Academic literature on the topic 'Primary user emulation attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Primary user emulation attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Primary user emulation attacks"

1

Shetty, Sachin, Meena Thanu, and Ravi Ramachandran. "Cognitive Radio: Primary User Emulation Attacks and Remedies." Recent Patents on Computer Sciencee 5, no. 2 (June 1, 2012): 103–8. http://dx.doi.org/10.2174/2213275911205020103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lafia, Diafale, Mistura Laide Sanni, Rasheed Ayodeji Adetona, Bodunde Odunola Akinyemi, and Ganiyu Adesola Aderounmu. "Signal Processing-based Model for Primary User Emulation Attacks Detection in Cognitive Radio Networks." Journal of Computing and Information Technology 29, no. 2 (July 4, 2022): 77–88. http://dx.doi.org/10.20532/cit.2021.1005297.

Full text
Abstract:
Cognitive Radio Networks (CRNs) have been conceived to improve the efficiency of accessing the spectrum. However, these networks are prone to various kinds of attacks and failures that can compromise the security and performance of their users. One of the notable malicious attacks in cognitive radio networks is the Primary User Emulation (PUE) attack, which results in underutilization and unavailability of the spectrum and low operational efficiency of the network. This study developed an improved technique for detecting PUE attacks in cognitive radio networks and further addressed the characteristics of sparsely populated cognitive radio networks and the mobility of the primary users. A hybrid signal processing-based model was developed using the free space path loss and additive Gaussian noise models. The free space path loss model was used to detect the position of the transmitter, while the additive Gaussian noise model was used to analyze the signal transmitted, i.e., energy detection in the spectrum at the detected location. The proposed model was benchmarked with an existing model using the number of secondary users and the velocity of the transmitter as performance parameters. The simulation results show that the proposed model has improved accuracy in detecting primary user emulation attacks. It was concluded that the proposed hybrid model with respect to the number of secondary users and the velocity of the transmitter can be used for primary user emulation attack detection in cognitive radio networks.
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, Rong, Yan Zhang, Yi Liu, Stein Gjessing, and Mohsen Guizani. "Securing cognitive radio networks against primary user emulation attacks." IEEE Network 29, no. 4 (July 2015): 68–74. http://dx.doi.org/10.1109/mnet.2015.7166193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yu, Rong, Yan Zhang, Yi Liu, Stein Gjessing, and Mohsen Guizani. "Securing Cognitive Radio Networks against Primary User Emulation Attacks." IEEE Network 30, no. 6 (November 2016): 62–69. http://dx.doi.org/10.1109/mnet.2016.1200149nm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

León, Olga, Juan Hernández-Serrano, and Miguel Soriano. "Cooperative detection of primary user emulation attacks in CRNs." Computer Networks 56, no. 14 (September 2012): 3374–84. http://dx.doi.org/10.1016/j.comnet.2012.05.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shrivastava, Shivanshu, A. Rajesh, and P. K. Bora. "Defense against primary user emulation attacks from the secondary user throughput perspective." AEU - International Journal of Electronics and Communications 84 (February 2018): 131–43. http://dx.doi.org/10.1016/j.aeue.2017.11.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Ruiliang, Jung-Min Park, and Jeffrey H. Reed. "Defense against Primary User Emulation Attacks in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 26, no. 1 (January 2008): 25–37. http://dx.doi.org/10.1109/jsac.2008.080104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mrabet, Zakaria El, Youness Arjoune, Hassan El Ghazi, Badr Abou Al Majd, and Naima Kaabouch. "Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter." Journal of Sensor and Actuator Networks 7, no. 3 (July 4, 2018): 26. http://dx.doi.org/10.3390/jsan7030026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jin, Z., S. Anand, and K. P. Subbalakshmi. "Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks." IEEE Transactions on Communications 60, no. 9 (September 2012): 2635–43. http://dx.doi.org/10.1109/tcomm.2012.071812.100729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ta, Duc-Tuyen, Nhan Nguyen-Thanh, Patrick Maille, and Van-Tam Nguyen. "Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks." IEEE Transactions on Cognitive Communications and Networking 4, no. 3 (September 2018): 582–96. http://dx.doi.org/10.1109/tccn.2018.2826552.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Primary user emulation attacks"

1

Chen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.

