Academic literature on the topic 'Primary user emulation attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Primary user emulation attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Primary user emulation attacks"
Shetty, Sachin, Meena Thanu, and Ravi Ramachandran. "Cognitive Radio: Primary User Emulation Attacks and Remedies." Recent Patents on Computer Sciencee 5, no. 2 (June 1, 2012): 103–8. http://dx.doi.org/10.2174/2213275911205020103.
Full textLafia, Diafale, Mistura Laide Sanni, Rasheed Ayodeji Adetona, Bodunde Odunola Akinyemi, and Ganiyu Adesola Aderounmu. "Signal Processing-based Model for Primary User Emulation Attacks Detection in Cognitive Radio Networks." Journal of Computing and Information Technology 29, no. 2 (July 4, 2022): 77–88. http://dx.doi.org/10.20532/cit.2021.1005297.
Full textYu, Rong, Yan Zhang, Yi Liu, Stein Gjessing, and Mohsen Guizani. "Securing cognitive radio networks against primary user emulation attacks." IEEE Network 29, no. 4 (July 2015): 68–74. http://dx.doi.org/10.1109/mnet.2015.7166193.
Full textYu, Rong, Yan Zhang, Yi Liu, Stein Gjessing, and Mohsen Guizani. "Securing Cognitive Radio Networks against Primary User Emulation Attacks." IEEE Network 30, no. 6 (November 2016): 62–69. http://dx.doi.org/10.1109/mnet.2016.1200149nm.
Full textLeón, Olga, Juan Hernández-Serrano, and Miguel Soriano. "Cooperative detection of primary user emulation attacks in CRNs." Computer Networks 56, no. 14 (September 2012): 3374–84. http://dx.doi.org/10.1016/j.comnet.2012.05.008.
Full textShrivastava, Shivanshu, A. Rajesh, and P. K. Bora. "Defense against primary user emulation attacks from the secondary user throughput perspective." AEU - International Journal of Electronics and Communications 84 (February 2018): 131–43. http://dx.doi.org/10.1016/j.aeue.2017.11.012.
Full textChen, Ruiliang, Jung-Min Park, and Jeffrey H. Reed. "Defense against Primary User Emulation Attacks in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 26, no. 1 (January 2008): 25–37. http://dx.doi.org/10.1109/jsac.2008.080104.
Full textMrabet, Zakaria El, Youness Arjoune, Hassan El Ghazi, Badr Abou Al Majd, and Naima Kaabouch. "Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter." Journal of Sensor and Actuator Networks 7, no. 3 (July 4, 2018): 26. http://dx.doi.org/10.3390/jsan7030026.
Full textJin, Z., S. Anand, and K. P. Subbalakshmi. "Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks." IEEE Transactions on Communications 60, no. 9 (September 2012): 2635–43. http://dx.doi.org/10.1109/tcomm.2012.071812.100729.
Full textTa, Duc-Tuyen, Nhan Nguyen-Thanh, Patrick Maille, and Van-Tam Nguyen. "Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks." IEEE Transactions on Cognitive Communications and Networking 4, no. 3 (September 2018): 582–96. http://dx.doi.org/10.1109/tccn.2018.2826552.
Full textDissertations / Theses on the topic "Primary user emulation attacks"
Chen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.
Full textPh. D.
Pu, Di. "Primary User Emulation Detection in Cognitive Radio Networks." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-dissertations/157.
Full textLiang-YuChen and 陳亮瑜. "Correlation-Based Detection of Primary User Emulation Attacks in Cognitive Radios." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/kp9545.
