The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cognitive radio networks (CRNs) are vulnerable to various attacks. Primary user emulation attack (PUEA) is one kind of serious attacks. In order to combat PUEA, we propose an algorithm to detect PUEA in CRNs based on probability density function (PDF) assisted by belief propagation (BP), called PDF-BP. In the proposed algorithm, every secondary user (SU) calculates its belief value based on the PDF...
Cognitive radio network security has become an important issue affecting the development of cognitive radio technology. Primary user emulation attacks(PUEA) is a common attack in the Cognitive radio network. In the scheme, we choose cooperative spectrum sensing system as our model and soft fusion as our Fusion method. We analyze the impact of PUEA on the system performance in the traditional maximal...
With the rapid proliferation of new wireless technologies, devices and services in the smart grid, spectrum scarcity has become a major concern. In this paper, we introduce the conception of Wireless Cognitive Sensor Network (WCSN) into the smart grid to cope with the main challenges in the smart grid, such as spectrum scarcity, heterogeneous coexistence, tremendous data processing and security guarantees...
In Cognitive Radio Ad Hoc Networks (CRAHNs), malicious Secondary Users can exploit CR (Cognitive Radio) capabilities to perform Primary User Emulation Attacks (PUEA). These attacks pretend the transmission of a Primary User (PU), giving to malicious users the priority of using licensed frequencies over well-behaved unlicensed Secondary Users (SU). Since CRAHNs are envisioned as a solution for the...
In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) networks. In particular, we analyze primary user emulation attacks (PUEA) in cognitive radio networks without using any location information and therefore can do away with dedicated sensor networks. We present an analysis using...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.