Abstract
The study and the detection of possible network attacks are essential for wireless networks, in particular for mobile cognitive radio networks due to its characteristics such as the dynamic spectrum allocation and constant frequency hopping. The primary user emulation attack is one of the most significant attacks in cognitive radio, because it hazards the complete cognitive cycle. The techniques used for the detection of primary user emulation found in the literature are based on a fixed attacker location. However, in a mobile environment, the attacker usually has dynamic locations and this compromises the current applied security techniques and generates inefficient attack detection. Therefore, our work proposes a novel technique using cross-layer design for the detection of primary user emulation with mobility. This attack detection technique was tested with experiments using software-defined radio equipment and mobile phones at indoor scenarios with dynamic locations and with a mobile phone base station built up also with software-defined radio. The obtained results show that the combination of the three utilized techniques, energy detection, motion estimation, and application information analysis, are able to optimize the detection with around 100% of effectiveness for the primary user emulation attack with dynamic location. The proposed technique shows that the energy detection time is around 100 ms and for the processing time of the information analysis in the mobile phone is about 30 s. This result shows a practical and effective approach to detect primary emulation attacks. The proposed technique, to the best of the authors’ knowledge, has not been presented before in the literature with experiments neither with mobility conditions of the attacker as presented in our proposed work.
Highlights
The cognitive radio networks (CRN) use softwaredefined radio (SDR) as a tool to find free spaces in the frequency spectrum assigned to a licensed primary user (PU) and to transmit as an unlicensed secondary user (SU) [1]
A binary hypothesis test is used to find out the probability of detection (PD) and the probability of false alarm (PFA); this is defined in Eq 10
7 Conclusions We have studied the methods for detection of primary user emulation and proposed a novel technique using cross-layer design with a static or dynamic location of the attacker
Summary
The cognitive radio networks (CRN) use softwaredefined radio (SDR) as a tool to find free spaces in the frequency spectrum assigned to a licensed primary user (PU) and to transmit as an unlicensed secondary user (SU) [1]. Research found in the literature have shown that primary frequencies are not efficiently used especially in mobile networks [2,3,4], showing the relevance of CRN implementation to optimize spectrum utilization thinking on Internet of Things (IoT) applications. The CRN security has been studied and there are new specific attacks to the network, but still there are open issues to be solved in this field [6]. As the CR senses the spectrum all the time, the PUE signal is fraudulently detected as a primary user, and the secondary user must release the channel [7]. Several authors have studied how to detect PUE attack in CRN, but just a few have made it in a mobile cognitive radio network (MCRN) [8, 9]. The detection to hop to another frequency as soon as possible to avoid interference is made by methods such as energy detection [10], localization [11], and among others as shown in Section 3; with dynamic location scenario, these traditional methods will increase the false alarm results
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: EURASIP Journal on Wireless Communications and Networking
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.