Attack and surveillance strategies for selfish primary user emulator in cognitive radio network

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Primary user emulation (PUE) attack is a serious security problem in cognitive radio (CR) networks. In PUE attack, attacker transmits an emulated primary signal during a spectrum sensing interval to fool the CR system causing a prohibition in the secondary access on the attacked channel. An attacker is called selfish attacker if it performs the PUE attack for its selfish own purpose. Since it is obligate to reveal the user's identification in any communication link, a channel surveillance process can help to identify the selfish PUE attacker. In this paper, we formulate a non-zero-sum game with incomplete information for analyzing and modeling the selfish PUE attack and surveillance strategies simultaneously. Nash Equilibrium (NE) is figured out in closed form. The results show that the network demand and the penalty factor strongly influence the NE. Numerical simulations confirm our claims based on our analytic results.

Original languageEnglish
Title of host publication2014 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1199-1203
Number of pages5
ISBN (Electronic)9781479970889
DOIs
Publication statusPublished - 5 Feb 2014
Event2014 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2014 - Atlanta, United States
Duration: 3 Dec 20145 Dec 2014

Publication series

Name2014 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2014

Conference

Conference2014 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2014
Country/TerritoryUnited States
CityAtlanta
Period3/12/145/12/14

Keywords

  • Cognitive radio
  • PUE attack
  • Selfish
  • Spectrum sensing
  • Surveillance game

Fingerprint

Dive into the research topics of 'Attack and surveillance strategies for selfish primary user emulator in cognitive radio network'. Together they form a unique fingerprint.

Cite this