Skip to main content
Log in

A Multi-Objective Particle Swarm Optimization Based Algorithm for Primary User Emulation Attack Detection

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The cognitive radio network (CRN) has been proposed to overcome the spectrum scarcity and the massive demand on the radio frequencies through efficient utilization and smart management of the free channels. Using a spectrum sensing process, the secondary users (SUs) share the spectrum of the primary users (PUs) without causing any interference to these latter. One of the main threats affecting the channel utilization in CRN is the primary user emulation (PUE) attack. The PUE attack utilizes a sophisticated technique to craft the same signal of a legitimate PU to gain unauthorized access to the unused channels, forcing the SUs to immediately free up vacant spectrum space, resulting in a denial of service (DoS), degradation of service, and causing a noticeable impact on CRN performance. To circumvent this attack, the anchor nodes must accurately estimate the coordinates of the PU signal source. In the literature, most of the localization of unknown signal source, in our case the PU/PUE, are based on the ranging schemes which measure the distance between the blind node and the anchors. Those anchors are aware of their location and situated in optimized positions to the signal source in order to permit an accurate PU/PUE position detection. The detection rate depends tightly on the distance separating the anchors to the signal source as well as the signal-to-noise ratio (SNR). In this paper, we demonstrate the impact of the distance on the detection error while highlighting the particle swarm optimization’s (PSO) advantage in optimizing the anchors positioning. Furthermore, we illustrate the SNR impact on the probability of detection, particularly in the situation of low SNR and the attacker in the vicinity to a real PU. The main contribution in this work is the proposition of an approach with the aim of protecting an area containing more than a single PU with a limited number of anchor nodes while providing a higher detection rate to stop any eventual PUE attack. This approach is based on a multi-objective particle swarm optimization (MOPSO) algorithm for PU/PUE position detection. It minimizes concurrently the probability of detection error related to the received signal strength (RSS)/trilateration and the SNR, with the main objective of finding all optimized positions for the mobile anchor nodes and obtains the most accurate PUE attack detection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Xu, D., & Li, Q. (2019). Cooperative resource allocation in cognitive wireless powered communication networks with energy accumulation and deadline requirements. SCIENCE CHINA Information Sciences, 62(8), 82302.

    Article  Google Scholar 

  2. Salahdine, F., Kaabouch, N., & El Ghazi, H. (2016). A survey on compressive sensing techniques for cognitive radio networks. Physical Communication, 20, 61–73.

    Article  Google Scholar 

  3. Ta, D. T., Nguyen-Thanh, N., Maillé, P., & Nguyen, V. T. (2018). Strategic surveillance against primary user emulation attacks in cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking, 4(3), 582–596.

    Article  Google Scholar 

  4. Quadri, A., Manesh, M. R., & Kaabouch, N. (2017). Performance comparison of evolutionary algorithms for noise cancellation in cognitive radio systems. In IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, pp. 1–6.

  5. Liu, Y., Ning, P., & Dai, H. (2010). Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In Proceedings of IEEE Symposium on Security and Privacy, Berkeley/Oakland, CA, USA, pp. 286–301.

  6. Khaliq, S. B., Amjad, M. F., Abbas, H., Shafqat, N., & Afzal, H. (2019). Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach. Telecommunication Systems, 70(1), 123–140.

    Article  Google Scholar 

  7. Min, A. W., Zhang, X., & Shin, K. G. (2011). Detection of small-scale primary users in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 29(2), 349–361.

    Article  Google Scholar 

  8. Tingting, L., & Feng, S. (2014). Research on hidden malicious user detection problem. Security and Communication Networks, 7(6), 958–963.

    Article  Google Scholar 

  9. Pu, D., Shi, Y., Ilyashenko, A., & Wyglinski, A. M. (2011). Detecting primary user emulation attack in cognitive radio networks. In IEEE Global Telecommunications Conference (GLOBECOM), Houston, TX, USA, pp. 1–5.

  10. Xie, X., & Wang, W. (2013). Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding. Procedia Computer Science, 21, 430–435.

    Article  Google Scholar 

  11. Zhou, Y., Li, J., & Lamont, L. (2012). Multilateration localization in the presence of anchor location uncertainties. In 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, pp. 309–314.

  12. Zhao, F., Luo, H., Geng, H., & Sun, Q. (2014). An RSSI gradient-based AP localization algorithm. China Communications, 11(2), 100–108.

    Article  Google Scholar 

  13. Paisana, F., Marchetti, N., & DaSilva, L. A. (2014). Radar, TV and cellular bands: Which spectrum access techniques for which bands. IEEE Communications Surveys and Tutorials, 16(3), 1193–1220.

    Article  Google Scholar 

  14. Yu, R., Zhang, Y., Liu, Y., Gjessing, S., & Guizani, M. (2014). Securing cognitive radio networks against primary user emulation attacks. IEEE Network, 29(4), 68–74.

    Article  Google Scholar 

  15. Fassi Fihri, W., El Ghazi, H., Abou EL Majd, B., & El Bouanani, F. (2019). A decision-making approach for detecting the primary user emulation attack in cognitive radio networks. International Journal of Communication Systems, 32(15), e4026.

