Document Type : Review Article

Authors

Iran University of Science and Technology, Tehran

Abstract

Cognitive radio is a revolutionary technology that made significant progress in the effective use of the frequency spectrum. The technology itself can be dynamically adjusted so that the proper utilization of the available radio spectrum can be made. According to various studies conducted, it is observed that the bulk of each frequency band allocated to users leaving unused. The cognitive radio can use these parts of the spectrum that called spectrum holes. Inherent nature of this technology creates the chance for the attacker in these networks. This vulnerability that created due to the inherent nature of cognitive radio technology, Can severely impact on the safety and quality of service in these networks. In this paper, we focus on the primary user emulation attack. In this attack, an adversary transmits signals whose characteristics emulate those of incumbent signals. We proposed the method for reducing the effects of primary user emulation attacks in cognitive radio networks. This method suggests the technique that can merge with spectrum sensing method and can resistant these networks against the primary user emulation attacks. Finally, with run some simulation, we examined the performance of this proposed method in detection of primary user emulation attacks in these networks. 

Keywords

[1] Danda B. Rawat and Gongjun Yan, “Spectrum Sensing Methods and Dynamic Spectrum Sharing in Cognitive Radio Networks: A Survey,” International Journal of Research and Reviews in Wireless Sensor Networks, March 2011.
[2] M Nekovee, “Dynamic spectrum access — concepts and future architectures,” BT Technology Journal, April 2006.
[3] K.C.chen,Y.J.peng,N.prasad,Y.C.liang,S.sun,“cognitive radio network architecture : trusted network layer structure,” Inational science council,Taiwan ROC, 2008.
[4] Rehan Ahmed and Yasir Arfat Ghous, detection of vacant frequency bands in cognitive radio, Blekinge Institute of Technology ph.d thesis, May 2010
[5] Beibei Wang and K. J. Ray Liu, “Advances in Cognitive Radio Networks: A Survey,” IEEE communication society,2008
[6] K. Chen, P. Chen, N.R. Prasad, Y. Liang, and S. Sun, “Trusted cognitive radio networking,” presented at Wireless Communications and Mobile Computing, 2010, pp.467-485.
[7] Y. Liu, P. Ning, and H. Dai, “Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures,” In Proceedings of the 2010 IEEE Symposium on Security and Privacy, pages 286–301, 2010.
[8] O. Le´on, J. Hern´andez-Serranoand M. Soriano, “Securing cognitive radio networks,” international journal of communication systems,2010.
[9] R. Chen, J. Park, and J. Reed, “Defense against primary user emulation attacks in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 25–37, Jan. 2008.
[10] Shrestha Junu,Sunkara Avinash Thirunavukkarasu Balaji, Security in Cognitive Radio, San Jose State University ph.d thesis, 2010
[11] Goldsmith, Wireless Communications, Cambridge University Press, 2005.
[12] Alfred Asterjadhi and Michele Zorzi, “JENNA: a Jamming Evasive Network coding Neighbor-discovery Algorithm for Cognitive Radio Networks,” IEEE international conference on communication,2010.