DOI QR코드

DOI QR Code

Multiple-Phase Energy Detection and Effective Capacity Based Resource Allocation Against Primary User Emulation Attacks in Cognitive Radio Networks

  • Liu, Zongyi (State Key Laboratory of Geo-information Engineering) ;
  • Zhang, Guomei (State Key Laboratory of Geo-information Engineering) ;
  • Meng, Wei (School of Information and Communications Engineering, Xi'an Jiaotong University) ;
  • Ma, Xiaohui (State Key Laboratory of Geo-information Engineering) ;
  • Li, Guobing (School of Information and Communications Engineering, Xi'an Jiaotong University)
  • Received : 2018.07.26
  • Accepted : 2019.10.30
  • Published : 2020.03.31

Abstract

Cognitive radio (CR) is regarded as an effective approach to avoid the inefficient use of spectrum. However, CRNs have more special security problems compared with the traditional wireless communication systems due to its open and dynamic characteristics. Primary user emulation attack (PUEA) is a common method which can hinder secondary users (SUs) from accessing the spectrum by transmitting signals who has the similar characteristics of the primary users' (PUs) signals, and then the SUs' quality of service (QoS) cannot be guaranteed. To handle this issue, we first design a multiple-phase energy detection scheme based on the cooperation of multiple SUs to detect the PUEA more precisely. Second, a joint SUs scheduling and power allocation scheme is proposed to maximize the weighted effective capacity of multiple SUs with a constraint of the average interference to the PU. The simulation results show that the proposed method can effectively improve the effective capacity of the secondary users compared with the traditional overlay scheme which cannot be aware of the existence of PUEA. Also the good delay QoS guarantee for the secondary users is provided.

Keywords

1. Introduction

With the rapid development of wireless communication technology, mobile devices and services become more diverse and the bandwidth demand for wireless networks increases dramatically. The traditional spectrum allocation policy assigns spectrum to the specific authorized users fixedly. The spectrum efficiency of such a static allocation is very low [1]. The survey data of Federal Communication Commission (FCC) show that many authorized bands are underutilized [2]. Cognitive radio is considered to be an efficient solution to overcome the problem of spectrum inefficiency and scarcity by the dynamic and flexible spectrum access. Actually, CR technology has been deemed as a promising approach to address the challenges and requirements on massive capacity of the fifth generation (5G) mobile networks [3], [4]. Spectrum sharing by dynamic spectrum access is the core idea of CR. In order to meet the much higher spectrum requirements of 5G, full spectrum sharing throughout all kinds of spectrum resources is expected, such as low and high frequency bands, licensed and unlicensed frequency bands, and continuous and discontinuous frequency bands [4]. Spectrum sensing and spectrum allocation are two key steps of spectrum sharing in cognitive radio networks (CRNs). The main purpose of spectrum sensing is to find the white spaces so that SUs can obtain more opportunities to access the authorized spectrum without causing harmful interference to PUs. Spectrum allocation aims to achieve the efficient utilization of licensed spectrum to guarantee the QoS requirements for SUs by distributing the spectrum white spaces to SUs optimally.

pectrum white spaces to SUs optimally. However, the openness of the wireless communication system makes the CRNs face more specific security issues. PUEA is a common problem. According to the attacking purpose, PUEA could be classified into two categories: a selfish SU and a malicious PUE attacker. A selfish SU would emulate the PU’s signal to access a primary channel as the PU does not use it, or broadcast fake information on the available channel in order to empty or pre-occupy a channel for its own transmission. A malicious PUE attacker would induce the denial of service (DoS) to the CRNs by sending the faked PU signal and then decrease the spectrum access opportunity of SUs. The existence of attack signal makes SUs unable to determine whether PUs or MUs occupy channel when channel is busy based on the traditional spectrum sensing methods. Meanwhile, the existing resource allocation schemes will not be suitable for such PUEA scenario either. The power allocation for SUs is also difficult to implement.