    Article  Google Scholar 

  16. Bouabdellah, M., Ghribi, E., & Kaabouch, N. (2019). RSS-Based localization with maximum likelihood estimation for PUE attacker detection in cognitive radio networks. In 2019 IEEE International Conference on Electro Information Technology (EIT) (pp. 1–6). USA: Brookings.

    Google Scholar 

  17. Ghanem, W. R., Shokair, M., & Desouky, M. I. (2016). An improved primary user emulation attack detection in cognitive radio networks based on firefly optimization algorithm. In 33rd National Radio Science Conference (NRSC). Aswan, Egypt: IEEE.

    Google Scholar 

  18. Singh, A. K., & Singh, A. K. (2016). Range-based primary user localization in cognitive radio networks. Procedia Computer Science, 93, 199–206.

    Article  Google Scholar 

  19. Amjad, M. F., Aslam, B., Attiah, A., & Zou, C. C. (2016). Towards trustworthy collaboration in spectrum sensing for ad hoc cognitive radio networks. Wireless Networks, 22(3), 781–797.

    Article  Google Scholar 

  20. Rehman, S. U., Sowerby, K. W., & Coghill, C. (2014). Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios. IET Communications, 8(8), 1274–1284.

    Article  Google Scholar 

  21. Xin, C., & Song, M. (2014). Detection of PUE attacks in cognitive radio networks based on signal activity pattern. IEEE Transactions on Mobile Computing, 13(5), 1022–1034.

    Article  Google Scholar 

  22. Dong, Q., Chen, Y., Li, X., Zeng, K., et al. (2018). An adaptive primary user emulation attack detection mechanism for cognitive radio networks. In International conference on security and privacy in communication systems (pp. 297–317). Cham: Springer.

    Google Scholar 

  23. Srinivasan, S., Shivakumar, K. B., & Mohammad, M. (2019). Semi-supervised machine learning for primary user emulation attack detection and prevention through core-based analytics for cognitive radio networks. International Journal of Distributed Sensor Networks, 15(9), 1550147719860365.

    Article  Google Scholar 

  24. Garcia-Otero, M., & Poblacion-Hernandez, A. (2016). Location aided cooperative detection of primary user emulation attacks in cognitive wireless sensor networks using nonparametric techniques. Journal of Sensors, 2016, 9571592. https://doi.org/10.1155/2016/9571592.

    Article  Google Scholar 

  25. Force, S. (2002). Spectrum policy task force report. Federal Communications Commission ET Docket 02, vol. 135.

  26. Oguejiofor, O., Okorogu, V., Adewale, A., & Osuesu, B. (2013). Outdoor localization system using RSSI measurement of wireless sensor network. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2(2), 1–6.

    Google Scholar 

  27. Wang, C., & Xiao, L. (2006). Locating sensors in concave areas. In Proceedings IEEE INFOCOM 2006, 25th IEEE International Conference on Computer Communications, pp. 1–12.

  28. Wang, D., Tan, D., & Liu, L. (2018). Particle swarm optimization algorithm: an overview. Soft Computing, 22(2), 387–408.

    Article  Google Scholar 

  29. Raghib, A., & Abou El Majd, B. (2019). Hierarchical multiobjective approach for optimising RFID reader deployment. International Journal of Mathematical Modelling and Numerical Optimisation, 9(1), 70–88.

    Article  Google Scholar 

  30. Chen, X., Gong, C., & Min, J. (2012). A node localization algorithm for wireless sensor networks based on particle swarm algorithm. Journal of Networks, 7(11), 1860.

    Article  Google Scholar 

  31. Patil, D. D., & Dangewar, B. D. (2014). Multi-objective particle swarm optimization (MOPSO) based on Pareto dominance Approach. International Journal of Computer Applications, 107(4), 13–15.

    Article  Google Scholar 

  32. Coello, C. C., & Lechuga, M. (2002). MOPSO: A proposal for multiple objective particle swarm optimization. In Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600), Honolulu, HI, USA, Vol. 2, pp. 1051–1056.

  33. Manesh, M. R., Quadri, A., Subramanian, S., & Kaabouch, N. (2017). An optimized SNR estimation technique using particle swarm optimization algorithm. In IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–6.

  34. Fassi Fihri, W., Arjoune, Y., El Ghazi, H., Kaabouch, N., & El Majd, B. Abou (2018). A particle swarm optimization based algorithm for primary user emulation attack detection. In IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), pp. 823–827.

  35. El Mrabet, Z., Arjoune, Y., El Ghazi, H., Abou EL Majd, B., & Kaabouch, N. (2018). Primary user emulation attacks: a detection technique based on Kalman filter. Journal of Sensor and Actuator Networks, 7(3), 26.

    Article  Google Scholar 

  36. Fieldsend, J. E. (2004). Multi objective particle swarm optimization methods.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wassim Fassi Fihri.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fassi Fihri, W., El Ghazi, H. & Abou El Majd, B. A Multi-Objective Particle Swarm Optimization Based Algorithm for Primary User Emulation Attack Detection. Wireless Pers Commun 117, 867–886 (2021). https://doi.org/10.1007/s11277-020-07900-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07900-3

Keywords

Navigation