DocumentCode :
1736925
Title :
A proactive elimination of Primary User Emulation Attack in cognitive radio networks using Intense Explore algorithm
Author :
Sumathi, A.C. ; Vidhyapriya, R. ; Kiruthika, C.
Author_Institution :
Dept. of Comput. Sci. & Eng., SNS Coll. of Eng., Coimbatore, India
fYear :
2015
Firstpage :
1
Lastpage :
7
Abstract :
In cognitive radio network, secondary users (without license) are allowed to access the licensed spectrum if primary users (having license) are not present. A serious threat in physical layer of this network is that a malicious secondary user exploiting the spectrum access etiquette by mimicking the spectral characteristics of a primary user known as Primary User Emulation Attack (PUEA). The main objective of this paper is to eliminate the PUE attack that may arise from one of the secondary users. We propose our Intense Explore algorithm to eliminate the PUE attack in a proactive way. Our simulation results proved that our proposed Intense Explore algorithm yields better results than existing techniques.
Keywords :
cognitive radio; radio spectrum management; telecommunication security; PUEA proactive elimination; cognitive radio network; intense explore algorithm; licensed spectrum; malicious secondary user; primary user emulation attack proactive elimination; spectrum access; Cognitive radio; Computers; Correlation; Emulation; Feature extraction; Informatics; Sensors; Cognitive Radio Network; Intense Explore; PUEA;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Communication and Informatics (ICCCI), 2015 International Conference on
Conference_Location :
Coimbatore
Print_ISBN :
978-1-4799-6804-6
Type :
conf
DOI :
10.1109/ICCCI.2015.7218110
Filename :
7218110
Link To Document :
بازگشت