The correct detection of PUEA is of great significance for causing the low interference to PUs and maximizing the utilization of spectrum resource. Some works have studied the detection of PUEA. They can be generally divided into two categories namely location-aware methods [5],[6] and location-unaware methods [7]-[12]. Location-aware methods first locate the signal transmitter based on the measurements of received signal strength (RSS)[5] or time difference of arrival (TDOA)[6]. Then, the estimated location of the signal source is compared with the known position of the PU transmitter to determine whether the signal source is a PU or PUEA. However, location based detection schemes need a prior knowledge of the PUs’ locations. The location-unaware methods try to identify a PU and a PUEA mainly by using the signals’ some characteristics, such as the energy and the cyclic stationarity of signals. Moreover, cooperative spectrum sensing (CSS) technology based on the decisions or measured data fusion of multiple-SUs has been widely used in CRNs to obtain a high detection accuracy in deep fading environment. CSS could be also introduced to improve the PUEA detection performance. In [7], a two-phase PUEA detection algorithm based on multiple SUs cooperation was proposed toward a CRN with PUs communicating with OFDM signal. In the first phase, the cyclic stationary feature of non-zero autocorrelation property of OFDM signals is utilized to distinguish PUs from PUEAs which do not use OFDM signals. Then the energy based detection is executed in the second phase to further distinguish PUE attacks from the noise, if the first-phase detection reveals that the primary user is absent. However, this method would become invalid when the PUEA can emulate PUs to transmit OFDM signals. In fact, such a scenario would appear very likely for a selfish SU attack or a smart PUE attack. Moreover, hard decision fusion (HDF) detection schemes combining the binary decision of each SU with K-out-N rule at fusion center (FC) were studied to collaboratively detect PU and PUEA in [8],[9]. Concretely, the main parameters involved in cooperative spectrum sensing, such as the number of samples, the detection thresholds for the SU’s local decision and the parameter K in voting rule, were optimized to minimize the sensing error probability in the works of [8] and [9]. To retain more information of the local observations at each SU, soft decision fusion (SDF) schemes were studied also to realize the accurate PU detection in the presence of PUEA in [10], [11]. The local measured statistic of each SU rather than the binary decision result is sent to FC and a global decision is made by FU based on the original measurements of multiple SUs. The authors of [10] adopted a weighted combination of energy statistics from SUs at FC to make the global decision. Further, the weights were optimized to maximize the SU’s throughput. While, the work in [11] applied minimum Bayes cost criteria to determine the channel status in four cases. In addition, a selfish SU attack was discussed in [12]. In order to find the selfish SU who broadcasts faked available channel lists to its neighboring SUs for pre-occupying the channel, an attack detection method based on information exchanging and comparing among neighboring CR nodes was presented. However, the attack type in [12] is different from our work in this paper. We focus on the malicious PUE attack, where an attacker sends the faked PU signal rather than the false vacant channel lists to prevent legitimate SUs from accessing the available channel.

The purpose of accurate detection is to improve QoS of SUs as well as avoid any deleterious interference to the PU. Specifically, the real-time performance is one of important evaluation indexes of communication quality. Compared with conventional wireless networks, delay QoS guarantee is a more challenging issue for CRNs. Effective capacity [13] has been introduced as a powerful tool to describe the ability that a system provides real-time services. Thus, enhancing the effective capacity is a feasible way to ensure the delay QoS of SUs. Furthermore, different users may have different delay requirements. For example, the voice traffic may have stricter delay QoS constraint than the data traffic. Hence, it is meaningful to study on the discrepant delay QoS provision for different SUs. There exist some works considering the resource allocation for the PUEA scenarios. The authors of [14] proposed a power allocation to maximize the transmission rate of SUs for an OFDM CRNs with PUEA. Here, the secondary users only transmit signals when the primary channel is sensed to be idle. In order to improve the spectrum utilization, the scheme in [15] allowed the SUs to access the spectrum when it is idle or occupied by MUs. It also took the maximization of the SU’s rate as the design object. Furthermore, the works in [16], [17] investigated the energy efficiency (EE) maximization problem by SU selection, power allocation and sensing time assignment in the presence of PUEA. However, the above works did not consider the delay QoS requirement of the SU’s practical traffic. While, such a requirement is more difficult to be satisfied when the malicious attacker exists.

In order to provide better delay QoS for different secondary users, we first propose a multiple-phase energy detection scheme to detect the PUEA more accurately through fusing the energy statistics of multiple secondary users. Further, the weights in the fused statistic are determined and the decision thresholds are obtained based on the analyzed detection probabilities for three decision cases. Second, a joint SUs scheduling and power allocation scheme is proposed to maximize the weighted effective capacity of the SUs. Here, the secondary users will access the spectrum when it is sensed to be idle or occupied by the malicious users. Further, an iterative process, which includes an exhaustive search based user scheduling and a CVX based power allocation, is adopted to solve the joint optimization problem. The simulation results demonstrate that the proposed PUEA detector can recognize the primary users and malicious users efficiently. The delay QoS guarantee for SUs can be realized better by the proposed joint user scheduling and power allocation scheme.

