Abstract
In this paper, we propose a novel algorithm for primary user emulation attack detection and removal in cognitive radio networks, which are driven by chaotic tag-based sequencing for communication. Our proposed approach demonstrates the use of the look-up table-based challenge sequences which are monitored by the cognitive base station and act as the first line of defense against any primary user emulation attacker. This ensures that almost all of the attackers are suppressed, and for the remaining attackers if any, we use a tag-based chaotic communication system, wherein each of the requests from secondary users is sent like a chaotic noise sequence on the channel, and the receiving entity decodes this sequence in order to get the signal communicated by an authorized transmitter. If there is any communication by an attacker, then it is detected immediately, as none of the receiving entities can decode the signals sent by these unwanted attacker nodes. This ensures that our system guarantees greater than 99% detection and identification of attackers in primary user emulation attacks.
Similar content being viewed by others
References
Alahmadi A, Abdelhakim M, Ren J, Li T (2014) Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Trans Inf Forensics Secur 9(5):772–781
Anand S, Jin Z, Subbalakshmi KP (2008) An analytical model for primary user emulation attacks in cognitive radio networks. In: 2008 3rd IEEE symposium on new frontiers in dynamic spectrum access networks, Chicago, IL, pp 1–6
Chakravarthy R, Huang K, Zhang L, Wu Z (2017) Primary user authentication of cognitive radio network using underlay waveform. In: 2017 Cognitive communications for aerospace applications workshop (CCAA), Cleveland, pp 1–5
Chen R, Park JM (2006) Ensuring trustworthy spectrum sensing in cognitive radio networks. In: IEEE workshop on networking technologies for software defined radio (SDR’06), pp 110–119
Chen R, Park JM, Reed JH (2008) Defense against primary user emulation attacks in cognitive radio networks. IEEE J Sel Areas Commun 26(1):25–37
Chen Y, Yang L, Ma S, Yuan X (2016) Detecting primary user emulation attacks based on PDF-BP algorithm in cognitive radio networks. In: 2016 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (Smart Data), Chengdu, pp 660–666
Ghanem WR, Shokair M, Desouky MI (2016) An improved primary user emulation attack detection in cognitive radio networks based on firefly optimization algorithm. In: 2016 33rd national radio science conference (NRSC), Aswan, pp 178–187
Ghaznavi M, Jamshidi A (2015) A reliable spectrum sensing method in the presence of malicious sensors in distributed cognitive radio network. IEEE Sens J 15(3):1810–1816
Ghaznavi M, Jamshidi A (2017) Defence against primary user emulation attack using statistical properties of the cognitive radio received power. IET Commun 11(9):1535–1542
Haghighat M, Sadough SMS (2012) Cooperative spectrum sensing in cognitive radio networks under primary user emulation attacks. In: 2012 6th international symposium on telecommunications (IST), Tehran, pp 148–151
Haghighat M, Sadough SMS (2014) Cooperative spectrum sensing for cognitive radio networks in the presence of smart malicious users. AEU Int J Electron Commun 68(6):520–527
Kuo HH, Liao TL, Lin JS, Yan JJ (2009) A new structure of chaotic secure communication in wireless AWGN channel. In: 2009. IWCFTA ‘09. International workshop on chaos-fractals theories and applications, Shenyang, pp 182–185
Li Y, Han C, Wang M, Chen H, Xie L (2016) A primary user emulation attack detection scheme in cognitive radio network with mobile secondary user. In: 2016 2nd IEEE international conference on computer and communications (ICCC), Chengdu, pp 1076–1081
Liu Y, Ning P, Dai H (2010) Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In: 2010 IEEE symposium on security and privacy, Oakland, pp 286–301
Liu L, Zhang Z, Li J (2016) EM-based algorithm for defeating against primary user emulation attacks in cognitive wireless networks. In: 2016 2nd IEEE international conference on computer and communications (ICCC), Chengdu, pp 1450–1455
Nguyen-Thanh N, Ciblat P, Pham AT, Nguyen VT (2015) Surveillance strategies against primary user emulation attack in cognitive radio networks. IEEE Trans Wireless Commun 14(9):4981–4993
Tan X, Borle K, Du W, Chen B (2011) Cryptographic link signatures for spectrum usage authentication in cognitive radio. In: Proceedings of the 4th ACM conference on wireless network security, pp 79–90
Thanu M (2012) Detection of primary user emulation attacks in cognitive radio networks. In: 2012 International conference on collaboration technologies and systems (CTS), Denver, pp 605–608
Xie X, Wang W (2013) Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding. In: 2013 International workshop on communications and sensor networks (ComSense-2013), procedia computer science, vol 21, pp 430–435
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Madbushi, S., Raut, R. & Rukmini, M.S.S. Trust Establishment in Chaotic Cognitive Environment to Improve Attack Detection Accuracy Under Primary User Emulation. Iran J Sci Technol Trans Electr Eng 42, 291–297 (2018). https://doi.org/10.1007/s40998-018-0073-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40998-018-0073-5