Security vulnerabilities in IEEE 802.22
Proceedings of the 4th Annual International Conference on Wireless Internet
ACM SIGMOBILE Mobile Computing and Communications Review
Towards a trust aware cognitive radio architecture
ACM SIGMOBILE Mobile Computing and Communications Review
Opportunistic spectrum sharing with multiple cochannel primary transmitters
IEEE Transactions on Wireless Communications
EURASIP Journal on Advances in Signal Processing - Special issue on advanced signal processing for cognitive radio networks
Dogfight in spectrum: jamming and anti-jamming in multichannel cognitive radio systems
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Optimal power allocation strategy against jamming attacks using the Colonel Blotto game
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Worst-case sensing deception in cognitive radio networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Detecting primary user emulation attacks in dynamic spectrum access networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
IEEE Network: The Magazine of Global Internetworking - Special issue on biologically inspired networking
Tradeoff between spoofing and jamming a cognitive radio
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
A scalable dynamic spectrum access solution for large wireless networks
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Malicious user detection in a cognitive radio cooperative sensing system
IEEE Transactions on Wireless Communications
JENNA: a jamming evasive network-coding neighbor-discovery algorithm for cognitive radio networks
IEEE Wireless Communications
IEEE Transactions on Wireless Communications
IEEE Transactions on Wireless Communications
Cognitive radios for dynamic spectrum access: from concept to reality
IEEE Wireless Communications
Location-based authentication protocol for first cognitive radio networking standard
Journal of Network and Computer Applications
Cryptographic link signatures for spectrum usage authentication in cognitive radio
Proceedings of the fourth ACM conference on Wireless network security
Reliable telemetry in white spaces using remote attestation
Proceedings of the 27th Annual Computer Security Applications Conference
Physical-layer security challenges of DSA-enabled TD-LTE
Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management
Robust detection of primary user emulation attacks in IEEE 802.22 networks
Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management
Computer Networks: The International Journal of Computer and Telecommunications Networking
Enforcing dynamic spectrum access with spectrum permits
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Cooperative spectrum sensing in cognitive radio networks: A survey
Physical Communication
Security and Communication Networks
Higher layer issues in cognitive radio network
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Cooperative detection of primary user emulation attacks in CRNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Review: Cognitive radio network security: A survey
Journal of Network and Computer Applications
Fundamental Limitations on Pilot-based Spectrum Sensing at Very Low SNR
Wireless Personal Communications: An International Journal
Security and privacy issues for the network of the future
Security and Communication Networks
Expert Systems with Applications: An International Journal
Game theory meets network security and privacy
ACM Computing Surveys (CSUR)
Managing sensing and cooperation to analyze PUE attacks in cognitive radio ad hoc networks
Proceedings of the 8th International Conference on Network and Service Management
Review: Vulnerabilities in cognitive radio networks: A survey
Computer Communications
Secure Distributed Routing Algorithm with Optimizing Energy Consumption for Cognitive Radio Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.07 |
Cognitive radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in licensed spectrum bands while causing no interference to incumbent communications. Spectrum sensing is one of the essential mechanisms of CRs and its operational aspects are being investigated actively. However, the security aspects of spectrum sensing have garnered little attention. In this paper, we identify a threat to spectrum sensing, which we call the primary user emulation (PUE) attack. In this attack, an adversary's CR transmits signals whose characteristics emulate those of incumbent signals. The highly flexible, software-based air interface of CRs makes such an attack possible. Our investigation shows that a PUE attack can severely interfere with the spectrum sensing process and significantly reduce the channel resources available to legitimate unlicensed users. To counter this threat, we propose a transmitter verification scheme, called LocDef (localization-based defense), which verifies whether a given signal is that of an incumbent transmitter by estimating its location and observing its signal characteristics. To estimate the location of the signal transmitter, LocDef employs a non-interactive localization scheme. Our security analysis and simulation results suggest that LocDef is effective in identifying PUE attacks under certain conditions.