The rest of the paper is organized as follows: In section 2, a system model with multiple SUs and several MUs is described and the transmission model is given. The multiple-phases energy detection scheme based on the cooperation of multiple SUs is presented in section 3. Section 4 introduces the joint user scheduling and power allocation method based on effective capacity in detail. Section 5 presents and analyzes the simulation results. Section 6 concludes the paper.

2. System Model

Consider a cognitive radio network shown in Fig. 1, which includes one primary channel, M secondary users and several malicious users. Assume the MUs occupy the primary channel with a certain probability when the PU is inactive. Multiple SUs can cooperatively sense the occupancy state of the primary channel and then access the channel legitimately based on the sensing result. The overlay mode is adopted. SUs will not access the channel when it is sensed to be occupied by PU in order to reduce interference to the PU as much as possible.

E1KOBZ_2020_v14n3_1313_f0001.png 이미지

Fig. 1. System model of a CRN with PUEA

Assume the licensed spectrum bandwidth is B and the small-scale fading of wireless channel follows the independent and identically distributed (i.i.d.) Rayleigh block fading. The length of a frame is T seconds. The SUs perform spectrum sensing to detect the status of channel during the preceding T0 seconds of a frame. Then, one SU is scheduled to transmit signal in the remaining T - T0 seconds if the decision result is the PU being absent. The other main assumptions similar as the ones given in [18] are listed as followings:

1) The primary transmitter (PT) sends the signal with constant power and the SUs’ positions remain unchanged. While, MUs’ power and positions would change randomly.

2) The received signals from PT and MUs are both assumed to be independent and identically distributed (i.i.d.) random variables following cyclo-stationary complex Gaussian distribution with zero mean. The variances are \( \sigma_{Ps}^2\) and \(\sigma_{Ms}^2\) , respectively, where s = 1, 2,...,M is the index of SU.

3) The noise is the i.i.d. cyclo-stationary complex Gaussian distributed random variables with mean zero and the variance \(\sigma_{Ns}^2\).

There are three actual states for the primary channel. H0 indicates idleness. H1 and H2 indicate that the channel is occupied by PU and MUs, respectively. Assume that MUs can sense the status of the primary channel correctly. MUs will not attack when the channel is used by the PU in order to prevent being detected by the conservation strategies of the PU. Moreover, MUs cannot occupy the idle channel continuously due to the power restriction. Then, the Priori probability of each status P(Hi) would be larger than 0.

In the system given above, the spectrum sensing problem could be modeled as a hypothesis testing problem with three actual states. Further, D0, D1 and D2 are used to represent the three channel states sensed, namely being idle, being used by PU and being attacked by MUs. Then, the detection results have nine possible cases and the corresponding probabilities are denoted by {\({P_{ij}=P(H_i)\centerdot P(D_j/H_i),i,j\in{0,1,2}}\)}

3.1 Multiple Detection Statistics

Energy detection is a simple method for spectrum sensing in the traditional CRNs with two actual states, whose hypothesis testing problem for the s-th SU could be expressed as

\(Y_{s}=\frac{1}{N} \sum_{i=1}^{N}\left|y_{s}(i)\right|^{2} \gtrless_{H_{0}}^{H_{1}} \lambda\)       (1)

where we have

\(y_{s}(i)=\left\{\begin{array}{ll} n_{s}(i), & H_{0} \\ h_{s}(i) x_{\mathrm{p}}(i)+n_{s}(i), & H_{1} \end{array}\right.\)       (2)

Here, hs is the primary channel coefficient and ns is an additive noise. xp is the signal sent by the PU’s transmitter. N is the number of samples for sensing. \(\lambda\) is the decision threshold to detect the presence of the signal xp.The energy statistic Yp in Eq. (1) follows the Chi-square distribution with a degree of freedom of N. However, according to the Central Limit Theorem (CLT), Ys can be approximated by a Gaussian distribution with a long enough N. Actually, CLT has been usually applied to simplify the analysis and design in the spectrum sensing, such as in [9], [11] and [19]. Further, the authors of [9] and [11] considered that CLT could be used when N >10. This condition is commonly satisfied in a practical system.

