Skip to main content
Log in

On detecting primary user emulation attack using channel impulse response in the cognitive radio network

  • Published:
Frontiers of Information Technology & Electronic Engineering Aims and scope Submit manuscript

Abstract

Cognitive radio is an effective technology to alleviate the spectrum resource scarcity problem by opportunistically allocating the spare spectrum to unauthorized users. However, a serious denial-of-service (DoS) attack, named the ‘primary user emulation attack (PUEA)’, exists in the network to deteriorate the system performance. In this paper, we propose a PUEA detection method that exploits the radio channel information to detect the PUEA in the cognitive radio network. In the proposed method, the uniqueness of the channel impulse response (CIR) between the secondary user (SU) and the signal source is used to determine whether the received signal is transmitted by the primary user (PU) or the primary user emulator (PUE). The closed-form expressions for the false-alarm probability and the detection probability of the proposed PUEA detection method are derived. In addition, a modified subspace-based blind channel estimation method is presented to estimate the CIR, in order for the proposed PUEA detection method to work in the scenario where the SU has no prior knowledge about the structure and content of the PU signal. Numerical results show that the proposed PUEA detection method performs well although the difference in channel characteristics between the PU and PUE is small.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Chen, R.L., Park, J.M., 2006. Ensuring trustworthy spectrum sensing in cognitive radio networks. Proc. 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, p.110–119. https://doi.org/10.1109/SDR.2006.4286333

    Google Scholar 

  • Chen, R.L., Park, J.M., Reed, J.H., 2008. Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun., 26(1): 25–37. https://doi.org/10.1109/JSAC.2008.080104

    Article  Google Scholar 

  • Chin, W.L., Le, T.N., Tseng, C.L., et al., 2014. Cooperative detection of primary user emulation attacks based on channel-tap power in mobile cognitive radio networks. Int. J. Ad Hoc Ubiq. Comput., 15(4): 263–274. https://doi.org/10.1504/ijahuc.2014.061005

    Article  Google Scholar 

  • Fang, S.H., Chen, J.Y., Shieh, M.D., et al., 2013. Subspacebased blind channel estimation by separating real and imaginary symbols for cyclic-prefixed single-carrier systems. IEEE Trans. Broadcast., 59(4): 698–704. https://doi.org/10.1109/TBC.2013.2281950

    Article  Google Scholar 

  • Haykin, S., 2005. Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun., 23(2): 201–220. https://doi.org/10.1109/JSAC.2004.839380

    Article  Google Scholar 

  • Jin, F., Varadharajan, V., Tupakula, U., 2015. Improved detection of primary user emulation attacks in cognitive radio networks. Proc. Int. Telecommunication Networks and Applications Conf., p.274–279. https://doi.org/10.1109/ATNAC.2015.7366825

    Google Scholar 

  • Jin, Z., Anand, S., Subbalakshmi, K.P., 2009. Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing. ACM SIGMOBILE Mob. Comput. Commun. Rev., 13(2): 74–85. https://doi.org/10.1145/1621076.1621084

    Article  Google Scholar 

  • Kay, S.M., 1993. Fundamentals of Statistical Signal Processing: Estimation Theory. Prentice-Hall, New Jersey, p.27–82.

    MATH  Google Scholar 

  • Kim, J.G., Oh, J.H., Lim, J.T., 2012. Subspace-based channel estimation for MIMO-OFDM systems with few received blocks. IEEE Signal Process. Lett., 19(7): 435–438. https://doi.org/10.1109/LSP.2012.2197201

    Article  Google Scholar 

  • Lalos, A.S., Rontogiannis, A.A., Berberidis, K., 2010. Frequency domain channel estimation for cooperative communication networks. IEEE Trans. Signal Process., 58(6): 3400–3405. https://doi.org/10.1109/TSP.2010.2045413

    Article  MathSciNet  Google Scholar 

  • Le, T.N., Chin, W.L., Kao, W.C., 2015. Cross-layer design for primary user emulation attacks detection in mobile cognitive radio networks. IEEE Commun. Lett., 19(5): 799–802. https://doi.org/10.1109/LCOMM.2015.2399920

