Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Detecting primary user emulation attacks in dynamic spectrum access networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Towards secure spectrum decision
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Cognitive radio: brain-empowered wireless communications
IEEE Journal on Selected Areas in Communications
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
JENNA: a jamming evasive network-coding neighbor-discovery algorithm for cognitive radio networks
IEEE Wireless Communications
IEEE Transactions on Wireless Communications
Towards a cooperative intrusion detection system for cognitive radio networks
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Robust detection of primary user emulation attacks in IEEE 802.22 networks
Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management
Security and Communication Networks
Cooperative detection of primary user emulation attacks in CRNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Review: Vulnerabilities in cognitive radio networks: A survey
Computer Communications
Hi-index | 0.00 |
We present a Neyman-Pearson composite hypothesis test (NPCHT) and a Wald's sequential probability ratio test (WSPRT) to detect primary user emulation attacks (PUEA) in cognitive radio networks. Most approaches in the literature on PUEA assume the presence of underlying sensor networks for localization of the malicious nodes. There are no analytical studies available in the literature to study PUEA in the presence of multiple malicious users in fading wireless environments. We present an NPCHT and WSPRT based analysis to detect PUEA in fading wireless channels in the presence of multiple randomly located malicious users. We show that there is a range of network radii in which PUEA are most successful. Results also show that for the same desired threshold on the probability of missing the primary, WSPRT can achieve a probability of successful PUEA 50% less than that obtained by NPCHT.