However, the traditional binary hypothesis testing is unsuitable for the scenario with PUEA. As the primary channel is occupied by a MU, the received signal of the s-th SU is ys(i)=gs(i)xM(i)+ns(i) , where gs is the channel coefficient from the MU to the s-th SU and xM is the signal sent by the MU. Then, Ys may still be larger than the threshold λ and the SU cannot distinguish whether the channel is occupied by PU or MUs. Therefore, combing the idea of multiple thresholds based scheme in [20] with the CSS methods in [10] and [11], we present a modified energy based PUEA detection method, called multiple-phase energy detection based on multiple users’ cooperation. Its main idea is to extract multiple detection statistics based on the energy statistics from M SUs to detect the presence of PU and MUs more accurately.

In this scheme, the key parameters of \(\sigma_{ps}^2\)and \(\sigma_{Ns}^2\)for each SU are assumed to be known by fusion center, but there is no information about \(\sigma_{Ms}^2\). The detection statistic used in the i-th phase is \(V_{i}=\mathbf{W}_{i}^{T} \mathbf{Y}=\sum_{s=1}^{M} w_{i_{-} s} Y_{s}\), where \(\mathbf{W}_{i}=\left[w_{i_{-} 1}, w_{i_{-} 2}, \ldots, w_{i_{-} M}\right]^{T}\) and \(\mathbf{Y}=\left[Y_{1}, Y_{2}, \ldots, Y_{M}\right]^{T}\). Furthermore, \(i \in\{1,2, \ldots, L\}\) and we take L M= in order to make full use of the energy statistics provided by all SUs. From observation, we can find that it is more difficult for MUs to emulate PU’s signals to make all of L detection statistics built by M SU’s measurements similar to the case of PU exiting, except that the location of MU is same as PU. For example, consider a simple case of two SUs, which corresponds to a two-phase energy detection. The two detection statistics can be simply built as V1 = (Y1+Y2)/2 and V1 = (Y1-Y2)/2 , respectively. Under the scenario assumption that PU’s signal has constant power and SUs’ positions are fixed, V1 and V2 would be stable around two certain values, denoted by ε1 and ε2 , when PU is present. Because the dynamic nature of PUEA’s behaviors, Y1 and Y2 would change randomly. Then, even though the PUEA could make V1 near to ε1 , it is still difficult to keep V2 close to ε2 simultaneously. From this point of view, we can think that the given multi-phase scheme has stronger robustness to PUEA.

3.2 Decision Procedure

The decision procedure of the proposed multiple phase energy detection for PUEA is presented in Fig. 2. There are 2L + 1 thresholds for L detection statistics. The first detection statistic V1 is mainly used to distinguish whether the primary channel is idle or busy. All the other Vi are used to distinguish whether the channel is used by PU or by MUs. When V1 is less than the threshold of λ0 , the channel is deemed to be idle. Because the transmitting power of PU is constant, all of the detection statistics should keep stable under H1 state. Therefore, only when all the Vi locate during the corresponding range of (λi1 , λi2 ), the detection result is D1. In other situations, the channel would be deemed to be occupied by MUs based on the instability assumption of the MUs’ power and locations.

E1KOBZ_2020_v14n3_1313_f0002.png 이미지

Fig. 2. Decision Procedure of Multiple-Phase Energy Detection

3.3 Determination of the Weights and Detection Thresholds

A. Determination of the weight vector Wi

Since V1 is mainly used to decide whether the channel is occupied, the average received energy of all the SUs are taken as V1 simply and then we have W1_s=1/M,  ∀s ∈{1,...,M}.

In order to obtain the other weight vectors Wi, i = 2,..,L, an intuitive and heuristic method is given. We set \(\left|w_{i_{-} 1}\right|\left(\sigma_{\mathrm{N} 1}^{2}+\sigma_{\mathrm{P} 2}^{2}\right)=\left|w_{i_{-} 2}\right|\left(\sigma_{\mathrm{N2}}^{2}+\sigma_{\mathrm{P} 2}^{2}\right)=\ldots=\left|w_{i_{-} M}\right|\left(\sigma_{\mathrm{NM}}^{2}+\sigma_{\mathrm{PM}}^{2}\right)\) and then combine it with the constraints of \(0<\left|w_{i_{-} s}\right|<1\) and \(\sum_{s=1}^{M}\left|w_{i_{-} s}\right|=1\) to obtain

\(\left|w_{i_{-} s}\right|=\frac{\prod_{k=1, k \neq s}^{M}\left(\sigma_{\mathrm{Nk}}^{2}+\sigma_{\mathrm{Pk}}^{2}\right)}{\sum_{l=1}^{M} \prod_{k=1, k \neq l}^{M}\left(\sigma_{\mathrm{Nk}}^{2}+\sigma_{\mathrm{Pk}}^{2}\right)}\)       (3)

Because it is reasonable to deem that the SU with higher received power from the PU transmitter may not contribute more for detecting the MU, we set a smaller \(\left|w_{i_{-} s}\right|\) for a SU with larger (σ2Ns + σ2Ps).

