2019
DOI: 10.1177/1550147719860365
|View full text |Cite
|
Sign up to set email alerts
|

Semi-supervised machine learning for primary user emulation attack detection and prevention through core-based analytics for cognitive radio networks

Abstract: Cognitive radio networks are software controlled radios with the ability to allocate and reallocate spectrum depending upon the demand. Although they promise an extremely optimal use of the spectrum, they also bring in the challenges of misuse and attacks. Selfish attacks among other attacks are the most challenging, in which a secondary user or an unauthorized user with unlicensed spectrum pretends to be a primary user by altering the signal characteristics. Proposed methods leverage advancement to efficientl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Another approach is to use a deep learning convolution network considering a fourth-order cyclic cumulant vector (CRM) in the frequency domain to detect the modulation patterns in a convolutional deep learning method. It uses an ideal PUE attacker with a limited functionality, and its analysis is for a fixed network using simulations and is not implemented in a real scenario with motional users [26].…”
Section: Machine Learning Techniques For Pue Detection In Mcrnmentioning
confidence: 99%
“…Another approach is to use a deep learning convolution network considering a fourth-order cyclic cumulant vector (CRM) in the frequency domain to detect the modulation patterns in a convolutional deep learning method. It uses an ideal PUE attacker with a limited functionality, and its analysis is for a fixed network using simulations and is not implemented in a real scenario with motional users [26].…”
Section: Machine Learning Techniques For Pue Detection In Mcrnmentioning
confidence: 99%
“…While many conventional countermeasures against security attacks in cognitive radio networks exist [172], there is very limited published work on ML techniques for this purpose [173]. Thus, this is a potentially very fruitful research area.…”
Section: E Security Applications Of Gans In Nextgmentioning
confidence: 99%
“…However, the sensing performance, sum rate, and network lifetime were not evaluated. In [25], the authors proposed ML approach for CRNs, where unsupervised ML, supervised ML, semi-supervised ML, deep learning algorithms used to detect the PUEA and improve detection performance. However, the sum rate and the network lifetime were not analyzed.…”
Section: Related Workmentioning
confidence: 99%