Full text
Abstract:
The tremendous success of various wireless applications operating in unlicensed bands has resulted in the overcrowding of those bands. Cognitive radio (CR) is a new technology that enables an unlicensed user to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. This technology can significantly alleviate the spectrum shortage problem and improve the efficiency of spectrum utilization. Networks consisting of CR nodes (i.e., CR networks)---often called dynamic spectrum access networks or NeXt Generation (XG) communication networks---are envisioned to provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access techniques. In recent years, the operational aspects of CR networks have attracted great research interest. However, research on the security aspects of CR networks has been very limited. In this thesis, we discuss security issues that pose a serious threat to CR networks. Specifically, we focus on three potential attacks that can be launched at the physical or MAC layer of a CR network: primary user emulation (PUE) attack, spectrum sensing data falsification (SSDF) attack, and control channel jamming (CCJ) attack. These attacks can wreak havoc to the normal operation of CR networks. After identifying and analyzing the attacks, we discuss countermeasures. For PUE attacks, we propose a transmitter verification scheme for attack detection. The scheme utilizes the location information of transmitters together with their signal characteristics to verify licensed users and detect PUE attackers. For both SSDF attacks and CCJ attacks, we seek countermeasures for attack mitigation. In particular, we propose Weighted Sequential Probability Ratio Test (WSPRT) as a data fusion technique that is robust against SSDF attacks, and introduce a multiple-rendezvous cognitive MAC (MRCMAC) protocol that is robust against CCJ attacks. Using security analysis and extensive numerical results, we show that the proposed schemes can effectively counter the aforementioned attacks in CR networks.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
2

Pu, Di. "Primary User Emulation Detection in Cognitive Radio Networks." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-dissertations/157.

Full text
Abstract:
Cognitive radios (CRs) have been proposed as a promising solution for improving spectrum utilization via opportunistic spectrum sharing. In a CR network environment, primary (licensed) users have priority over secondary (unlicensed) users when accessing the wireless channel. Thus, if a malicious secondary user exploits this spectrum access etiquette by mimicking the spectral characteristics of a primary user, it can gain priority access to a wireless channel over other secondary users. This scenario is referred to in the literature as primary user emulation (PUE). This dissertation first covers three approaches for detecting primary user emulation attacks in cognitive radio networks, which can be classified in two categories. The first category is based on cyclostationary features, which employs a cyclostationary calculation to represent the modulation features of the user signals. The calculation results are then fed into an artificial neural network for classification. The second category is based on video processing method of action recognition in frequency domain, which includes two approaches. Both of them analyze the FFT sequences of wireless transmissions operating across a cognitive radio network environment, as well as classify their actions in the frequency domain. The first approach employs a covariance descriptor of motion-related features in the frequency domain, which is then fed into an artificial neural network for classification. The second approach is built upon the first approach, but employs a relational database system to record the motion-related feature vectors of primary users on this frequency band. When a certain transmission does not have a match record in the database, a covariance descriptor will be calculated and fed into an artificial neural network for classification. This dissertation is completed by a novel PUE detection approach which employs a distributed sensor network, where each sensor node works as an independent PUE detector. The emphasis of this work is how these nodes collaborate to obtain the final detection results for the whole network. All these proposed approaches have been validated via computer simulations as well as by experimental hardware implementations using the Universal Software Radio Peripheral (USRP) software-defined radio (SDR) platform.
APA, Harvard, Vancouver, ISO, and other styles
3

Liang-YuChen and 陳亮瑜. "Correlation-Based Detection of Primary User Emulation Attacks in Cognitive Radios." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/kp9545.

