2022
DOI: 10.3390/app13010571
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Primary User Emulation Attack Using the Differential Evolution Algorithm in Cognitive Radio Networks

Abstract: Cognitive Radio Network (CRN) is an emerging technology used to solve spectrum shortage problems in wireless communications. In CRN, unlicensed secondary users (SUs) and licensed primary users (PUs) use spectrum resources at the same time by avoiding any interference from SUs. However, the spectrum sensing process in CRN is often disturbed by a security issue known as the Primary User Emulation Attack (PUEA). PUEA is one of the main security issues that disrupt the whole activity of CRN. The attacker transmits… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…In the event of training, there were no correlation found between the trained samples and the detection performance and also, the SVM model only improved and rest remained the same. Rehna Batool, et al [5] developed Proficient Time Difference of Arrival (TDOA) with Differential Evolution (DE) algorithm for PUEA detection, compared to Firefly optimization algorithm (FA), the DE model improved the performance speed and efficiency. But this approach was only applicable for fixed PU, SU and the attacker, not possible for two or more attackers.…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…In the event of training, there were no correlation found between the trained samples and the detection performance and also, the SVM model only improved and rest remained the same. Rehna Batool, et al [5] developed Proficient Time Difference of Arrival (TDOA) with Differential Evolution (DE) algorithm for PUEA detection, compared to Firefly optimization algorithm (FA), the DE model improved the performance speed and efficiency. But this approach was only applicable for fixed PU, SU and the attacker, not possible for two or more attackers.…”
Section: Literature Reviewmentioning
confidence: 99%
“…• The Proficient Time Difference of Arrival (TDOA) with Differential Evolution (DE) algorithm was only applicable for fixed PU, SU and the attacker, not possible for two or more attackers [5].…”
Section: Challengesmentioning
confidence: 99%
See 2 more Smart Citations
“…In mobile networks, for example, there are time slots where the spectrum frequencies are unused, partly because their assignment is fixed by the regulatory entities in a traditional spectrum management system, giving the operators flexibility in their usage. However, if we were to implement the CRN, it would be crucial to acknowledge the accompanying security threats, including both traditional risks and those arising from the SU's random access to free channels for its own purposes [2].…”
Section: Introductionmentioning
confidence: 99%