A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey on Primary User Emulation Detection Mechanisms in Cognitive Radio Networks
English
2014
International Journal of Computer Trends and Technology
English
Keywords-Cognitive radio network, primary user emulation attack, primary user emulation detection. ...
Because in the cognitive radio networks, primary user emulation attack is a harmful attack which degrades the network performance. ...
In the following survey several mitigating techniques are suggested for mitigating the primary user emulation attacks in the cognitive radio networks. ...
doi:10.14445/22312803/ijctt-v14p117
fatcat:76riosb7knaetcyypnnzzrdtbq
A layered approach to cognitive radio network security: A survey
2014
Computer Networks
In addition, the cognitive radio network is vulnerable to new attacks based on cognitive radio innovations, such as spectrum sharing, spectrum sensing, cognitive capability, and radio reconfigurability ...
The cognitive radio network is still vulnerable to many of the denial of service, wormhole, routing, and jamming attacks that plague other wireless technologies. ...
In [108] the authors provide a method of defense against the primary user emulation attack using belief propagation. ...
doi:10.1016/j.comnet.2014.10.001
fatcat:eo4kskzcbzdvfap7srpsdhxkpy
A Survey onadvances in security threats and its counter measures in cognitive radio networks
2018
International Journal of Engineering & Technology
Cognitive radio and Cognitive radio networks are wireless in nature these face conventional attacks. ...
As Cognitive radio networks are flexible in nature, it will be effected by various security attacks which in turn affects the performance of the network. ...
Another method which is called as Belief Propagation is used to mitigate this attack. ...
doi:10.14419/ijet.v7i2.8.10465
fatcat:m2bswlvdgrcwjefgt3uecxmkry
SPECTRUM SENSING AND SECURITY CONCERNS IN SOFTWARE-DEFINED RADIO AND COGNITIVE RADIO NETWORKS
2020
International Journal of Engineering Applied Sciences and Technology
Cognitive radio networks (CRNs) enable to resolve the issue of radio spectrum scarcity by employing dynamic spectrum access (DSA) technique in next generation wireless networks. ...
An overview of various security concerns versus requirements in software defined radio (SDR) and cognitive radio networks is presented. ...
There are mainly three classes of security attacks that manipulate the behavior of a cognitive radio network: sensory, belief, and self-propagating. ...
doi:10.33564/ijeast.2020.v04i12.070
fatcat:wokwkxuox5etfnu7bv6xcjqc4e
A Novel Technique to Prevent PUE Attack in Cognitive Radio Network
2016
International Journal of Computer Network and Information Security
Index Terms-Cognitive radio network, security, primary user emulation attack, trust-based mitigation, reputation-based mitigation, primary user emulation attack prevention. ...
One of these attacks is PUE attack where a malicious user pretends to be a primary user and not let others to use primary user's channel in its absence. ...
It leads to a very harmful attack in the network called Primary User Emulation Attack as shown in Fig 1. This is done on the physical layer in the network. ...
doi:10.5815/ijcnis.2016.12.06
fatcat:sbzyu4yu4jhbroa326qodewinu
A survey on security attacks and countermeasures with primary user detection in cognitive radio networks
2015
EURASIP Journal on Information Security
falsification and primary user emulation attacks. ...
However, the intrinsic characteristic of CR opens new ways for attackers, namely in the context of the effective detection of incumbent or primary users (PUs), the most fundamental and challenging requirement ...
Acknowledgements The authors would like to acknowledge the support of project Intelligent Computing in the Internet of Services (iCIS; reference CENTRO-07-0224-FEDER-002003). ...
doi:10.1186/s13635-015-0021-0
fatcat:c5fe5gs6kbdxfm25hau4vqiyve
Vulnerabilities in cognitive radio networks: A survey
2013
Computer Communications
Cognitive radio networks are envisioned to drive the next generation wireless networks that can dynamically optimize spectrum use. ...
In this survey, we put forward the security concerns and the vulnerabilities that threaten to plague the deployment of cognitive radio networks. ...
Using sybil identities for primary user emulation and Byzantine attacks in DSA networks In [47] , a mechanism for a new Sybil based attack is implemented where an adversary is able to launch primary user ...
doi:10.1016/j.comcom.2013.06.003
fatcat:mqpdzfk67fcv7glayx7vkrdnau
A Survey on the Communication Protocols and Security in Cognitive Radio Networks
2022
International Journal of Communication Networks and Information Security
A cognitive radio network (CRN) is composed of both the secondary users with CR-enabled radios and the primary users whose radios need not be CR-enabled. ...
