2011
DOI: 10.1109/twc.2011.041311.100626
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack

Abstract: Abstract-In recent years, the security issues of the cognitive radio (CR) networks have drawn a lot of research attentions. Primary user emulation attack (PUEA), as one of common attacks, compromises the spectrum sensing, where a malicious user forestalls vacant channels by impersonating the primary user to prevent other secondary users from accessing the idle frequency bands. In this paper, we propose a new cooperative spectrum sensing scheme, considering the existence of PUEA in CR networks. In the proposed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
130
0
2

Year Published

2014
2014
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 133 publications
(134 citation statements)
references
References 31 publications
2
130
0
2
Order By: Relevance
“…In [12], the sensing information of SUs is weighted to maximize the detection probability of available channels under the constraint of a required false alarm probability. However, the scheme only considers sensing errors from the SUs without considering the malicious behavior of SUs.…”
Section: B Cooperative Spectrum Sensing Related Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…In [12], the sensing information of SUs is weighted to maximize the detection probability of available channels under the constraint of a required false alarm probability. However, the scheme only considers sensing errors from the SUs without considering the malicious behavior of SUs.…”
Section: B Cooperative Spectrum Sensing Related Attacksmentioning
confidence: 99%
“…[16] proposes a decentralized scheme utilizing spatial correlation of received signal strengths and aggregating decisions based on a neighborhood majority voting approach for the secondary users to decide malicious users. However, a common problem related to the works cited above [12]- [16] is that they cannot distinguish a fake sensing outcome reported by a malicious SU from an erroneous outcome reported by a good SU with poor sensing capability.…”
Section: B Cooperative Spectrum Sensing Related Attacksmentioning
confidence: 99%
“…In [6], a Received Signal Strength (RSS)-based localization defense strategy under the PUEA is proposed to determine the location of PUEA by deploying sensor network. Collaborative sensing in the presence of PUEA is investigated in [7], where the Fusion Center (FC) assigns an appropriate weight to each CR user's sensing measurement and then combines them to maximize detection probability in NeymanPearson (N-P) test. In [8], the authors introduce a smart PUEA which is aware of the PU activity and performs spectrum sensing and sends the fake signals with the desired signal occurrence over special frequency band.…”
Section: Introductionmentioning
confidence: 99%
“…A new CSS scheme in the presence of PUEA is investigated in [19], in which FC assigns an appropriate weight to each CR user's energy and combines them to maximize detection probability in Nyman-Pierson criteria. The PUEA is assumed to be always present in wireless channel, which is in contradiction with the true definition of PUEA, and is not practical and efficient for the attacker because it leads to a waste of energy since in time intervals where the PU is present, the attacker has to consume power.…”
Section: Introductionmentioning
confidence: 99%