Title: POOLED METHODOLOGY FOR COMBATING PRIMARY USER EMULATION ATTACK IN COGNITIVE RADIO NETWORKS

Year of Publication: 2013
Page Numbers: 221-229
Authors: Mufliha Kamran, Ghulam Shabbir, Muhammad Abid
Conference Name: The Third International Conference on Digital Information Processing and Communications (ICDIPC2013)
- United Arab Emirates

Abstract:


Cognitive Radio (CR) is gifted technique that has a potential to resolve the problem of spectrum scarcity. The investigation of available spectrum band by the secondary users is called spectrum sensing; a core mechanism mandatory for the true operation of CRs. Security of spectrum sensing process needs a lot of focus. Information security in the control channel is dependent upon the authentication surety of cognitive radio network that are used for the exchange of the information on the free primary channels. So, if the channel sensing is unsecure then occurrence of interference or the preemption of resources for long can take place. This uncertainty is often due to a serious threat of Primary User Emulation Attack (PUEA) in which the attacker confuses the CR, by mimicking the characteristics of a Primary User (PU) to gain illegal access to the spectrum. This is a great threat to control channel authenticity. We have proposed a technique of pooled methodology to mitigate the effect of this attack by employing a combined effect of energy detection and feature detection. With the help of simulations the effectiveness of our scheme is established in terms of higher probability of false detections in case of energy detection scheme and lower in case of pooled methodology for the security establishment.