Detection of Primary User Emulation (PUE) Attack in

ISSN XXXX XXXX © 2017 IJESC
Research Article
Volume 7 Issue No.3
Detection of Primary User Emulation (PUE) Attack in Cognitive
Radio Network
Priti Patil1 , Prajakta Patil2 , Mr. K.P.Paradeshi3
P.G. Student 1, 2 , Associate Professor3
Depart ment of Electronics Engineering
P.V.P.I.T Budhgaon, Sangli, India
Abstract:
Lots of new technology has been developed in wireless communication, Cognitive rad io is one of the fastest growing technology in
this field. Cognitive rad io is solution to solve spectrum scarcity problem. In this network, un licensed users share the spectrum of
licensed user using spectrum sensing process. Spectrum sensing is important in transmission. When spectrum sensing process is
disturbed, then entire sensing process is disturbed which is called as primary user emulat ion attack. This attack is solved b y using
localization method that is time -difference-of-arrival(TDOA).
Keywords: Cognit ive Rad io (CR), Primary User (PU), Secondary User (SU), Spectru m Hole, Primary User Emulat ion Attack
(PUEA ), Time-Difference-of-Arrival(TDOA.)
I. INTRODUCTION
One of the fastest growing sectors in recent years has
undoubtedly been that of wireless sensor networks (WSNs).
Most wireless sensor network operate on unlicensed frequency
bands. Generally, they use industrial, scientific, and medical
(ISM ) bands, like the worldwide available 2.4-GHz band. This
band is also used in large amount of popular wireless
applications, for examp le, those working over Wi-Fi or
Bluetooth. Hence, the unlicensed spectrum bands are becoming
overcrowded. A CR is an intelligent wireless communication
system, changes its transmission and reception parameter
according to its surrounding environment. And CR also adapts
its internal parameters to achieve reliable and efficient
communicat ions. Cognitive radio network have many
application, such as CR uses TV white spectrum. In cognitive
radio network, there are two types of user primary user (PU) and
secondary user(SU). Primary user is licensed user whereas
secondary user is unlicensed user. SU senses the unused
spectrum that is spectrum hole in opportunistic ways. Spectrum
hole is band of frequencies assigned to primary user, but, at
particular time and geographic location, the band is not being
utilized by that user.
The SUs must have the ability of recognizing the PU fro m SU
signals. Some of the secondary users behave in bad ways and
pretend itself as primary user to access the spectrum. Hence
spectrum sensing process is corrupted is called as primary user
emu lation attack (PUEA). Time-d ifference-of-arrival (TDOA)
method is used to detect position of PUEA attack in cognitive
radio network. There are different types of attack in cognitive
radio namely objective function attack, lion attack, jamming
attack etc. Objective function attack is one type of attack and
goal of OFA is to force CR to select sub optimal value by
changing objective function. Cognitive radio controls rad io
parameter like power, bandwidth, modulation, security and
coding. For examp le, bank transaction does not require high data
rate rather it requires high security during the transmission. For
voice or v ideo application need h igh data rate. Lion attack is one
type of attack in cognitive radio network performed by an
attacker at physical layer. In this attack, attacker performs PUE
attack. PUE allo ws attacker to force secondary users to perform
frequency handoff frequently. Because of frequency handoff is
performed in CRN, co mmunicat ion lin k breaks. Hence degrade
the performance of CRN.
II. PRIMARY US ER EMULATION ATTACK
Figure.1. Representation of s pectrum holes
Secondary users (SUs) sense the unused spectrum using
spectrum sensing process. Spectrum sensing is process to detect
the unutilized parts and used them in opportunistic ways. When
SU is using the unutilized band and detects the existence of
primary user (PU), SU must leave it for him and move to another
free spectrum. The SUs must have the ability of recognizing the
PU fro m SU signals. So me of the secondary users behave in bad
ways and pretend itself as primary user to access the spectrum. It
steals the free spectrum and corrupts the sensing process. Hence
spectrum sensing process is corrupted is called as primary user
emu lation attack (PUEA ).
International Journal of Engineering Science and Computing, March 2017
5845
http://ijesc.org/
Figure 2 represents the actual activity of SU in sensing and
transmission slot. Each secondary user first senses the spectrum
band and if spectrum band is available transmits during
transmission slot and senses again to check for reappearance of
secondary user
composite hypothesis test and wald’s sequential probability rat io
test. In this method, first probability density function is
generated and fro m that result neyman-pearson test is
conducted[7]. Zhao et al [2009], p roposed scheme to counter
PUE attack that is based on transmitter fingerprint ing. In this
scheme, phase noise of noisy career is extracted. Then extracted
part is applied to identify transmitter [9]. Ru iliang Chen et. al
[2008], “Defense against primary user emulation attacks in
cognitive radio networks”, proposed a transmitter verification
scheme, called localizat ion based defense (Loc-Def). This
scheme utilizes both signal characteristics and position of the
signal transmitter to verify primary signal transmitter. Non interactive localization scheme is introduced to detect PUE
attacks [10].
IV. METHODOLOGY
To overcome the PUE attack, a transmitter verification scheme
based on position verification is proposed. Several localization
schemes have been proposed one of them is TDOA. TDOA is
suitable in CRN because it utilize the difference between the
arrival t imes of pulse.
Figure.2. Representation of usual acti vi ty of S U in sensing
and trans mission slot
PUEA has two categories: selfish PUEA and malicious PUEA.