Full text國立成功大學
工程科學系
106
The topic of this paper is to identify the attacker’s presence in cognitive radio (CR) in high speed mobile environments which affected by multipath interference. With the rapid development of cognitive radio, several security issues have raised. Among these issues, the primary user emulation attack (PUEA) is widely discussed. In this work, we propose a method by using the correlation characteristics of received signal to identify the PUEA. In high speed mobile wireless communication, the correlation characteristics of received signal that received from different speed of transmitters are unique. We use this feature to identify the PUEA. First, the maximum likelihood estimation (MLE) is used to estimate the correlation vector of the received signal and calculate its mean and covariance matrix. Then we use likelihood ratio test (LRT) and log likelihood ratio test (LLRT) to design a detector that used to identify the PUEA. The algorithm proposed in this paper has a better detection performance than the algorithm based on channel tap power and its detection performance isn’t affected by multipath.
Wei-CheKao and 高偉哲. "Channel-Based Detection of Primary User Emulation Attacks Considering Synchronization in Cognitive Radio Networks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/66571346226511642822.
Full text國立成功大學
工程科學系碩博士班
100
Cognitive radio (CR) today refers to a relatively wide range of technologies for making wireless systems computationally intelligent, with a view to improving the spectral utilization. However, CR also raises new security issues, the most of which concerns primary user emulation attack (PUEA). This work proposes a method by using the characteristics of wireless channels to identify the PUEA. In a wireless environment, the statistical properties of the wireless channel between the receiver and transmitter are unique. They can therefore be utilized as a radio fingerprint to authenticate directly users via physical (PHY) layers, thereby improving detection time. Before the PHY layer detection is introduced, the cross-layer intelligent learning ability of CR is exploited to establish a detection database by utilizing the accuracy of higher layer authentications. Although the transmitter can be rapidly identified using the proposed detection mechanism, several factors may affect the result of detection by a single node. Therefore, the cooperative detection scheme is adopted herein to improve the detection performance. The detection probability is analyzed. Simulation results confirm the advantages of the proposed schemes.
Hung-YiChiang and 江紘毅. "Using WARP to Implement the MIMO-OFDM System and Realize the Channel Tap Power Calculation Circuit for Primary User Emulation Attacks Detection." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/b2d4b9.
Full textChun-LinTseng and 曾俊霖. "Channel-Based Detection of Primary User Emulation Attackerin Cognitive Radios." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/32289482623700605839.
Full textBook chapters on the topic "Primary user emulation attacks"
Gupta, Ishu, and O. P. Sahu. "Mitigating Primary User Emulation Attacks Using Analytical Model." In Engineering Vibration, Communication and Information Processing, 219–27. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1642-5_20.
Full textMaric, Sasa, and Sam Reisenfeld. "Mitigation of Primary User Emulation Attacks in Cognitive Radio Networks Using Belief Propagation." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 463–76. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24540-9_38.
Full textKanhere, Shweta K., Amol D. Potgantwar, and Vijay M. Wadhai. "Primary user emulation (PUE) attacks and mitigation for cognitive radio (CR) network security." In Thinkquest~2010, 20–28. New Delhi: Springer India, 2011. http://dx.doi.org/10.1007/978-81-8489-989-4_4.
Full textDong, Qi, Yu Chen, Xiaohua Li, Kai Zeng, and Roger Zimmermann. "An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 297–317. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01701-9_17.
Full textLi, Yongcheng, Xiangrong Ma, Manxi Wang, Huifang Chen, and Lei Xie. "Detecting Primary User Emulation Attack Based on Multipath Delay in Cognitive Radio Network." In Smart Innovations in Communication and Computational Sciences, 361–73. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8968-8_31.
Full textSultana, Rukhsar, and Muzzammil Hussain. "Mitigating Primary User Emulation Attack in Cognitive Radio Network Using Localization and Variance Detection." In Proceedings of First International Conference on Smart System, Innovations and Computing, 433–44. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-5828-8_41.
Full textLi, Husheng, Vasu Chakravarthy, Sintayehu Dehnie, and Zhiqiang Wu. "Primary User Emulation Attack Game in Cognitive Radio Networks: Queuing Aware Dogfight in Spectrum." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 192–208. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35582-0_15.
