also termed as Byzantine attack, where malicious users send false sensing information intentionally to a central node [12,13].…”
Section: Introductionmentioning
confidence: 99%