As for the sign of wi-s, some optimization criterion could be used. For example, \(D_{w}=\sum_{i=2}^{M} \sum_{j=i+1}^{M}\left\|\mathbf{W}_{i}-\mathbf{W}_{j}\right\|^{2}\) maximization which is adopted in this paper. In the simulation, a greedy search is used to find the signs of wi-s.

B. Calculating Probability Density Function (PDF) of Vi

The probability density function of the detection statistics Vi under three Prior states could be easily obtained as

\(\left\{\begin{array}{l} H_{0}: V_{i} \sim \mathrm{N}\left(\sum_{s=1}^{M} w_{i_{-} s} \sigma_{\mathrm{Ns}}^{2}, 1 / N \sum_{s=1}^{M} w_{i_{-} s}^{2} \sigma_{\mathrm{Ns}}^{4}\right)=\mathrm{N}\left(\beta_{i 0}, \delta_{i 0}^{2}\right) \\ H_{1}: V_{i} \sim \mathrm{N}\left(\sum_{s=1}^{M} w_{i_{-} s}\left(\sigma_{\mathrm{Ns}}^{2}+\sigma_{\mathrm{P}_{s}}^{2}\right), 1 / N \sum_{s=1}^{M} w_{i_{-}s}^{2}\left(\sigma_{\mathrm{Ns}}^{2}+\sigma_{\mathrm{P}_{s}}^{2}\right)^{2}\right)=\mathrm{N}\left(\beta_{i \mathrm{P}}, \delta_{i \mathrm{P}}^{2}\right) \\ H_{2}: V_{i} \sim \mathrm{N}\left(\sum_{s=1}^{M} w_{i_{-} s}\left(\sigma_{\mathrm{Ns}}^{2}+\sigma_{\mathrm{Ms}}^{2}\right), 1 / N \sum_{s=1}^{M} w_{i_{-} s}^{2}\left(\sigma_{\mathrm{Ns}}^{2}+\sigma_{\mathrm{Ms}}^{2}\right)^{2}\right)=\mathrm{N}\left(\beta_{i \mathrm{M}}, \delta_{i \mathrm{M}}^{2}\right) \end{array}\right.\)       (4)

C. Setting the constraints for the probabilities of correction detection

Two constraints for the probabilities of correct detection under the cases of H0 and H1 are preset as P(D/ H0) ≥ a and P(D/ H1) ≥ b.

D. Calculating the threshold λ0 for V1

One threshold λ0 is used to distinguish H0 from the other two states and it can be derived by selecting the equality sign in P(D/ H0) ≥ a. The detail is given by

\(\begin{array}{l} P\left(D_{0} / H_{0}\right)=P\left(\left.V_{1}\right|_{H_{0}} \leq \lambda_{0}\right)=1-Q\left(\left(\lambda_{0}-\beta_{10}\right) / \sqrt{\delta_{10}^{2}}\right)=a \\ \Rightarrow \lambda_{0}=Q^{-1}(1-a) \delta_{10}+\beta_{10} \end{array}\)       (5)

E. Calculating the rest thresholds λi1 and λi2

The rest thresholds λi1 and λi2 , ∀i ∈ {1,...,L} , are obtained by using the constraint P(D/ H1) = b . In order to derive 2L thresholds from only one equalization determinately, we deem that Vi is independent with each other approximately, then it can be achieved that

\(P\left(D_{1} \mid H_{1}\right)=\prod_{i=1}^{L} P\left(D_{1} \mid H_{1}, V_{i}\right)=b, i=1, \ldots, L\)      (6)

Furthermore, we simply set

\(P\left(D_{1} \mid H_{1}, V_{i}\right)=P\left(D_{1} \mid H_{1}, V_{j}\right) \quad \forall i, j \in\{1, \ldots, L\}\)      (7)

