DocumentCode
741898
Title
Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks
Author
Nguyen Thanh, Nhan ; Ciblat, Philippe ; Pham, Anh T. ; Nguyen, Van-Tam
Volume
14
Issue
9
fYear
2015
Firstpage
4981
Lastpage
4993
Abstract
We investigate the primary user emulation (PUE) attack, which is a serious security problem in cognitive radio (CR) networks. There exist three types of PUE attackers: 1) a selfish one, which aims at maximizing its selfish usage of channel resource; 2) a malicious one, which points for obstructing the operation of CR network; and 3) a mixed one, which is between a selfish and malicious PUE attacker. For combating a selfish PUE attacker, a channel surveillance process has to be implemented in order to determine active user´s identification and so selfish PUE attacker. An extra-sensing process has to be implemented for observing new opportunities to access the channel and so for mitigating the malicious PUE attacker´s effect. Relevant strategies for deploying the above processes are obtained through a game theory-based analysis and the exhibition of Nash equilibrium (NE). We show the NE strongly depends on the network demand, the availability of the spectrum resource, and the type of the attacker.
Keywords
Bandwidth; Engines; Games; Nash equilibrium; Sensors; Surveillance; Wireless communication; Cognitive radio; cognitive radio; game theory; primary user emulation attack; security; spectrum sensing;
fLanguage
English
Journal_Title
Wireless Communications, IEEE Transactions on
Publisher
ieee
ISSN
1536-1276
Type
jour
DOI
10.1109/TWC.2015.2430865
Filename
7103339
Link To Document