2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks 2006
DOI: 10.1109/sdr.2006.4286333
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks

Abstract: Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. Spectrum sensing is one of the essential mechanisms of CRs that has attracted great attention from researhers recently. Although the operational aspects of spectrum sensing are being investigated actively, its security aspects have garnered little attent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
149
0
5

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 247 publications
(154 citation statements)
references
References 15 publications
0
149
0
5
Order By: Relevance
“…The Federal Communications Commission (FCC) [5] mandates that the secondary users must evacuate the spectral bands as soon as a primary transmission is detected. However, since there is no policing in place to ensure this, several denial-of service (DoS) attacks are possible on either the primary users [6] or the secondary users [7], [8], [9]. For example, a set of secondary users (called "malicious users") could transmit signals with characteristics identical to that of a primary transmitter, leading other "good" secondary users (that follow the normal spectrum evacuation etiquette) to vacate the spectrum unnecessarily.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The Federal Communications Commission (FCC) [5] mandates that the secondary users must evacuate the spectral bands as soon as a primary transmission is detected. However, since there is no policing in place to ensure this, several denial-of service (DoS) attacks are possible on either the primary users [6] or the secondary users [7], [8], [9]. For example, a set of secondary users (called "malicious users") could transmit signals with characteristics identical to that of a primary transmitter, leading other "good" secondary users (that follow the normal spectrum evacuation etiquette) to vacate the spectrum unnecessarily.…”
Section: Introductionmentioning
confidence: 99%
“…The malicious users then use the entire white space for themselves thus causing a DoS attack to the good secondary users. Such attacks are called primary user emulation attacks (PUEA), which were first discussed by Chen and Park in [7].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…PUEA in cognitive radio networks was studied in [8], [9], [10]. In [8], Chen and Park propose two mechanisms to detect a PUEA namely the distance ratio test (DRT) and the distance difference test (DDT), which use the ratio and the difference, respectively, of the distances of the primary and malicious transmitters from the secondary user to detect a PUEA.…”
Section: Introductionmentioning
confidence: 99%
“…In [8], Chen and Park propose two mechanisms to detect a PUEA namely the distance ratio test (DRT) and the distance difference test (DDT), which use the ratio and the difference, respectively, of the distances of the primary and malicious transmitters from the secondary user to detect a PUEA. In [9], Chen et al discuss defense against PUEA by localization of primary transmitters.…”
Section: Introductionmentioning
confidence: 99%