Abstract

This paper presents the results of the characterization of the attack known as the "primary user emulation" in mobile cognitive radio networks performing the implementation and testing. The tools and their configuration to carry out the attack are presented and their effects on the network are analyzed. The results show how to generate the attack with a software-defined radio equipment (SDR) using GNU-Radio and OpenBTS. The effects of the possible configurations of the attack on the network are shown, the malicious type generates constant interference on the primary or cognitive network, the selfish type allows to imitate a licensed or primary user generating interference to the primary network and inability to access the Cognitive Network while active. If the emulator's power level is fixed, the services it provides are stable. If the power is variable the services suffer intermittency. Primary user emulation is the attack that most affects the cognitive radio network so its effects are analyzed in order to propose ways of detecting or applying countermeasures.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call