    Article  Google Scholar 

  • Le, T.N., Chin, W.L., Lin, Y.H., 2016. Non-cooperative and cooperative PUEA detection using physical layer in mobile OFDM-based cognitive radio networks. Proc. Int. Conf. on Computing, Networking and Communications, p.1–5. https://doi.org/10.1109/ICCNC.2016.7440583

    Google Scholar 

  • Liu, M., Crussiere, M., Helard, J.F., 2012. A novel data-aided channel estimation with reduced complexity for TDSOFDM systems. IEEE Trans. Broadcast., 58(2): 247–260. https://doi.org/10.1109/TBC.2012.2184152

    Article  Google Scholar 

  • Muquet, B., de Courville, M., Duhamel, P., 2002. Subspacebased blind and semi-blind channel estimation for OFDM systems. IEEE Trans. Signal Process., 50(7): 1699–1712. https://doi.org/10.1109/TSP.2002.1011210

    Article  Google Scholar 

  • National Standard of the People’s Republic of China, 2007. Framing Structure, Channel Coding and Modulation for Digital Television Terrestrial Broadcasting System. GB 206000-2006 (in Chinese).

    Google Scholar 

  • Nguyen, N.T., Zheng, R., Han, Z., 2012. On identifying primary user emulation attacks in cognitive radio systems using nonparametric Bayesian classification. IEEE Trans. Signal Process., 60(3): 1432–1445. https://doi.org/10.1109/TSP.2011.2178407

    Article  MathSciNet  Google Scholar 

  • Pu, D., Wyglinski, A.M., 2014. Primary-user emulation detection using database-assisted frequency-domain action recognition. IEEE Trans. Veh. Technol., 63(9): 4372–4382. https://doi.org/10.1109/TVT.2014.2316831

    Article  Google Scholar 

  • Rao, C.R., 1973. Linear Statistical Inference and Its Applications. John Wiley & Sons, New York, p.516–604. https://doi.org/10.1002/9780470316436

    Google Scholar 

  • Su, B., Vaidyanathan, P.P., 2007. Subspace-based blind channel identification for cyclic prefix systems using few received blocks. IEEE Trans. Signal Process., 55(10): 4979–4993. https://doi.org/10.1109/TSP.2007.896262

    Article  MathSciNet  Google Scholar 

  • Tomasoni, A., Gatti, D., Bellini, S., et al., 2013. Efficient OFDM channel estimation via an information criterion. IEEE Trans. Wirel. Commun., 12(3): 1352–1362. https://doi.org/10.1109/TWC.2013.022713.120961

    Article  Google Scholar 

  • Tugnait, J.K., Kim, H., 2010. A channel-based hypothesis testing approach to enhance user authentication in wireless networks. Proc. 2nd Int. Conf. on Communication Systems and Networks, p.1–9. https://doi.org/10.1109/comsnets.2010.5432018

    Google Scholar 

  • Wooding, R.A., 1956. The multivariate distribution of complex normal variables. Biometrika, 43(1–2): 212–215. https://doi.org/10.2307/2333597

    Article  MathSciNet  Google Scholar 

  • Xin, C.S., Song, M., 2014. Detection of PUE attacks in cognitive radio networks based on signal activity pattern. IEEE Trans. Mob. Comput., 13(5): 1022–1034. https://doi.org/10.1109/TMC.2013.121

    Article  Google Scholar 

  • Zhou, W., Lam, W.H., 2010. Channel estimation and data detection for OFDM systems over fast-fading and dispersive channels. IEEE Trans. Veh. Technol., 59(3): 1381–1392. https://doi.org/10.1109/TVT.2009.2037639

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui-fang Chen.

Additional information

Project supported by the National Natural Science Foundation of China (Nos. 61471318 and 61671410), the Zhejiang Provincial Natural Science Foundation of China (No. LY14F010014), and the State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, China (No. CEMEE2015Z0202A)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jiang, Qm., Chen, Hf., Xie, L. et al. On detecting primary user emulation attack using channel impulse response in the cognitive radio network. Frontiers Inf Technol Electronic Eng 18, 1665–1676 (2017). https://doi.org/10.1631/FITEE.1700203

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/FITEE.1700203

Keywords

CLC number

Navigation