Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing
read more
Citations
A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks
Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics
Survey of Security Issues in Cognitive Radio Networks
Modeling primary user emulation attacks and defenses in cognitive radio networks
Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities
References
Wireless Communications: Principles and Practice
Cognitive radio: brain-empowered wireless communications
Cognitive radio: making software radios more personal
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey
IEEE 802.22: the first worldwide wireless standard based on cognitive radios
Related Papers (5)
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey
Frequently Asked Questions (12)
Q2. What is the test for PUEAThe Neyman-Pearson composite hypothesis test?
Test to detect PUEAThe Neyman-Pearson composite hypothesis test can be used to distinguish between two hypotheses, given some constraints on the miss probability.
Q3. Why is the probability of missing the primary user decreasing with increasing R?
This is because, for a given R0, if R is small, i.e., malicious users are closer to the secondary user, the total received power from all malicious users is likely to be larger than that received from the primary transmitter, thus decreasing the probability of successful PUEA.
Q4. What is the probability of PUEA at any secondary user?
The shadowing loss (expressed in dB) at any secondary user both from the primary transmitter and from any malicious user is normally distributed with mean 0 and variance σ2p and σ 2 m,respectively.10.
Q5. What is the probability density function of the signal from the primary transmitter?
The authors consider a free space propagation model for the signal from the primary transmitter and atwo-ray ground model for the signal from the malicious users thus resulting in a path loss exponent of 2 for the propagation from the primary transmitter and a path loss exponent of 4 for the propagation from the malicious users.
Q6. How high is the probability of successful PUEA in Wald’s test?
In fact, the maximum probability of successful PUEA in the NP test can go as high as 0.778 whereas in the Wald’s test the authors can limit this to 0.407.
Q7. How is the received power from the transmission of all M malicious users calculated?
The received power from the transmission of all M malicious users is calculated based on Eqn. (6), including path loss and i.i.d. shadowing.
Q8. Why is the signal due to multi-path neglected?
This is because, the primary transmitter is so far away from the secondary and malicious users that the signal due to multi-path can be neglected.
Q9. Why is the probability of PUEA on any user the same as that on any other user?
Since there is no co-operation between the secondary users, the probability of PUEA on any user is the same as that on any other user.
Q10. what is the expression for pdf p(m)()?
applying Fenton’s approximation for the weighted sum, the expression for the pdf p(m)(χ) in Eqn. (11) can be approximated as a lognormal distribution with parameters µχ and σ2χ of the formp(m)(χ) = 1Aσχ √ 2πχ exp− (10 log10 χ− µχ) 22σ2χ. (12)If P (m)r is a log-normally distributed random variable with pdf given in Eqn. (12), σ2χ and µχ can be1The expressions in Eqns. (9) and (10) can be obtained by following the steps specified in the Appendix in [16].
Q11. What is the pdf of the received power from all M malicious users?
The pdf of the received power from all M malicious users, p(m)(χ), can then be obtained by averaging Eqn. (8) over r1, r2, · · · rM and can be written as2p (m) (χ) = ∞Xk=1 "Z [R0,R]M p (m) χ|r (χ|r)p(r|M)dr # P{M = k}, (11)where p(r|M) = M∏j=1p(rj), and p(rj) can be obtainedfrom Eqn. (2).
Q12. What is the probability density function of the received signal at the secondary user?
In order to obtain a hypothesis test using NPCHT and WSPRT, it is essential to obtain the pdf of the received signal at the secondary user due to transmission by the primary and the malicious users.