Thus, we have

\(P\left(\lambda_{i 1} \leq\left. V_{i}\right|_{H_{1}} \leq \lambda_{i 2}\right)=Q\left(\left(\lambda_{i 1}-\beta_{i P}\right) / \sqrt{\delta_{i P}^{2}}\right)-Q\left(\left(\lambda_{i 2}-\beta_{i \mathrm{P}}\right) / \sqrt{\delta_{i P}^{2}}\right)=\sqrt[L]{\mathrm{b}}\)       (8)

Further, let λi1 and λi2 be symmetrical about βiP and it can be easily obtained

\(\left\{\begin{array}{l} \lambda_{i 1}=\beta_{i \mathrm{P}}-Q^{-1}((1-\sqrt[L]{b}) / 2) \delta_{i \mathrm{P}} \\ \lambda_{i 2}=\beta_{i \mathrm{P}}+Q^{-1}((1-\sqrt[L]{b}) / 2) \delta_{i \mathrm{P}} \end{array}, \quad i=1,2, \ldots, \mathrm{L}\right.\)       ( 9)

It is worth noting that there is a special case for setting λ0 and λ11 . From Eq.(5) and Eq.(9), we can see that λ11 may be smaller than λ0 when σPk2 is small. For such a case, we will set them identical with the average value of them.

4. Effective Capacity Based Joint SUs Scheduling and Power Allocation under PUEA Scenario

Consider the case that multiple secondary users will share the primary channel after coordinate spectrum sensing. Furthermore, suppose that different SUs have different delay QoS requirements because different traffics usually have different delay constraints in practical communications. In order to address the resource allocation issue in the above scenario, an effective capacity based joint SUs scheduling and power allocation is proposed to guarantee the differential delay QoS requirements of multiple SUs who share one idle primary channel.

4.1 Effective Capacity of Secondary Users

Effective capacity can be used to describe the ability to provide real-time services. It is defined as the maximum constant arrival rate that a given service process can support under an appointed statistical QoS constraint [21],[22]. Effective capacity can be expressed as

 