Full text
Abstract:
碩士
國立成功大學
工程科學系
106
The topic of this paper is to identify the attacker’s presence in cognitive radio (CR) in high speed mobile environments which affected by multipath interference. With the rapid development of cognitive radio, several security issues have raised. Among these issues, the primary user emulation attack (PUEA) is widely discussed. In this work, we propose a method by using the correlation characteristics of received signal to identify the PUEA. In high speed mobile wireless communication, the correlation characteristics of received signal that received from different speed of transmitters are unique. We use this feature to identify the PUEA. First, the maximum likelihood estimation (MLE) is used to estimate the correlation vector of the received signal and calculate its mean and covariance matrix. Then we use likelihood ratio test (LRT) and log likelihood ratio test (LLRT) to design a detector that used to identify the PUEA. The algorithm proposed in this paper has a better detection performance than the algorithm based on channel tap power and its detection performance isn’t affected by multipath.
APA, Harvard, Vancouver, ISO, and other styles
4

Wei-CheKao and 高偉哲. "Channel-Based Detection of Primary User Emulation Attacks Considering Synchronization in Cognitive Radio Networks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/66571346226511642822.

Full text
Abstract:
碩士
國立成功大學
工程科學系碩博士班
100
Cognitive radio (CR) today refers to a relatively wide range of technologies for making wireless systems computationally intelligent, with a view to improving the spectral utilization. However, CR also raises new security issues, the most of which concerns primary user emulation attack (PUEA). This work proposes a method by using the characteristics of wireless channels to identify the PUEA. In a wireless environment, the statistical properties of the wireless channel between the receiver and transmitter are unique. They can therefore be utilized as a radio fingerprint to authenticate directly users via physical (PHY) layers, thereby improving detection time. Before the PHY layer detection is introduced, the cross-layer intelligent learning ability of CR is exploited to establish a detection database by utilizing the accuracy of higher layer authentications. Although the transmitter can be rapidly identified using the proposed detection mechanism, several factors may affect the result of detection by a single node. Therefore, the cooperative detection scheme is adopted herein to improve the detection performance. The detection probability is analyzed. Simulation results confirm the advantages of the proposed schemes.
APA, Harvard, Vancouver, ISO, and other styles
5

Hung-YiChiang and 江紘毅. "Using WARP to Implement the MIMO-OFDM System and Realize the Channel Tap Power Calculation Circuit for Primary User Emulation Attacks Detection." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/b2d4b9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chun-LinTseng and 曾俊霖. "Channel-Based Detection of Primary User Emulation Attackerin Cognitive Radios." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/32289482623700605839.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Primary user emulation attacks"

1

Gupta, Ishu, and O. P. Sahu. "Mitigating Primary User Emulation Attacks Using Analytical Model." In Engineering Vibration, Communication and Information Processing, 219–27. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1642-5_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maric, Sasa, and Sam Reisenfeld. "Mitigation of Primary User Emulation Attacks in Cognitive Radio Networks Using Belief Propagation." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 463–76. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24540-9_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kanhere, Shweta K., Amol D. Potgantwar, and Vijay M. Wadhai. "Primary user emulation (PUE) attacks and mitigation for cognitive radio (CR) network security." In Thinkquest~2010, 20–28. New Delhi: Springer India, 2011. http://dx.doi.org/10.1007/978-81-8489-989-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dong, Qi, Yu Chen, Xiaohua Li, Kai Zeng, and Roger Zimmermann. "An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 297–317. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01701-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Yongcheng, Xiangrong Ma, Manxi Wang, Huifang Chen, and Lei Xie. "Detecting Primary User Emulation Attack Based on Multipath Delay in Cognitive Radio Network." In Smart Innovations in Communication and Computational Sciences, 361–73. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8968-8_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sultana, Rukhsar, and Muzzammil Hussain. "Mitigating Primary User Emulation Attack in Cognitive Radio Network Using Localization and Variance Detection." In Proceedings of First International Conference on Smart System, Innovations and Computing, 433–44. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-5828-8_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Husheng, Vasu Chakravarthy, Sintayehu Dehnie, and Zhiqiang Wu. "Primary User Emulation Attack Game in Cognitive Radio Networks: Queuing Aware Dogfight in Spectrum." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 192–208. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35582-0_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Huichao, Xiao Jing, Songlin Sun, Hai Huang, Yan Li, Xiaohan Wang, and Dongmei Cheng. "Mitigating Primary User Emulation attacks in Cognitive Radio networks using advanced encryption standard." In Signal and Information Processing, Networking and Computers, 185–93. CRC Press, 2016. http://dx.doi.org/10.1201/b21308-25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Raut, Rajeshree, Ranjit Sawant, and Shriraghavan Madbushi. "Bilayer Approach to Mitigate Primary User Emulation Attack in Cognitive Radio Networks." In Cognitive Radio, 165–73. CRC Press, 2020. http://dx.doi.org/10.1201/9780429353109-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jayapalan, Avila, and Thenmozhi Karuppasamy. "Spectrum Sensing and Mitigation of Primary User Emulation Attack in Cognitive Radio." In Cognitive Radio in 4G/5G Wireless Communication Systems. IntechOpen, 2018. http://dx.doi.org/10.5772/intechopen.80328.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Primary user emulation attacks"

