DocumentCode :
241212
Title :
A mitigation strategy against malicious Primary User Emulation Attack in Cognitive Radio networks
Author :
Naqvi, Bilal ; Murtaza, Shafaq ; Aslam, Baber
Author_Institution :
Nat. Univ. of Sci. & Technol., Islamabad, Pakistan
fYear :
2014
fDate :
8-9 Dec. 2014
Firstpage :
112
Lastpage :
117
Abstract :
The increasing demand of usable spectrum range startled the world of serious shortage in coming years. Cognitive Radio technology emerged to solve this problem by allowing unlicensed users to utilize the spectrum resources whenever the licensed users are not active. With the emergence of this technology many security issues arose, that if successful may hamper all the benefits this promising technology has to offer. Among many other security issues Primary User Emulation Attack is one. In this paper we discuss the Primary User Emulation Attack. We also discuss the existing work in the field, along with its limitations. We also elucidate the effects of this attack through simulation results. In the end we describe our proposed approach to counter the Primary User Emulation Attack.
Keywords :
cognitive radio; radio networks; radio spectrum management; telecommunication security; cognitive radio networks; malicious primary user emulation attack mitigation strategy; spectrum resources; usable spectrum range; Cognitive radio; Emulation; Internet; Jamming; Security; Sensors; Simulation; Cognitive Radio Network; Malicious Primary User Emulation Attack; Opportunistic access; Primary User Emulation Attack; Selfish Primary User Emulation Attack; Sensing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Technologies (ICET), 2014 International Conference on
Conference_Location :
Islamabad
Print_ISBN :
978-1-4799-6088-0
Type :
conf
DOI :
10.1109/ICET.2014.7021026
Filename :
7021026
Link To Document :
بازگشت