Skip to main content
Log in

Trust Establishment in Chaotic Cognitive Environment to Improve Attack Detection Accuracy Under Primary User Emulation

  • Research Paper
  • Published:
Iranian Journal of Science and Technology, Transactions of Electrical Engineering Aims and scope Submit manuscript

Abstract

In this paper, we propose a novel algorithm for primary user emulation attack detection and removal in cognitive radio networks, which are driven by chaotic tag-based sequencing for communication. Our proposed approach demonstrates the use of the look-up table-based challenge sequences which are monitored by the cognitive base station and act as the first line of defense against any primary user emulation attacker. This ensures that almost all of the attackers are suppressed, and for the remaining attackers if any, we use a tag-based chaotic communication system, wherein each of the requests from secondary users is sent like a chaotic noise sequence on the channel, and the receiving entity decodes this sequence in order to get the signal communicated by an authorized transmitter. If there is any communication by an attacker, then it is detected immediately, as none of the receiving entities can decode the signals sent by these unwanted attacker nodes. This ensures that our system guarantees greater than 99% detection and identification of attackers in primary user emulation attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Alahmadi A, Abdelhakim M, Ren J, Li T (2014) Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Trans Inf Forensics Secur 9(5):772–781

    Article  Google Scholar 

  • Anand S, Jin Z, Subbalakshmi KP (2008) An analytical model for primary user emulation attacks in cognitive radio networks. In: 2008 3rd IEEE symposium on new frontiers in dynamic spectrum access networks, Chicago, IL, pp 1–6

  • Chakravarthy R, Huang K, Zhang L, Wu Z (2017) Primary user authentication of cognitive radio network using underlay waveform. In: 2017 Cognitive communications for aerospace applications workshop (CCAA), Cleveland, pp 1–5

  • Chen R, Park JM (2006) Ensuring trustworthy spectrum sensing in cognitive radio networks. In: IEEE workshop on networking technologies for software defined radio (SDR’06), pp 110–119

  • Chen R, Park JM, Reed JH (2008) Defense against primary user emulation attacks in cognitive radio networks. IEEE J Sel Areas Commun 26(1):25–37

    Article  Google Scholar 

  • Chen Y, Yang L, Ma S, Yuan X (2016) Detecting primary user emulation attacks based on PDF-BP algorithm in cognitive radio networks. In: 2016 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (Smart Data), Chengdu, pp 660–666

  • Ghanem WR, Shokair M, Desouky MI (2016) An improved primary user emulation attack detection in cognitive radio networks based on firefly optimization algorithm. In: 2016 33rd national radio science conference (NRSC), Aswan, pp 178–187

  • Ghaznavi M, Jamshidi A (2015) A reliable spectrum sensing method in the presence of malicious sensors in distributed cognitive radio network. IEEE Sens J 15(3):1810–1816

    Google Scholar 

  • Ghaznavi M, Jamshidi A (2017) Defence against primary user emulation attack using statistical properties of the cognitive radio received power. IET Commun 11(9):1535–1542

    Article  Google Scholar 

  • Haghighat M, Sadough SMS (2012) Cooperative spectrum sensing in cognitive radio networks under primary user emulation attacks. In: 2012 6th international symposium on telecommunications (IST), Tehran, pp 148–151

  • Haghighat M, Sadough SMS (2014) Cooperative spectrum sensing for cognitive radio networks in the presence of smart malicious users. AEU Int J Electron Commun 68(6):520–527

    Article  Google Scholar 

  • Kuo HH, Liao TL, Lin JS, Yan JJ (2009) A new structure of chaotic secure communication in wireless AWGN channel. In: 2009. IWCFTA ‘09. International workshop on chaos-fractals theories and applications, Shenyang, pp 182–185

  • Li Y, Han C, Wang M, Chen H, Xie L (2016) A primary user emulation attack detection scheme in cognitive radio network with mobile secondary user. In: 2016 2nd IEEE international conference on computer and communications (ICCC), Chengdu, pp 1076–1081

  • Liu Y, Ning P, Dai H (2010) Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In: 2010 IEEE symposium on security and privacy, Oakland, pp 286–301

  • Liu L, Zhang Z, Li J (2016) EM-based algorithm for defeating against primary user emulation attacks in cognitive wireless networks. In: 2016 2nd IEEE international conference on computer and communications (ICCC), Chengdu, pp 1450–1455

  • Nguyen-Thanh N, Ciblat P, Pham AT, Nguyen VT (2015) Surveillance strategies against primary user emulation attack in cognitive radio networks. IEEE Trans Wireless Commun 14(9):4981–4993

    Article  Google Scholar 

  • Tan X, Borle K, Du W, Chen B (2011) Cryptographic link signatures for spectrum usage authentication in cognitive radio. In: Proceedings of the 4th ACM conference on wireless network security, pp 79–90

  • Thanu M (2012) Detection of primary user emulation attacks in cognitive radio networks. In: 2012 International conference on collaboration technologies and systems (CTS), Denver, pp 605–608

  • Xie X, Wang W (2013) Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding. In: 2013 International workshop on communications and sensor networks (ComSense-2013), procedia computer science, vol 21, pp 430–435

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shriraghavan Madbushi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Madbushi, S., Raut, R. & Rukmini, M.S.S. Trust Establishment in Chaotic Cognitive Environment to Improve Attack Detection Accuracy Under Primary User Emulation. Iran J Sci Technol Trans Electr Eng 42, 291–297 (2018). https://doi.org/10.1007/s40998-018-0073-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40998-018-0073-5

Keywords

Navigation