A Fakhrudeen
Identification as a deterrent for security enhancement in cognitive radio networks
Fakhrudeen, A; Alani, OY
Abstract
Cognitive Radio Networks (CRNs) are prone to emerging coexistence security threats such as Primary User Emulation Attack (PUEA). Specifically, a malicious CRN may mimic licensees’ (Primary Users (PUs)) signal characteristics to force another CRN to vacate its channels thinking that PUs have returned. While existing schemes are promising to some extent on detecting PUEAs, they are not able to prevent the attacks. In this article, we propose a PUEA Deterrent (PUED) algorithm that can provide PUEAs' commission details: offender CRNs and attacks’ time and bandwidth. There are many similarities between PUED and Closed-Circuit Television (CCTV) in terms of: deterrence strategy, reason for use, surveillance characteristics, surveillance outcome, and operation site. According to the criminology literature, robust CCTV systems have shown a significant reduction in visible offences (e.g. vehicle theft), reducing crime rates by 80%. Similarly, PUED will contribute the same effectiveness in deterring PUEAs. Furthermore, providing PUEAs’ details will prevent the network’s cognitive engine from considering the attacks as real PUs, consequently avoiding devising unreliable spectrum models for the attacked channels. Extensive simulations show the effectiveness of the PUED algorithm in terms of improving CRNs’ performance.
Citation
Fakhrudeen, A., & Alani, O. (2017). Identification as a deterrent for security enhancement in cognitive radio networks. IET Networks, 6(6), 193-202. https://doi.org/10.1049/iet-net.2017.0036
Journal Article Type | Article |
---|---|
Acceptance Date | Jul 28, 2017 |
Online Publication Date | Aug 3, 2017 |
Publication Date | Aug 3, 2017 |
Deposit Date | Aug 2, 2017 |
Journal | IET Networks |
Electronic ISSN | 2047-4962 |
Publisher | Institution of Engineering and Technology (IET) |
Volume | 6 |
Issue | 6 |
Pages | 193-202 |
DOI | https://doi.org/10.1049/iet-net.2017.0036 |
Publisher URL | http://dx.doi.org/10.1049/iet-net.2017.0036 |
Related Public URLs | http://digital-library.theiet.org/content/journals/iet-net |
You might also like
Machine learning-based optimized link state routing protocol for D2D communication in 5G/B5G
(2022)
Presentation / Conference
Renewable energy and nanotechnology
(2022)
Book Chapter
Wind energy
(2022)
Book Chapter
Information and communications technology and renewable energy monitoring
(2022)
Book Chapter