Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








605 Hits in 7.8 sec

A Survey on Primary User Emulation Detection Mechanisms in Cognitive Radio Networks
English

V. Jaya sree, R Suganya
2014 International Journal of Computer Trends and Technology  
Keywords-Cognitive radio network, primary user emulation attack, primary user emulation detection.  ...  Because in the cognitive radio networks, primary user emulation attack is a harmful attack which degrades the network performance.  ...  In the following survey several mitigating techniques are suggested for mitigating the primary user emulation attacks in the cognitive radio networks.  ... 
doi:10.14445/22312803/ijctt-v14p117 fatcat:76riosb7knaetcyypnnzzrdtbq

A layered approach to cognitive radio network security: A survey

Deanna Hlavacek, J. Morris Chang
2014 Computer Networks  
In addition, the cognitive radio network is vulnerable to new attacks based on cognitive radio innovations, such as spectrum sharing, spectrum sensing, cognitive capability, and radio reconfigurability  ...  The cognitive radio network is still vulnerable to many of the denial of service, wormhole, routing, and jamming attacks that plague other wireless technologies.  ...  In [108] the authors provide a method of defense against the primary user emulation attack using belief propagation.  ... 
doi:10.1016/j.comnet.2014.10.001 fatcat:eo4kskzcbzdvfap7srpsdhxkpy

A Survey onadvances in security threats and its counter measures in cognitive radio networks

D Ganesh, T Pavan Kumar
2018 International Journal of Engineering & Technology  
Cognitive radio and Cognitive radio networks are wireless in nature these face conventional attacks.  ...  As Cognitive radio networks are flexible in nature, it will be effected by various security attacks which in turn affects the performance of the network.  ...  Another method which is called as Belief Propagation is used to mitigate this attack.  ... 
doi:10.14419/ijet.v7i2.8.10465 fatcat:m2bswlvdgrcwjefgt3uecxmkry

SPECTRUM SENSING AND SECURITY CONCERNS IN SOFTWARE-DEFINED RADIO AND COGNITIVE RADIO NETWORKS

T. L Singal
2020 International Journal of Engineering Applied Sciences and Technology  
Cognitive radio networks (CRNs) enable to resolve the issue of radio spectrum scarcity by employing dynamic spectrum access (DSA) technique in next generation wireless networks.  ...  An overview of various security concerns versus requirements in software defined radio (SDR) and cognitive radio networks is presented.  ...  There are mainly three classes of security attacks that manipulate the behavior of a cognitive radio network: sensory, belief, and self-propagating.  ... 
doi:10.33564/ijeast.2020.v04i12.070 fatcat:wokwkxuox5etfnu7bv6xcjqc4e

A Novel Technique to Prevent PUE Attack in Cognitive Radio Network

Ekta gupta, C.K. Nagpal
2016 International Journal of Computer Network and Information Security  
Index Terms-Cognitive radio network, security, primary user emulation attack, trust-based mitigation, reputation-based mitigation, primary user emulation attack prevention.  ...  One of these attacks is PUE attack where a malicious user pretends to be a primary user and not let others to use primary user's channel in its absence.  ...  It leads to a very harmful attack in the network called Primary User Emulation Attack as shown in Fig 1. This is done on the physical layer in the network.  ... 
doi:10.5815/ijcnis.2016.12.06 fatcat:sbzyu4yu4jhbroa326qodewinu

A survey on security attacks and countermeasures with primary user detection in cognitive radio networks

José Marinho, Jorge Granjal, Edmundo Monteiro
2015 EURASIP Journal on Information Security  
falsification and primary user emulation attacks.  ...  However, the intrinsic characteristic of CR opens new ways for attackers, namely in the context of the effective detection of incumbent or primary users (PUs), the most fundamental and challenging requirement  ...  Acknowledgements The authors would like to acknowledge the support of project Intelligent Computing in the Internet of Services (iCIS; reference CENTRO-07-0224-FEDER-002003).  ... 
doi:10.1186/s13635-015-0021-0 fatcat:c5fe5gs6kbdxfm25hau4vqiyve

Vulnerabilities in cognitive radio networks: A survey

Shameek Bhattacharjee, Shamik Sengupta, Mainak Chatterjee
2013 Computer Communications  
Cognitive radio networks are envisioned to drive the next generation wireless networks that can dynamically optimize spectrum use.  ...  In this survey, we put forward the security concerns and the vulnerabilities that threaten to plague the deployment of cognitive radio networks.  ...  Using sybil identities for primary user emulation and Byzantine attacks in DSA networks In [47] , a mechanism for a new Sybil based attack is implemented where an adversary is able to launch primary user  ... 
doi:10.1016/j.comcom.2013.06.003 fatcat:mqpdzfk67fcv7glayx7vkrdnau