A cognitive radio (CR) is a radio that can change its transmission parameters based on the perceived availability of the spectrum bands in its operating environment. ...
Primary User Emulation (PUE) Attacks The primary user emulation (PUE) attack [84] is launched by a malicious or selfish secondary user emulating or masquerading as a primary user to obtain complete access ...
doi:10.17762/ijcnis.v5i1.249
fatcat:vtw4ktuovbawnexgglej6jncxu
A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks
[article]
2013
arXiv
pre-print
However, this issue becomes even more critical in cognitive wireless sensor networks, a type of WSN in which the sensor nodes have the capabilities of changing their transmission and reception parameters ...
according to the radio environment under which they operate in order to achieve reliable and efficient communication and optimum utilization of the network resources. ...
Kumar Nayak of National Institute of Science and Technology (NIST), Odisha, India. ...
arXiv:1308.0682v1
fatcat:zkwd6kpgkjaojhxkupzpggo67e
Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter
2018
Journal of Sensor and Actuator Networks
However, several attacks could disturb the normal functioning of the cognitive radio network. ...
Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to use the vacant spectrum bands without causing interference to the primary users. ...
Experiments and Results To evaluate the performance of the proposed approach, a simulation of a primary user emulation attack scenario in a virtual cognitive radio network was performed using Matlab. ...
doi:10.3390/jsan7030026
fatcat:bmoohsnzpzf5rnk6sfmz6g4p3q
Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead
2012
IEEE Communications Surveys and Tutorials
Software Defined Radio (SDR) and Cognitive Radio (CR) are promising technologies, which can be used to alleviate the spectrum shortage problem or the barriers to communication interoperability in various ...
An attacker could disrupt the basic functions of a CR network, cause harmful interference to licensed users or deny communication to other CR nodes. ...
Threats against the cognitive engine of CR network are described in [100] , which defines three classes of threats in this area: sensory manipulation attacks against policy radios, belief manipulation ...
doi:10.1109/surv.2011.032511.00097
fatcat:6r4qyhbhwjcszph5kxfjvxcf4y
Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach
2012
IET Communications
In this paper, we propose a game theoretic framework to study the primary user emulation attack (PUEA) on cognitive radio nodes. ...
Index Terms Dynamic spectrum access networks, Primary user emulation attack, Non-cooperative dynamic multistage game, Nash equilibrium, Belief updating system ...
In this paper, we study a specific class of DoS attacks in cognitive radio networks known as the primary user emulation attack (PUEA). ...
doi:10.1049/iet-com.2010.0573
fatcat:eek2oaxm7vfh3nju3k33qvx7rq
Cognitive Radio Networks
[chapter]
2014
Wireless multimedia Communication Systems
Cognitive Radio Networks (CRNs) are emerging as a solution to increase the spectrum utilization by using unused or less used spectrum in radio environments. ...
New communication and networking technologies need to be developed, to allow the use of the spectrum in a more efficient way and to increase the spectrum utilization. ...
These include Objective Function Attacks (OFA), cross-layer attacks from physical/link layer to transport layer and Primary User Emulation (PUE) attacks [12] . ...
doi:10.1201/b17059-3
fatcat:xbdsqi4jejdu5dpm2fjjcxlevq
Cognitive radio networks
2012
2012 9th International Conference on Communications (COMM)
Cognitive Radio Networks (CRNs) are emerging as a solution to increase the spectrum utilization by using unused or less used spectrum in radio environments. ...
New communication and networking technologies need to be developed, to allow the use of the spectrum in a more efficient way and to increase the spectrum utilization. ...
These include Objective Function Attacks (OFA), cross-layer attacks from physical/link layer to transport layer and Primary User Emulation (PUE) attacks [12] . ...
doi:10.1109/iccomm.2012.6262533
fatcat:ebstko6w6vgknikbhai5w47toi
Exploiting and defending trust models in cooperative spectrum sensing
2015
EURASIP Journal on Wireless Communications and Networking
Cooperative spectrum sensing (CSS) has been proposed as a means to protect cognitive radio networks from the well-known security threats: primary user emulation (PUE) and spectrum sensing data falsification ...
Cognitive radios are currently presented as the solution to the ever-increasing spectrum shortage problem. ...
Propagation model Energy detection. We decided to use energy detection because it is the most widely used spectrum sensing technique for cognitive radio networks [10, 24] . ...
doi:10.1186/1687-1499-2015-4
fatcat:2wov42radrf2ndmwaq6ehwblxi
« Previous
Showing results 1 — 15 out of 605 results