2018
DOI: 10.1007/978-981-10-5828-8_41
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Primary User Emulation Attack in Cognitive Radio Network Using Localization and Variance Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…The false alarm of the system should be less for good network architecture. Probability measure can be mathematically calculated as followed by Equation ( 17) [32].…”
Section: Probability Of False Alarm Versus Thresholdmentioning
confidence: 99%
See 2 more Smart Citations
“…The false alarm of the system should be less for good network architecture. Probability measure can be mathematically calculated as followed by Equation ( 17) [32].…”
Section: Probability Of False Alarm Versus Thresholdmentioning
confidence: 99%
“…To counteract the PUE attacks, where the principal user signal and other signals are differentiated, an energy‐efficient localization approach based on the channel attribute variance is presented [32]. The four stages of the suggested algorithm are initiate, enroll, update, and verification.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several approaches have been proposed to cope with the PUE attacks [11][12][13][14][15][16][17][18][19][20][21][22][23][24]. For instance, the authors of [11] proposed an energy-based detection approach to detect the source of the signal and decide if it is emitted by a legitimate primary user or an attacker.…”
Section: Introductionmentioning
confidence: 99%
“…However, this technique is affected by the multipath phenomenon [21]. The authors of [22] proposed a mitigation approach to distinguish the primary user signal from other signals via an energy-efficient localization technique and channel parameter variance. The authors of [23] proposed a model based on the trilateration, the received signal strength (RSS), and the particle swarm optimization to increase the detection accuracy of the primary user emulation attacker.…”
Section: Introductionmentioning
confidence: 99%