Security vulnerabilities in IEEE 802.22
Proceedings of the 4th Annual International Conference on Wireless Internet
ACM SIGMOBILE Mobile Computing and Communications Review
Dynamic Spectrum Access and Management in Cognitive Radio Networks
Dynamic Spectrum Access and Management in Cognitive Radio Networks
Dogfight in spectrum: jamming and anti-jamming in multichannel cognitive radio systems
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Detecting primary user emulation attacks in dynamic spectrum access networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework
IEEE Journal on Selected Areas in Communications
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Towards a cooperative intrusion detection system for cognitive radio networks
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Managing sensing and cooperation to analyze PUE attacks in cognitive radio ad hoc networks
Proceedings of the 8th International Conference on Network and Service Management
Hi-index | 0.01 |
In cognitive radio systems, primary user emulation (PUE) attack means that an attacker sends primary-user-like signals during the spectrum sensing period such that honest secondary users leave the corresponding channels, which causes a serious threat to cognitive radio systems. A passive anti-PUE approach, similar to the random frequency hopping in traditional anti-jamming schemes, is proposed and called dogfight in spectrum. In this scheme, the defenders randomly choose channels to sense and avoid the PUE attack. It is assumed that the channel statistics like availability probabilities are known; then the PUE attack and the random hopping are modeled as a zerosum game between the attacker and defending secondary user(s). The Nash equilibrium of the game is found. The anti-jamming efficiency is also obtained. Numerical simulations demonstrated the performances of the proposed schemes for both the single defender, multiple defender and multiple round cases.