A Survey of Various Defense Techniques to Detect Primary User Emulation Attacks
نویسندگان
چکیده
With the advancement in wireless technology, there is an increasing problem of spectrum scarcity. To resolve this issue, a technology called Cognitive Radio (CR), based on Joseph Mitola’s Software Defined Radio (SDR) was introduced, in which the secondary users can sense the spectrum and utilize the licensed bands when the spectrum is not being utilized by the primary user. Because of its wireless nature, this device attracts various security threats common to all wireless technologies. In addition to these, there are various security concerns specific to CR, which these networks are vulnerable to. One of the most dominant threats among these is the Primary User Emulation Attack (PUEA). In this paper, our main purpose is to list out the various security threats faced by the cognitive radio networks and in particular, PUEA. Further, we enlist the different defense techniques which can combat the PUE attacks and ultimately compare these defense techniques on various parameters.
منابع مشابه
Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks
Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...
متن کاملInvestigation of Always Present and Spectrum Sensing based Incumbent Emulators
Cognitive radio (CR) technology has been suggested for effective use of spectral resources. Spectrum sensing is one of the main operations of CR users to identify the vacant frequency bands. Cooperative spectrum sensing (CSS) is used to increase the performance of CR networks by providing spatial diversity. The accuracy of spectrum sensing is the most important challenge in the CSS process sinc...
متن کاملA Study on Primary User Emulation Attack in Cognitive Radio Networks
CR is an emerging technology in wireless communications. Based on their operating environment CRNs can dynamically reconfigure their characteristcics. So that many security issues has been an alarming fact to CRNs. One such attack is the Primary User Emulation Attack (PUEA). There are many techniques available to mitigate this attack. This paper presents a study about various defense techniques...
متن کاملAn Overview of Vulnerabilities of Voice Controlled Systems
Over the last few years, a rapidly increasing number of Internet-of-Things (IoT) systems that adopt voice as the primary user input have emerged. These systems have been shown to be vulnerable to various types of voice spoofing attacks. However, how exactly these techniques differ or relate to each other has not been extensively studied. In this paper, we provide a survey of recent attack and d...
متن کاملDetecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding
Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect emulators. In this paper, we propose a new mechanism based on physical layer network coding to detect the emulators. When two signal sequences interfere at th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014