Full textJiang, Huichao, Xiao Jing, Songlin Sun, Hai Huang, Yan Li, Xiaohan Wang, and Dongmei Cheng. "Mitigating Primary User Emulation attacks in Cognitive Radio networks using advanced encryption standard." In Signal and Information Processing, Networking and Computers, 185–93. CRC Press, 2016. http://dx.doi.org/10.1201/b21308-25.
Full textRaut, Rajeshree, Ranjit Sawant, and Shriraghavan Madbushi. "Bilayer Approach to Mitigate Primary User Emulation Attack in Cognitive Radio Networks." In Cognitive Radio, 165–73. CRC Press, 2020. http://dx.doi.org/10.1201/9780429353109-10.
Full textJayapalan, Avila, and Thenmozhi Karuppasamy. "Spectrum Sensing and Mitigation of Primary User Emulation Attack in Cognitive Radio." In Cognitive Radio in 4G/5G Wireless Communication Systems. IntechOpen, 2018. http://dx.doi.org/10.5772/intechopen.80328.
Full textConference papers on the topic "Primary user emulation attacks"
Xiao, Jie, Yuebin Chen, Chuanxi Xing, Jiangfeng Yang, and Zhenling Yang. "An Optimized Scheme to Resist Primary User Emulation Attacks." In 2016 International Conference on Communications, Information Management and Network Security. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/cimns-16.2016.44.
Full textThanu, Meena. "Detection of primary user emulation attacks in Cognitive Radio networks." In 2012 International Conference on Collaboration Technologies and Systems (CTS). IEEE, 2012. http://dx.doi.org/10.1109/cts.2012.6261113.
Full textJin, Z., S. Anand, and K. P. Subbalakshmi. "Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks." In ICC 2009 - 2009 IEEE International Conference on Communications. IEEE, 2009. http://dx.doi.org/10.1109/icc.2009.5198911.
Full textShrivastava, Shivanshu, A. Rajesh, and P. K. Bora. "A simplified counter approach to primary user emulation attacks from secondary user perspective." In 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). IEEE, 2015. http://dx.doi.org/10.1109/pimrc.2015.7343653.
Full textChin, Wen-Long, Chun-Lin Tseng, Chun-Shen Tsai, Wei-Che Kao, and Chun-Wei Kao. "Channel-Based Detection of Primary User Emulation Attacks in Cognitive Radios." In 2012 IEEE Vehicular Technology Conference (VTC 2012-Spring). IEEE, 2012. http://dx.doi.org/10.1109/vetecs.2012.6239877.
Full textZesheng Chen, Todor Cooklev, Chao Chen, and Carlos Pomalaza-Raez. "Modeling primary user emulation attacks and defenses in cognitive radio networks." In 2009 IEEE 28th International Performance Computing and Communications Conference (IPCCC 2009). IEEE, 2009. http://dx.doi.org/10.1109/pccc.2009.5403815.
Full textLeón, Olga, Juan Hernández-Serrano, and Miguel Soriano. "Robust detection of primary user emulation attacks in IEEE 802.22 networks." In the 4th International Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2093256.2093307.
Full textJin, Fan, Vijay Varadharajan, and Udaya Tupakula. "Improved detection of primary user emulation attacks in cognitive radio networks." In 2015 International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2015. http://dx.doi.org/10.1109/atnac.2015.7366825.
Full textJin, Z., S. Anand, and K. P. Subbalakshmi. "Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks." In GLOBECOM 2010 - 2010 IEEE Global Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/glocom.2010.5683384.
Full textTabatabaee, Shaahin, Alireza Bagheri, Ali Shahini, and Ali Shahzadi. "An analytical model for primary user emulation attacks in IEEE 802.22 networks." In 2013 International Conference on Connected Vehicles and Expo (ICCVE). IEEE, 2013. http://dx.doi.org/10.1109/iccve.2013.6799879.
Full text