TY - GEN
T1 - Channel-based detection of primary user emulation attacks in cognitive radios
AU - Chin, Wen Long
AU - Tseng, Chun Lin
AU - Tsai, Chun Shen
AU - Kao, Wei Che
AU - Kao, Chun Wei
PY - 2012/8/20
Y1 - 2012/8/20
N2 - Recently, cognitive radio (CR) has recently emerged as a useful technology to improve the efficiency of spectrum utilization. However, wireless networks are accompanied with an important security flaw that they are much easier to be attacked than any wired network. Many security issues are discovered. Within which, the most important one is primary user emulation attack (PUEA). In this work, we propose a method by using the characteristics of wireless channels to identify the PUEA. In the wireless environment, the statistical property of the wireless channel between the receiver and transmitter is unique; therefore, we can use this feature as a radio fingerprint. By employing the capability of spectrum sensing in CR, we can identify primary user emulation attackers via the uniqueness of wireless channels. Compared with conventional security schemes based on higher layer protocols, whose information must be passed to the upper layers, the proposed scheme using physical layer is more efficient in terms of the detection time. Simulations confirm the advantages of the proposed scheme.
AB - Recently, cognitive radio (CR) has recently emerged as a useful technology to improve the efficiency of spectrum utilization. However, wireless networks are accompanied with an important security flaw that they are much easier to be attacked than any wired network. Many security issues are discovered. Within which, the most important one is primary user emulation attack (PUEA). In this work, we propose a method by using the characteristics of wireless channels to identify the PUEA. In the wireless environment, the statistical property of the wireless channel between the receiver and transmitter is unique; therefore, we can use this feature as a radio fingerprint. By employing the capability of spectrum sensing in CR, we can identify primary user emulation attackers via the uniqueness of wireless channels. Compared with conventional security schemes based on higher layer protocols, whose information must be passed to the upper layers, the proposed scheme using physical layer is more efficient in terms of the detection time. Simulations confirm the advantages of the proposed scheme.
UR - http://www.scopus.com/inward/record.url?scp=84864982913&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84864982913&partnerID=8YFLogxK
U2 - 10.1109/VETECS.2012.6239877
DO - 10.1109/VETECS.2012.6239877
M3 - Conference contribution
AN - SCOPUS:84864982913
SN - 9781467309905
T3 - IEEE Vehicular Technology Conference
BT - IEEE 75th Vehicular Technology Conference, VTC Spring 2012 - Proceedings
T2 - IEEE 75th Vehicular Technology Conference, VTC Spring 2012
Y2 - 6 May 2012 through 9 June 2012
ER -