Channel-based detection of primary user emulation attacks in cognitive radios

Wen Long Chin, Chun Lin Tseng, Chun Shen Tsai, Wei Che Kao, Chun Wei Kao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Citations (Scopus)

Abstract

Recently, cognitive radio (CR) has recently emerged as a useful technology to improve the efficiency of spectrum utilization. However, wireless networks are accompanied with an important security flaw that they are much easier to be attacked than any wired network. Many security issues are discovered. Within which, the most important one is primary user emulation attack (PUEA). In this work, we propose a method by using the characteristics of wireless channels to identify the PUEA. In the wireless environment, the statistical property of the wireless channel between the receiver and transmitter is unique; therefore, we can use this feature as a radio fingerprint. By employing the capability of spectrum sensing in CR, we can identify primary user emulation attackers via the uniqueness of wireless channels. Compared with conventional security schemes based on higher layer protocols, whose information must be passed to the upper layers, the proposed scheme using physical layer is more efficient in terms of the detection time. Simulations confirm the advantages of the proposed scheme.

Original languageEnglish
Title of host publicationIEEE 75th Vehicular Technology Conference, VTC Spring 2012 - Proceedings
DOIs
Publication statusPublished - 2012 Aug 20
EventIEEE 75th Vehicular Technology Conference, VTC Spring 2012 - Yokohama, Japan
Duration: 2012 May 62012 Jun 9

Publication series

NameIEEE Vehicular Technology Conference
ISSN (Print)1550-2252

Other

OtherIEEE 75th Vehicular Technology Conference, VTC Spring 2012
Country/TerritoryJapan
CityYokohama
Period12-05-0612-06-09

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Channel-based detection of primary user emulation attacks in cognitive radios'. Together they form a unique fingerprint.

Cite this