References

  1. Liang, Ying Chang, et al., "Cognitive radio networking and communications: An Overview," IEEE Transactions on Vehicular Technology, vol. 60, no. 7, pp. 3386-3407, Sept. 2011. https://doi.org/10.1109/TVT.2011.2158673
  2. F.C.C.S.P.T. Force, "Report of the spectrum efficiency working group," Federal Communications Commission, Tech. Report, pp.2-155, 2002.
  3. Sasipriya S, Vigneshram R, "An overview of cognitive radio in 5G wireless communications," in Proc. of IEEE International Conference on Computational Intelligence and Computing Research, pp. 1-5, Chennai, December 15-17, 2016.
  4. Hu F, Chen B, Zhu K, "Full spectrum sharing in cognitive radio networks toward 5G: A survey," IEEE Access, vol. 6, pp. 15754-15776, 2018. https://doi.org/10.1109/access.2018.2802450
  5. Chen, Ruiliang, J. M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 25-37, Jan. 2008. https://doi.org/10.1109/JSAC.2008.080104
  6. W. Ghanem, R. Essam, M. Dessouky, "Proposed particle swarm optimization approaches for detection and localization of the primary user emulation attack in cognitive radio networks," in Proc. of 35th National Radio Science Conference, pp. 309-318, Cairo, March 27-29, 2018.
  7. Dang, Manman, Z. Zhao, and H. Zhang, "Optimal cooperative detection of primary user emulation attacks in distributed cognitive radio network," in Proc. of 8th International Conference on Communications and Networking, Guilin, pp. 368-373, August 14-16, 2013.
  8. Saber M J, Sajad Sadough S M, "Optimization of cooperative spectrum sensing for cognitive radio networks in the presence of smart primary user emulation attack," Transactions on Emerging Telecommunications Technologies, Tehran, vol. 28, no. 1, pp.1113-1116, 2014.
  9. Ali S A, Mohammad M B, "Performance improvement of cooperative spectrum sensing in the presence of primary user emulation attack," Iranian Journal of Science and Technology, Transactions of Electrical Engineering, vol. 42, no. 4, pp.493-499, 2018. https://doi.org/10.1007/s40998-018-0067-3
  10. Shrivastava S, Rajesh A, Bora P K, "A simplified counter approach to primary user emulation attacks from secondary user perspective," in Proc. of 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications , pp. 2149-2154, Hong Kong, Aug 30- Sept 2, 2015.
  11. Sharifi M, Sharifi A A, Niya M J M, "Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: multi-level hypotheses test approach," Wireless Networks, vol. 24, no. 1, pp.61-68, 2018. https://doi.org/10.1007/s11276-016-1321-0
  12. Jo M, Han L, Kim D, et al., "Selfish attacks and detection in cognitive radio Ad-Hoc networks," IEEE Network, vol. 27, no. 3, pp. 46-50, May-June 2013. https://doi.org/10.1109/MNET.2013.6523808
  13. Wu, Dapeng, and R. Negi, "Effective capacity: a wireless link model for support of quality of service," IEEE Trans. on Wireless Communications, vol. 2, no. 4, pp. 630-643, July 2003. https://doi.org/10.1109/TWC.2003.814353
  14. Haghighat M, Fathi H, Sadough S M S, "Robust resource allocation for OFDM-based cognitive radio in the presence of primary user emulation attack," RadioEngineering, vol. 21, no. 4, pp. 1085-1091, 2012.
  15. Karimi M, "Efficient joint resource allocation and spectrum sensing in multiband cognitive radio systems in the presence of PUEA," International Journal of Advanced Research in Electronics and Communication Engineering, vol. 4, no. 8, pp.2231-2235, 2015.
  16. Das D, Das S, "Intelligent resource allocation scheme for the cognitive radio network in the presence of primary user emulation attack," IET Communications, vol. 11, no. 15, pp. 2370-2379, 2017. https://doi.org/10.1049/iet-com.2016.0235
  17. Das D, Das S, "An intelligent resource management scheme for SDF-based cooperative spectrum sensing in the presence of primary user emulation attack," Computers & Electrical Engineering, vol. 69, pp. 555-571, 2017. https://doi.org/10.1016/j.compeleceng.2017.06.024
  18. Akin, S., and M. C. Gursoy, "Effective capacity analysis of cognitive radio channels for quality of service provisioning," IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3354-3364, Nov 2010. https://doi.org/10.1109/TWC.2010.092410.090751
  19. Liang Y C, Zeng Y, Peh E C Y, et al., "Sensing-throughput tradeoff for cognitive radio networks," IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1326-1337, April 2008. https://doi.org/10.1109/TWC.2008.060869
  20. Jin F, Varadharajan V, Tupakula U, "Improved detection of primary user emulation attacks in cognitive radio networks," in Proc. of International Telecommunication Networks and Applications Conference, pp. 274-279, Sydney, November, 18-20, 2015.
  21. Balasubramanian A, Miller S L, "The effective capacity of A time division downlink scheduling system," IEEE Transactions on Communications, vol. 58, no. 1, pp. 73-78, January 2010. https://doi.org/10.1109/TCOMM.2010.01.080122
  22. Wu D, Negi R, "Effective capacity: a wireless link model for support of quality of service," IEEE Transactions on Wireless Communications, vol. 2, no. 4, pp. 630-643, July 2003.
  23. Xu, Yuhua, J. Wang, and Q. Wu, "Effective capacity region of two-user opportunistic spectrum access in fading channel under discrete transmission rate policy," in Proc. of IEEE International Conference on Wireless Communications and Signal Processing, pp. 1-5, Oct 21-23, 2010.
  24. Liu Q, Zhou S, Giannakis G B, "Queuing with adaptive modulation and coding over wireless links: cross-Layer analysis and design," IEEE Transactions on Wireless Communications, vol. 4, no. 3, pp. 1142-1153, May 2005. https://doi.org/10.1109/TWC.2005.847005
  25. Mattingley J, Boyd S, "Real-time convex optimization in signal processing," IEEE Signal Processing Magazine, vol. 27, no. 3, pp. 50-61, May 2010. https://doi.org/10.1109/MSP.2010.936020
  26. Haghighat M, Sadough S M, "Cooperative spectrum sensing in cognitive radio networks under primary user emulation attacks," in Proc. of IEEE The Sixth International Symposium on Telecommunications, Tehran, pp. 148-151, Nov 6-8,2012.
  27. R. Menon, R. M. Buehrer, and J. H. Reed, "Outage probability based comparison of underlay and overlay spectrum sharing techniques," in Proc. of First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, pp. 101-109, Nov. 8-11, 2005.

Cited by

  1. Countermeasures for Primary User Emulation Attack: A Comprehensive Review vol.115, pp.1, 2020, https://doi.org/10.1007/s11277-020-07600-y