A Survey on the Communication Protocols and Security in Cognitive Radio Networks

Natarajan Meghanathan
2022 International Journal of Communication Networks and Information Security  
A cognitive radio network (CRN) is composed of both the secondary users with CR-enabled radios and the primary users whose radios need not be CR-enabled.  ...  A cognitive radio (CR) is a radio that can change its transmission parameters based on the perceived availability of the spectrum bands in its operating environment.  ...  Primary User Emulation (PUE) Attacks The primary user emulation (PUE) attack [84] is launched by a malicious or selfish secondary user emulating or masquerading as a primary user to obtain complete access  ... 
doi:10.17762/ijcnis.v5i1.249 fatcat:vtw4ktuovbawnexgglej6jncxu

A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks [article]

Jaydip Sen
2013 arXiv   pre-print
However, this issue becomes even more critical in cognitive wireless sensor networks, a type of WSN in which the sensor nodes have the capabilities of changing their transmission and reception parameters  ...  according to the radio environment under which they operate in order to achieve reliable and efficient communication and optimum utilization of the network resources.  ...  Kumar Nayak of National Institute of Science and Technology (NIST), Odisha, India.  ... 
arXiv:1308.0682v1 fatcat:zkwd6kpgkjaojhxkupzpggo67e

Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter

Zakaria El Mrabet, Youness Arjoune, Hassan El Ghazi, Badr Abou Al Majd, Naima Kaabouch
2018 Journal of Sensor and Actuator Networks  
However, several attacks could disturb the normal functioning of the cognitive radio network.  ...  Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to use the vacant spectrum bands without causing interference to the primary users.  ...  Experiments and Results To evaluate the performance of the proposed approach, a simulation of a primary user emulation attack scenario in a virtual cognitive radio network was performed using Matlab.  ... 
doi:10.3390/jsan7030026 fatcat:bmoohsnzpzf5rnk6sfmz6g4p3q

Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead

G. Baldini, T. Sturman, A. R. Biswas, R. Leschhorn, G. Godor, M. Street
2012 IEEE Communications Surveys and Tutorials  
Software Defined Radio (SDR) and Cognitive Radio (CR) are promising technologies, which can be used to alleviate the spectrum shortage problem or the barriers to communication interoperability in various  ...  An attacker could disrupt the basic functions of a CR network, cause harmful interference to licensed users or deny communication to other CR nodes.  ...  Threats against the cognitive engine of CR network are described in [100] , which defines three classes of threats in this area: sensory manipulation attacks against policy radios, belief manipulation  ... 
doi:10.1109/surv.2011.032511.00097 fatcat:6r4qyhbhwjcszph5kxfjvxcf4y

Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach

Y. Tan, S. Sengupta, K.P. Subbalakshmi
2012 IET Communications  
In this paper, we propose a game theoretic framework to study the primary user emulation attack (PUEA) on cognitive radio nodes.  ...  Index Terms Dynamic spectrum access networks, Primary user emulation attack, Non-cooperative dynamic multistage game, Nash equilibrium, Belief updating system  ...  In this paper, we study a specific class of DoS attacks in cognitive radio networks known as the primary user emulation attack (PUEA).  ... 
doi:10.1049/iet-com.2010.0573 fatcat:eek2oaxm7vfh3nju3k33qvx7rq

Cognitive Radio Networks [chapter]

2014 Wireless multimedia Communication Systems  
Cognitive Radio Networks (CRNs) are emerging as a solution to increase the spectrum utilization by using unused or less used spectrum in radio environments.  ...  New communication and networking technologies need to be developed, to allow the use of the spectrum in a more efficient way and to increase the spectrum utilization.  ...  These include Objective Function Attacks (OFA), cross-layer attacks from physical/link layer to transport layer and Primary User Emulation (PUE) attacks [12] .  ... 
doi:10.1201/b17059-3 fatcat:xbdsqi4jejdu5dpm2fjjcxlevq

Cognitive radio networks

Adrian Popescu
2012 2012 9th International Conference on Communications (COMM)  
Cognitive Radio Networks (CRNs) are emerging as a solution to increase the spectrum utilization by using unused or less used spectrum in radio environments.  ...  New communication and networking technologies need to be developed, to allow the use of the spectrum in a more efficient way and to increase the spectrum utilization.  ...  These include Objective Function Attacks (OFA), cross-layer attacks from physical/link layer to transport layer and Primary User Emulation (PUE) attacks [12] .  ... 
doi:10.1109/iccomm.2012.6262533 fatcat:ebstko6w6vgknikbhai5w47toi

Exploiting and defending trust models in cooperative spectrum sensing

David S Jackson, Wanyu Zang, Qijun Gu, Wei Cheng, Meng Yu
2015 EURASIP Journal on Wireless Communications and Networking  
Cooperative spectrum sensing (CSS) has been proposed as a means to protect cognitive radio networks from the well-known security threats: primary user emulation (PUE) and spectrum sensing data falsification  ...  Cognitive radios are currently presented as the solution to the ever-increasing spectrum shortage problem.  ...  Propagation model Energy detection. We decided to use energy detection because it is the most widely used spectrum sensing technique for cognitive radio networks [10, 24] .  ... 
doi:10.1186/1687-1499-2015-4 fatcat:2wov42radrf2ndmwaq6ehwblxi
« Previous Showing results 1 — 15 out of 605 results