Open Access   Article Go Back

Detection Of Primary User Emulation Attack in Cognitive Radio Networks Based On TDOA using Grey Wolf Optimizer

Aasia Rehman1

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 332-337, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.332337

Online published on Feb 28, 2019

Copyright © Aasia Rehman . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Aasia Rehman, “Detection Of Primary User Emulation Attack in Cognitive Radio Networks Based On TDOA using Grey Wolf Optimizer,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.332-337, 2019.

MLA Style Citation: Aasia Rehman "Detection Of Primary User Emulation Attack in Cognitive Radio Networks Based On TDOA using Grey Wolf Optimizer." International Journal of Computer Sciences and Engineering 7.2 (2019): 332-337.

APA Style Citation: Aasia Rehman, (2019). Detection Of Primary User Emulation Attack in Cognitive Radio Networks Based On TDOA using Grey Wolf Optimizer. International Journal of Computer Sciences and Engineering, 7(2), 332-337.

BibTex Style Citation:
@article{Rehman_2019,
author = {Aasia Rehman},
title = {Detection Of Primary User Emulation Attack in Cognitive Radio Networks Based On TDOA using Grey Wolf Optimizer},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {332-337},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3664},
doi = {https://doi.org/10.26438/ijcse/v7i2.332337}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.332337}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3664
TI - Detection Of Primary User Emulation Attack in Cognitive Radio Networks Based On TDOA using Grey Wolf Optimizer
T2 - International Journal of Computer Sciences and Engineering
AU - Aasia Rehman
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 332-337
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
418 252 downloads 168 downloads
  
  
           

Abstract

Cognitive Radio is a technology that overcomes the problem of spectrum shortage by embedding the wireless devices with an intelligent agent to make the opportunistic use of available white spaces in the radio environment. However due to ubiquitous nature of cognitive radio networks, it is sensitive to a number of security threats which disturbs the overall performance of cognitive radio networks. The main goal of this paper is to thwart one of the security threats in Cognitive Radio Networks known as Primary User Emulation Attack. Primary User Emulation Attack is one of the most popular Dynamic Spectrum Access attack. In this paper we are detecting the primary user emulation attack based on TDOA values using Grey Wolf Optimizer. Simulation results show that Grey Wolf Optimizer is more accurate than using the Particle Swarm Optimization Algorithm for mitigation.

Key-Words / Index Term

Cognitive Radio Network;Primary User Emulation Attack;Grey Wolf Optimizer;Particle Swarm Optimization;Dynamic Spectrum Access; Time Difference Of Arrival

