Skip to main content
Log in

Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: multi-level hypotheses test approach

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The inherent nature of cognitive radio (CR) networks has brought new threats to wireless communications. Primary user emulation attack (PUEA) has been widely studied as a serious threat to cooperative spectrum sensing (CSS) in CR networks. In PUEA, a malicious user can obstruct CR users from accessing idle frequency bands by imitating licensed primary user (PU) signal characteristics. The present study introduces a new CSS scheme in the presence of a malicious PUEA based on multi-level hypothesis testing (MLHT). In the proposed method, generalizing from binary hypothesis testing to MLHT, we partition the decision space to four decision options and apply minimum Bayes cost criteria to determine the channel status. We also discuss practical limitation issues that need to be considered when applying the MLHT approach. Simulation results are provided to indicate the performance improvement of the proposed MLHT method against PUEA, compared with the conventional method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Federal Communications Commission. (2002). Spectrum policy task force report. ET Docket No; 02-135.

  2. Haykin, S. (2006). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.

    Article  Google Scholar 

  3. Mitola, J., & Maguire, G. Q. (1999). Cognitive radio: making software radios more personal. IEEE Personal Communication, 6(4), 13–18.

    Article  Google Scholar 

  4. Cabric, D., Mishra, S., & Brodersen, R. (2004). Implementation issues in spectrum sensing for cognitive radios. In IEEE Asilomar conference on signals, systems, and computers (pp.772–776).

  5. Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2006). NeXt generation/dynamic spectrum access cognitive radio wireless networks: A survey. Computer Networks, 50(13), 2127–2159.

    Article  MATH  Google Scholar 

  6. Mishra, S. M., Sahai, A., & Brodersen, R. W. (2006). Cooperative sensing among cognitive radios. In Proceedings of the IEEE international conference on communications (pp. 1658–1663).

  7. Ghasemi, A., & Sousa, E. S. (2007). Opportunistic spectrum access in fading channels through collaborative sensing. Journal of Communications, 2(2), 71–82.

    Article  Google Scholar 

  8. Ma, J., Zhao, G., & Li, Y. (2008). Soft combination and detection for cooperative spectrum sensing in cognitive radio networks. IEEE Transactions on Wireless Communications, 7(11), 4502–4507.

    Article  Google Scholar 

  9. Chen, R., & Park, J. M. (2006). Ensuring trustworthy spectrum sensing in cognitive radio networks. In 1st IEEE workshop on networking technologies for software defined radio networks (pp. 110–119).

  10. Chen, R., Park, J. M., & Reed, J. H. (2008). Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal of Selected Area in Communications, 26(1), 25–37.

    Article  Google Scholar 

  11. Leon, O., Hernandez-Serrano, J., & Soriano, M. (2012). Cooperative detection of primary user emulation attacks in CRNs. Computer Networks, 56(14), 3374–3384.

    Article  Google Scholar 

  12. Ureten, O., & Serinken, N. (2007). Wireless Security through RF fingerprinting. Canadian Journal of Electrical and Computer Engineering, 32(1), 27–33.

    Article  Google Scholar 

  13. Zhao, C., Wang, W., Huang, L., & Yao, Y. (2009). Anti-PUE attack base on the transmitter fingerprint identification in cognitive radio. In 5th international conference on wireless communications, networking and mobile computing (WiCom‘09) (pp. 1–5).

  14. Anand, S., Jin, Z., & Subbalakshmi, K. (2008). An analytical model for primary user emulation attacks in cognitive radio networks. In Proceeding IEEE international dynamic spectrum access networks (pp. 1–6).

  15. Jin, Z., Anand, S., & Subbalakshmi, K. (2009). Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing. ACM SIGMOBILE Mobile Computing and Communication Review, 13, 74–85.

    Article  Google Scholar 

  16. Jin, Z., & Subbalakshmi, K. (2009). Detecting primary user emulation attacks in dynamic spectrum access networks. In IEEE international conference on communications (pp. 1–5).

  17. Xin, C., & Song, M. (2014). Detection of PUE attacks in cognitive radio networks based on signal activity pattern. IEEE Transactions on Mobile Computing, 13(5), 1022–1034.

    Article  Google Scholar 

  18. Alahmadi, A., Abdelhakim, M., Ren, J., & Li, T. (2014). Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Transactions on Information Forensics and Security, 9(5), 772–781.

    Article  Google Scholar 

  19. Chen, C., Cheng, H., & Yao, Y.-D. (2011). Cooperative spectrum sensing in cognitive radio networks in the presence of the primary user emulation attack. IEEE Transactions on Wireless Communications, 10(7), 2135–2141.

    Article  Google Scholar 

  20. Haghighat, M., & Sadough, S. M. S. (2014). Cooperative spectrum sensing for cognitive radio networks in the presence of smart malicious users. International Journal of Electronics and Communications (AUE), 68(6), 520–527.

    Article  Google Scholar 

  21. Haghighat, M., & Sadough, S. M. S. (2014). Smart primary user emulation in cognitive radio networks: Defense strategies against radio-aware attacks and robust spectrum sensing. Transactions on Emerging Telecommunications Technologies, 26, 1154–1164.

    Article  Google Scholar 

  22. Saber, M. J., & Sadough, S. M. S. (2015). Optimal soft combination for multiple antenna energy detection under primary user emulation attacks. International Journal of Electronics and Communications (AEU), 69(9), 1181–1188.

    Article  Google Scholar 

  23. Varshney, P. K. (1997). Distributed detection and data fusion. Berlin: Springer.

    Book  Google Scholar 

  24. Levy, B. C. (2008). Principles of signal detection and parameter estimation. Berlin: Springer.

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Morteza Sharifi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharifi, M., Sharifi, A.A. & Niya, M.J.M. Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: multi-level hypotheses test approach. Wireless Netw 24, 61–68 (2018). https://doi.org/10.1007/s11276-016-1321-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-016-1321-0

Keywords

Navigation