Defense against primary user emulation attacks in cognitive radio networks

被引:362
作者
Chen, Ruiliang [1 ]
Park, Jung-Min [1 ]
Reed, Jeffrey H. [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
基金
美国国家科学基金会;
关键词
cognitive radio; communication system security; primary user emulation attack; localization; spectrum sensing; wireless sensor network;
D O I
10.1109/JSAC.2008.080104
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in licensed spectrum bands while causing no interference to incumbent communications. Spectrum sensing is one of the essential mechanisms of CRs and its operational aspects are being investigated actively. However, the security aspects of spectrum sensing have garnered little attention. In this paper, we identify a threat to spectrum sensing, which we call the primary user emulation (PUE) attack. In this attack, an adversary's CR transmits signals whose characteristics emulate those of incumbent signals. The highly flexible, software-based air interface of CRs makes such an attack possible. Our investigation shows that a PUE attack can severely interfere with the spectrum sensing process and significantly reduce the channel resources available to legitimate unlicensed users. To counter this threat, we propose a transmitter verification scheme, called LocDef (localization-based defense), which verifies whether a given signal is that of an incumbent transmitter by estimating its location and observing its signal characteristics. To estimate the location of the signal transmitter, LocDef employs a non-interactive localization scheme. Our security analysis and simulation results suggest that LocDef is effective in identifying PUE attacks under certain conditions.
引用
收藏
页码:25 / 37
页数:13
相关论文
共 24 条
[1]   NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey [J].
Akyildiz, Ian F. ;
Lee, Won-Yeol ;
Vuran, Mehmet C. ;
Mohanty, Shantidev .
COMPUTER NETWORKS, 2006, 50 (13) :2127-2159
[2]  
[Anonymous], P 1 ACIS INT WORKSH
[3]  
[Anonymous], P 6 ANN INT S ADV RA
[4]   Implementation issues in spectrum sensing for cognitive radios [J].
Cabric, D ;
Mishra, SM ;
Brodersen, RW .
CONFERENCE RECORD OF THE THIRTY-EIGHTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2, 2004, :772-776
[5]   Secure positioning in wireless networks [J].
Capkun, S ;
Hubaux, JP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :221-232
[6]  
CAPKUN S, 2006, P IEEE INF APR
[7]  
Chen R., 2006, P IEEE WORKSH NETW T
[8]  
Dogançay K, 2005, ISSPA 2005: The 8th International Symposium on Signal Processing and its Applications, Vols 1 and 2, Proceedings, P543
[9]  
Ganesan G, 2005, 2005 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, Conference Record, P137
[10]   Cognitive radio: Brain-empowered wireless communications [J].
Haykin, S .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (02) :201-220