1

Xiao, Jie, Yuebin Chen, Chuanxi Xing, Jiangfeng Yang, and Zhenling Yang. "An Optimized Scheme to Resist Primary User Emulation Attacks." In 2016 International Conference on Communications, Information Management and Network Security. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/cimns-16.2016.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Thanu, Meena. "Detection of primary user emulation attacks in Cognitive Radio networks." In 2012 International Conference on Collaboration Technologies and Systems (CTS). IEEE, 2012. http://dx.doi.org/10.1109/cts.2012.6261113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jin, Z., S. Anand, and K. P. Subbalakshmi. "Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks." In ICC 2009 - 2009 IEEE International Conference on Communications. IEEE, 2009. http://dx.doi.org/10.1109/icc.2009.5198911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shrivastava, Shivanshu, A. Rajesh, and P. K. Bora. "A simplified counter approach to primary user emulation attacks from secondary user perspective." In 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). IEEE, 2015. http://dx.doi.org/10.1109/pimrc.2015.7343653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chin, Wen-Long, Chun-Lin Tseng, Chun-Shen Tsai, Wei-Che Kao, and Chun-Wei Kao. "Channel-Based Detection of Primary User Emulation Attacks in Cognitive Radios." In 2012 IEEE Vehicular Technology Conference (VTC 2012-Spring). IEEE, 2012. http://dx.doi.org/10.1109/vetecs.2012.6239877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zesheng Chen, Todor Cooklev, Chao Chen, and Carlos Pomalaza-Raez. "Modeling primary user emulation attacks and defenses in cognitive radio networks." In 2009 IEEE 28th International Performance Computing and Communications Conference (IPCCC 2009). IEEE, 2009. http://dx.doi.org/10.1109/pccc.2009.5403815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

León, Olga, Juan Hernández-Serrano, and Miguel Soriano. "Robust detection of primary user emulation attacks in IEEE 802.22 networks." In the 4th International Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2093256.2093307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jin, Fan, Vijay Varadharajan, and Udaya Tupakula. "Improved detection of primary user emulation attacks in cognitive radio networks." In 2015 International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2015. http://dx.doi.org/10.1109/atnac.2015.7366825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jin, Z., S. Anand, and K. P. Subbalakshmi. "Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks." In GLOBECOM 2010 - 2010 IEEE Global Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/glocom.2010.5683384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tabatabaee, Shaahin, Alireza Bagheri, Ali Shahini, and Ali Shahzadi. "An analytical model for primary user emulation attacks in IEEE 802.22 networks." In 2013 International Conference on Connected Vehicles and Expo (ICCVE). IEEE, 2013. http://dx.doi.org/10.1109/iccve.2013.6799879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography