2017
DOI: 10.4108/eai.28-12-2017.153516
|View full text |Cite
|
Sign up to set email alerts
|

Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs

Abstract: Cognitive radio networks (CRNs) have been recognized as a promising technology that allows secondary users (SUs) extensively explore spectrum resource usage efficiency, while not introducing interference to licensed users. Due to the unregulated wireless network environment, CRNs are susceptible to various malicious entities. Thus, it is critical to detect anomalies in the first place. However, from the perspective of intrinsic features of CRNs, there is hardly in existence of an universal applicable anomaly d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…PUE attacks can be easily implemented in CRNs. It introduces great overhead on cognitive radio communication and causes chaos in dynamic spectrum sensing [9,10]. However, defense against the PUE attacks is nontrivial because traditional authentication and authorization (AA) methods are no longer applicable to CR systems.…”
Section: Introductionmentioning
confidence: 99%
“…PUE attacks can be easily implemented in CRNs. It introduces great overhead on cognitive radio communication and causes chaos in dynamic spectrum sensing [9,10]. However, defense against the PUE attacks is nontrivial because traditional authentication and authorization (AA) methods are no longer applicable to CR systems.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, due to the complexity and open feature of the system, CRNs are vulnerable to several types of malicious attacks, including not only the traditional network threat such as jamming, eavesdropping, and MAC layer attack, but also certain CRN specific attacks such as control channel jamming, sybil attack, black hole attack and some newly developed types of attacks [29], for example, the Primary User Emulation (PUE) Attacks [23], [24], [25].…”
Section: Introductionmentioning
confidence: 99%