2018
DOI: 10.3390/jsan7030026
|View full text |Cite
|
Sign up to set email alerts
|

Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter

Abstract: Abstract:Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to use the vacant spectrum bands without causing interference to the primary users. However, several attacks could disturb the normal functioning of the cognitive radio network. Primary user emulation attacks are one of the most severe attacks in which a malicious user emulates the primary user signal characteristics to either prevent other legitimate secondary users from accessing the idle channels or ca… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 35 publications
0
5
0
Order By: Relevance
“…Nevertheless, its rate of recognition is very less 18 . In the study of Reference 19, a Kalman filter framework‐based solution for identifying primary user emulation as‐saults with a non‐stationary primary user was developed. Even though the limitation of this work is locating the primary user's initial position and the difficulty of managing the measurement uncertainty.…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…Nevertheless, its rate of recognition is very less 18 . In the study of Reference 19, a Kalman filter framework‐based solution for identifying primary user emulation as‐saults with a non‐stationary primary user was developed. Even though the limitation of this work is locating the primary user's initial position and the difficulty of managing the measurement uncertainty.…”
Section: Literature Surveymentioning
confidence: 99%
“…User access to the spectrum/database is restricted via access control. Sensitive/confidential information of users should be protected 12–20 . Cellular wireless networks must improve their capacities as demand for mobile broadband networks grows.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The communication between the smart meters, the home appliances, and the AMI headend is defined through several communication protocols such as Z-wave and Zigbee [9,10,12,17].…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, the angle-received signal-strength-based approaches were used in [12,13] to detect the PUE attack. Recently, a PUE detection mechanism for non-stationary PU was proposed in [14] by using the Kalman filter.…”
Section: Introductionmentioning
confidence: 99%