Browse > Article
http://dx.doi.org/10.3837/tiis.2020.03.022

Multiple-Phase Energy Detection and Effective Capacity Based Resource Allocation Against Primary User Emulation Attacks in Cognitive Radio Networks  

Liu, Zongyi (State Key Laboratory of Geo-information Engineering)
Zhang, Guomei (State Key Laboratory of Geo-information Engineering)
Meng, Wei (School of Information and Communications Engineering, Xi'an Jiaotong University)
Ma, Xiaohui (State Key Laboratory of Geo-information Engineering)
Li, Guobing (School of Information and Communications Engineering, Xi'an Jiaotong University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.3, 2020 , pp. 1313-1336 More about this Journal
Abstract
Cognitive radio (CR) is regarded as an effective approach to avoid the inefficient use of spectrum. However, CRNs have more special security problems compared with the traditional wireless communication systems due to its open and dynamic characteristics. Primary user emulation attack (PUEA) is a common method which can hinder secondary users (SUs) from accessing the spectrum by transmitting signals who has the similar characteristics of the primary users' (PUs) signals, and then the SUs' quality of service (QoS) cannot be guaranteed. To handle this issue, we first design a multiple-phase energy detection scheme based on the cooperation of multiple SUs to detect the PUEA more precisely. Second, a joint SUs scheduling and power allocation scheme is proposed to maximize the weighted effective capacity of multiple SUs with a constraint of the average interference to the PU. The simulation results show that the proposed method can effectively improve the effective capacity of the secondary users compared with the traditional overlay scheme which cannot be aware of the existence of PUEA. Also the good delay QoS guarantee for the secondary users is provided.
Keywords
Cognitive radio; Primary user emulation attack; Energy detection; Effective capacity; Power allocation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Menon, R. M. Buehrer, and J. H. Reed, "Outage probability based comparison of underlay and overlay spectrum sharing techniques," in Proc. of First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, pp. 101-109, Nov. 8-11, 2005.
2 Sasipriya S, Vigneshram R, "An overview of cognitive radio in 5G wireless communications," in Proc. of IEEE International Conference on Computational Intelligence and Computing Research, pp. 1-5, Chennai, December 15-17, 2016.
3 Hu F, Chen B, Zhu K, "Full spectrum sharing in cognitive radio networks toward 5G: A survey," IEEE Access, vol. 6, pp. 15754-15776, 2018.   DOI
4 Chen, Ruiliang, J. M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 25-37, Jan. 2008.   DOI
5 W. Ghanem, R. Essam, M. Dessouky, "Proposed particle swarm optimization approaches for detection and localization of the primary user emulation attack in cognitive radio networks," in Proc. of 35th National Radio Science Conference, pp. 309-318, Cairo, March 27-29, 2018.
6 Dang, Manman, Z. Zhao, and H. Zhang, "Optimal cooperative detection of primary user emulation attacks in distributed cognitive radio network," in Proc. of 8th International Conference on Communications and Networking, Guilin, pp. 368-373, August 14-16, 2013.
7 Saber M J, Sajad Sadough S M, "Optimization of cooperative spectrum sensing for cognitive radio networks in the presence of smart primary user emulation attack," Transactions on Emerging Telecommunications Technologies, Tehran, vol. 28, no. 1, pp.1113-1116, 2014.
8 Ali S A, Mohammad M B, "Performance improvement of cooperative spectrum sensing in the presence of primary user emulation attack," Iranian Journal of Science and Technology, Transactions of Electrical Engineering, vol. 42, no. 4, pp.493-499, 2018.   DOI
9 Shrivastava S, Rajesh A, Bora P K, "A simplified counter approach to primary user emulation attacks from secondary user perspective," in Proc. of 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications , pp. 2149-2154, Hong Kong, Aug 30- Sept 2, 2015.
10 Sharifi M, Sharifi A A, Niya M J M, "Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: multi-level hypotheses test approach," Wireless Networks, vol. 24, no. 1, pp.61-68, 2018.   DOI
11 Jo M, Han L, Kim D, et al., "Selfish attacks and detection in cognitive radio Ad-Hoc networks," IEEE Network, vol. 27, no. 3, pp. 46-50, May-June 2013.   DOI
12 Wu, Dapeng, and R. Negi, "Effective capacity: a wireless link model for support of quality of service," IEEE Trans. on Wireless Communications, vol. 2, no. 4, pp. 630-643, July 2003.   DOI
13 Das D, Das S, "An intelligent resource management scheme for SDF-based cooperative spectrum sensing in the presence of primary user emulation attack," Computers & Electrical Engineering, vol. 69, pp. 555-571, 2017.   DOI
14 Haghighat M, Fathi H, Sadough S M S, "Robust resource allocation for OFDM-based cognitive radio in the presence of primary user emulation attack," RadioEngineering, vol. 21, no. 4, pp. 1085-1091, 2012.
15 Karimi M, "Efficient joint resource allocation and spectrum sensing in multiband cognitive radio systems in the presence of PUEA," International Journal of Advanced Research in Electronics and Communication Engineering, vol. 4, no. 8, pp.2231-2235, 2015.
16 Das D, Das S, "Intelligent resource allocation scheme for the cognitive radio network in the presence of primary user emulation attack," IET Communications, vol. 11, no. 15, pp. 2370-2379, 2017.   DOI
17 Akin, S., and M. C. Gursoy, "Effective capacity analysis of cognitive radio channels for quality of service provisioning," IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3354-3364, Nov 2010.   DOI
18 Liang Y C, Zeng Y, Peh E C Y, et al., "Sensing-throughput tradeoff for cognitive radio networks," IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1326-1337, April 2008.   DOI
19 F.C.C.S.P.T. Force, "Report of the spectrum efficiency working group," Federal Communications Commission, Tech. Report, pp.2-155, 2002.
20 Liang, Ying Chang, et al., "Cognitive radio networking and communications: An Overview," IEEE Transactions on Vehicular Technology, vol. 60, no. 7, pp. 3386-3407, Sept. 2011.   DOI
21 Xu, Yuhua, J. Wang, and Q. Wu, "Effective capacity region of two-user opportunistic spectrum access in fading channel under discrete transmission rate policy," in Proc. of IEEE International Conference on Wireless Communications and Signal Processing, pp. 1-5, Oct 21-23, 2010.
22 Jin F, Varadharajan V, Tupakula U, "Improved detection of primary user emulation attacks in cognitive radio networks," in Proc. of International Telecommunication Networks and Applications Conference, pp. 274-279, Sydney, November, 18-20, 2015.
23 Balasubramanian A, Miller S L, "The effective capacity of A time division downlink scheduling system," IEEE Transactions on Communications, vol. 58, no. 1, pp. 73-78, January 2010.   DOI
24 Wu D, Negi R, "Effective capacity: a wireless link model for support of quality of service," IEEE Transactions on Wireless Communications, vol. 2, no. 4, pp. 630-643, July 2003.
25 Liu Q, Zhou S, Giannakis G B, "Queuing with adaptive modulation and coding over wireless links: cross-Layer analysis and design," IEEE Transactions on Wireless Communications, vol. 4, no. 3, pp. 1142-1153, May 2005.   DOI
26 Mattingley J, Boyd S, "Real-time convex optimization in signal processing," IEEE Signal Processing Magazine, vol. 27, no. 3, pp. 50-61, May 2010.   DOI
27 Haghighat M, Sadough S M, "Cooperative spectrum sensing in cognitive radio networks under primary user emulation attacks," in Proc. of IEEE The Sixth International Symposium on Telecommunications, Tehran, pp. 148-151, Nov 6-8,2012.