Abstract-In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognitive radio network by primary user emulation (PUE). Most approaches in the literature on primary user emulation attacks (PUEA) discuss mechanisms to deal with the attacks but not analytical models. Simulation studies and results from test beds have been presented but no analytical model relating the various parameters that could cause a PUE attack has been proposed and studied. We propose an analytical approach based on Fenton's approximation and Markov inequality and obtain a lower bound on the probability of a successful PUEA on a secondary user by a set of co-operating malicious users. We consider a fading wireless environment and discuss the various parameters that can affect the feasibility of a PUEA. We show that the probability of a successful PUEA increases with the distance between the primary transmitter and secondary users. This is the first analytical treatment to study the feasibility of a PUEA.
Abstract-In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) networks. In particular, we analyze primary user emulation attacks (PUEA) in cognitive radio networks without using any location information and therefore can do away with any dedicated sensor network. To the best of our knowledge, there are no studies available that detect PUEA using analytical models. We present an analysis using Fenton's approximation and Wald's sequential probability ratio test (WSPRT) to detect PUEA. Simulation results demonstrate that it is possible to keep the probability of missing the primary below a desired threshold while at the same time keeping the probability of successful PUEA low.
We present an analytical model to compute the blocking probability in channelized cellular systems with dynamic channel allocation. We model the channel occupancy in a cell by a two-dimensional (2-D) Markov chain, which can be solved to obtain the blocking probability in each cell. We apply our analytical model to linear highway systems with and without lognormal shadowing and then extend it to 2-D cellular systems with lognormal shadowing. We show that, for linear highway systems, distributed dynamic channel-allocation schemes perform similarly to the centralized dynamic channel-allocation schemes in terms of blocking probability. However, for 2-D cellular systems, the improvement in the performance is significant and the reduction in the blocking probability in systems with distributed dynamic channel allocation is by almost one order of magnitude, when compared to that in systems with centralized dynamic channel allocation. In practice, our analysis of linear highway systems is applicable to digital European cordless telephony (DECT) and that of 2-D cellular systems is applicable to global systems for mobile communications (GSM). Index Terms-Centralized dynamic channel allocation, channelized cellular systems, distributed dynamic channel allocation.
SUMMARYIn this paper, we present a performance study to evaluate the mean delay and the average system throughput of IEEE 802.11-based wireless local area networks (WLANs). We consider the distributed coordination function (DCF) mode of medium access control (MAC). Stochastic reward nets (SRNs) are used as a modelling formalism as it readily captures the synchronization between events in the DCF mode of access. We present a SRN-based analytical model to evaluate the mean delay and the average system throughput of the IEEE 802.11 DCF by considering an on-off traffic model and taking into account the freezing of the back-off counter due to channel capture by other stations. We also compute the mean delay suffered by a packet in the system using the SRN formulation and by modelling each station as an M/G/1 queue. We validate our analytical model by comparison with simulations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.