Cognitive Radio Oriented Wireless Networks. 10th International Conference, CROWNCOM 2015, Doha, Qatar, April 21–23, 2015, Revised Selected Papers

Research Article

Mitigation of Primary User Emulation Attacks in Cognitive Radio Networks Using Belief Propagation

Download
328 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-24540-9_38,
        author={Sasa Maric and Sam Reisenfeld},
        title={Mitigation of Primary User Emulation Attacks in Cognitive Radio Networks Using Belief Propagation},
        proceedings={Cognitive Radio Oriented Wireless Networks. 10th International Conference, CROWNCOM 2015, Doha, Qatar, April 21--23, 2015, Revised Selected Papers},
        proceedings_a={CROWNCOM},
        year={2015},
        month={10},
        keywords={Cognitive radio networks Belief propagation Primary user emulation attacks Security},
        doi={10.1007/978-3-319-24540-9_38}
    }
    
  • Sasa Maric
    Sam Reisenfeld
    Year: 2015
    Mitigation of Primary User Emulation Attacks in Cognitive Radio Networks Using Belief Propagation
    CROWNCOM
    Springer
    DOI: 10.1007/978-3-319-24540-9_38
Sasa Maric1,*, Sam Reisenfeld1,*
  • 1: Macquarie University
*Contact email: sasa.maric@students.mq.edu.au, sam.reisenfeld@mq.edu.au

Abstract

In this paper, we introduce a belief propagation based technique to combat the effects of primary user emulation attacks (PUEA) in Cognitive Radio (CR) Networks. Primary user emulation attacks have been identified as the most serious threat to CR security. In a PUEA, a malicious user emulates the characteristics of a primary user and transmits over idle channels. As a result, secondary users that want to use the channels are tricked into believing that they are occupied and avoid transmitting on those channels. This allows the malicious user to use the channels uncontested. To moderate the effects of PUEA, we propose a defence strategy based on belief propagation. In our solution, each secondary user examines the incoming signal and calculates the probability that it was transmitted from a primary user. These probabilities are known as beliefs. The beliefs at secondary users are reconciled to an agreed decision by comparison to a predefined threshold. The decision is made by a secondary user on whether it is believed that received transmission on a channel originated from a legitimate primary user or from a primary user emulation attacker.