References

[1] Beibei Wang and K. J. Ray Liu, “Advances in Cognitive Radio Networks: A Survey,” IEEE Journal of Selected Topics in Signal Processing, vol. 5, no. 1, February 2011.
[2] Rajesh K. Sharmaand Danda B. Rawat, “Advances on Security Threats and Countermeasuresfor Cognitive Radio Networks: A Survey” IEEE Communications Surveys & Tutorials.
[3] T. Charles Clancy, Nathan Goergen, “Security in cognitive radio networks: threats and mitigation,” 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008. Crown Com 2008, 2008, pp 1–8 (IEEE).
[4] H. Srikanth Kamath, L. M. Schalk, “Primary User Localization Schemes in Cooperative Sensing,” International Journal of Computer Applications (0975 8887) Volume 105 - No. 13, November 2014.
[5] K.Challapali, S. Mangold, and Z. Zhong, “Spectrum agile radio:Detecting spectrum opportunities,” Proceedings of the 6th AnnualInternational Symposium on Advanced Radio Technologies, March 2004.
[6] M.P.Olivieri, G. Barnett, A.Lackpour, A. Davis, and P. Ngo, “A scalable dynamic spectrum allocation system with interference mitigation forteams of spectrally agile software defined radios,”Proceedings of theIEEE International Symposium on New Frontiers in Dynamic SpectrumAccess Networks, November 2005.
[7] D. Cabric, S. M. Mishra, and R. W. Brodersen, “Implementation issues inspectrum sensing for cognitive radios,” Proceedings of the Thirty-eightAsilomar Conference on Signals, Systems, and Computers, November2004.
[8] L.P.Goh, Z.Lei, and F Chin, “Dvb detector for cognitive radio,” Proceedings of the International Conference on Communications, page 64606465, Glasgow, Scotland, June 2007.
[9] Y.Qi, T.Peng, W.Wang, and R.Qian, “ Cyclostationarity-based spectrumsensing for wideband cognitive radio,” Proceedings of the 2009 WRIInternational Conference on Communications and Mobile Computing,page 107111, Washington, DC, USA, 2009.
[10] W.Xia, S.Wang, W.Liu, and W.Cheng, “Correlation-based spectrum sensing in cognitive radio,” Proceedings of the 2009 ACM Workshop on Cognitive Radio Networks, page 6772, New York, NY, USA, 2009.
[11] H Li and Z Han, “Dogfight in spectrum: Combating primary useremulation attacks in cognitive radio systems, part i: Known channel statistics,”IEEE Transactions on Wireless Communications, 9(11):3566–3577, 2010.
[12] Husheng Li and Zhu Han, “Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems-Part II: Unknown Channel Statistics,” IEEE Transactions on Wireless Communications, Vol. 10, No. 1, January 2011.
[13] S Anand, Z Jin, and KP Subbalakshmi, “An analytical model for primary user emulation attacks in cognitive radio networks,”Proceedingsof IEEE Symposium on New Frontiers in Dynamic Spectrum AccessNetworks, Chicago, IL, USA, October 2008.
[14] Z Jin, S Anand, and KP Subbalakshmi, “Detecting primary user emulationattacks in dynamic spectrum access networks,” Proceedings of IEEE International Conference on Communications, Dresden, Germany, June2009.
[15] Z Jin, S Anand, and KP Subbalakshmi, “Mitigating primary useremulation attacks in dynamic spectrum access networks using hypothesis testing,” ACM SIGMOBILE Mobile Computing and Communications
Review, 13(2):74–85, 2009.
[16] Z Jin, S Anand, and KP Subbalakshmi, “Performance analysis of dynamicspectrum access networks under primary user emulation attacks,” Proceedings of IEEE Global Telecommunications Conference, Miami,FL, USA, December 2010.
[17] Zituo Jin,“Primary user emulation attack in dynamic spectrum accessnetworks: threats, mitigation and impact,” Licentiate dissertation, StevensInstitute of Technology, Hoboken, NJ, May 2012.
[18] Peng Ning Yao Liu and Huaiyu Dai,“Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures,”Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2010.
[19] R.Chen, J.M.Park, and J.H. Reed,“Defense against primary useremulation attacks in cognitive radio networks,”IEEE Journal on SelectedAreas in Communications Special Issue on Cognitive Radio Theory andApplications, 2008.
[20] Olga Leon, Juan Hernandez-Serrano, Miguel Soriano, “Cooperative Detection of Primary User Emulation Attacks in CRNs,” Computer Networks, Elsevier, Vol. 56, pp. 3374-3384, Sep. 2012.
[21] S. Gezici, Z. Tian, G. Giannakis, H. Kobayashi, A. Molisch, H. Poor, Z.Sahinoglu, Localization via ultra-wideband radios: a look atpositioning aspects for future sensor networks, IEEE Signal Processing Magazine 22 (4)(2005)70–84.
[22] A. Eksim, S. Kulac, M. Sazli, Effective cooperative spectrum sensing inieee 802.22 standard with time diversity, in: International Conference on Advances in Computational Tools for Engineering Applications, ACTEA’09,2009,pp.528–531.
[23] Walid R. Ghanem, Mona Shokair and Moawad I. Desouky, “An improved Primary User Emulation Attack Detection in Cognitive Radio Networks Based on Firefly Optimization Algorithm,” 2016, 33rd National Radio Science Conference (NRSC 2016), Feb 22‐25, 2016, Aswan, Egypt.
[24] Seyedali Mirjalili, Seyed Mohammad Mirjalili and Andrew Lewis, “Grey Wolf Optimizer,” Advances in Engineering Software 69 (2014) 46–61, Elsevier.