Selfish PUE attacks: Selfish PUE attack is done by a selfish
secondary user. If a selfish node detects the unused spectrum
band, he or she prevents the other secondary users to detect
spectrum so that selfish user could get full access of spectrum.
Malicious PUE attacks: In this attack, attacker does not use
spectrum band for its own co mmun ication. Object ive of attacker
is to reduce the utilization of availab le spectrum band.
III. LITERATURE S URVEY
Ghanem et al [2016], proposed improved primary user emu lation
attack detection technique in based on Firefly Optimization
Algorith m. The main part of this paper is defense against
primary user emulat ion attack (PUEA) in cognitive rad io
network (CRN) based on Time Difference Of Arrival (TDOA)
localization technique depends on proposed firefly optimization
algorith m. And also explained comparison between proposed
algorith m, nonlinear least squares, maximu m likelihood and
Taylor series estimat ion for wireless localizat ion [1]. Fan Jin et.
al [2015], “Improved detection of primary user emu lation attack
in cognitive rad io network”. A new scheme introduced in this
paper. This scheme helps to achieve improved primary user
emu lation (PUE) attack detection in cognitive radio network.
The scheme comb ines energy detection and localization. By
combin ing these two schemes, user can be identified exact
location of primary user emulat ion (PUE) attacker [2]. KaiWang
Lu et. al [2012], “Research of PUE attack based on Location”,
proposed RSSI-based transmitter localizat ion verification
scheme. Th is method calculates the signal transmitter location to
verify the signal is that of a primary signal. This scheme
describes some algorith m namely Maximu m likelihood estimate
algorith m improvement, Coordinate correction technique, robust
maximu m likelihood estimate [5]. Jin et al [2010], p roposed
method to detect PUE attack based on Neyman -Pearson
Localization of TDOA
TDOA is a simple method for positioning. It uses difference of
arrival of time, to find the position of fixed transmitters. To get
the positioning equations, it uses three receiving stations and
uses three dimensional t ime difference o f four stations. The time
difference between the rad iated signal of target and t wo
receiving stations determines a hyperboloid with the two stations
as its two focuses. The four stations produce three pairs of
hyperboloids. A surface of hyperboloids intersecting with
International Journal of Engineering Science and Computing, March 2017
5846
Figure.3. Block di agram of proposed system
http://ijesc.org/
another surface determines a line, and then the line intersecting
with the third hyperboloid can determine a point, which realizes
positioning
[5]. C. Chen, H. Cheng and Y. Yao(Ju ly,2011), “Cooperative
Spectrum Sensing in Cognitive Rad io Network in the presence
of Primary User Emu lat ion Attack”, IEEE Transactions on
Wireless Co mmunicat ion, Vo l 10, no. 7, pp. 2135-2141.
[6]. D. Pu, Y. Shi, A. V. VIlyashenko and A. M. Wyglinski(Dec
2011), “Detecting Primary User Emu lation attacks in Cognitive
Radio Networks”, In Proceedings of the IEEE Global
Teleco mmunication Conference(GLOBECOM)IEEE, pp. 0105.
[7]. Z. Jin , S. Anand, K.P Subbalakshmi, “Mitigating Primary
User Emu lation Attacks in Dynamic Spectru m Access Networks
using Hypothesis Testing”,in mobile co mputing and
communicat ion review, volu me 13, number 2.
[8]. X. Ding, X. Gong and R. Wu, “The study on related
algorith m of TDOA positioning,” Modern Electronic
Technology, No.1, 2009.
[9]. Caidan Zhao,Wumei Wang, Lianfen Huang and Yan
Yao(September, 2009), “Anti-PUE Attack Based on the
Transmitter Fingerprint Identification in Cognitive Radio”, in
5th International Conference on Wireless Co mmunicat ions,
Networking and Mobile Co mputing (WiCo m‘09), Beijing,
China, pp.1-5.
[10]. R.Chen, J. Park and J. Reed(Jan. 2008), “Defense against
primary user emulation attacks in cognitive radio networks,”
IEEE Journal on Selected Areas in Co mmunications, vol. 26,
no.1, pp. 25-37.
[11]. R Chen and J Park(25-27sept. 2006), “Ensuring
Trustworthy Spectrum Sensing in Cognitive Radio Network”,
1st IEEE workshop on Networking Technologies for Software
Defined Radio, SDR ’06. Pages(s):110-119.
Figure.4. Fl ow chart represents the detecti on of PUE
attacker
V. REFERENC E
[12]. S. Haykin(Feb. 2005), “Cognitive radio : brain-empowered
wireless commun ications,” IEEE Journal on Selected Areas in
Co mmunicat ions, Vo l 23 (2), pp. 201-220. 16
[1] W. R. Ghanem, M. Shokair and M. I. Desouky (Feb 2225,2016), “An imp roved primary user emu lation attack detection
in cognitive radio network based on Firefly Optimization
Algorith m”, 33rd Nat ional Radio Conference (NRSC 2016), pp.
178-187.
[2]. F. Jin, V. Vardharajan and U. Tupakula (Nov,2015),
“Improved detection of primary user emu lation attack in
cognitive radio network”, International Teleco mmun ication
Network and Application Conference (ITNA C), pp. 274-279.
[3]. K. K. Chaunhan and A. K. Singh Sanger(Feb,2014), “Survey
of security threads and Attacks in cognitive radio networks”,
International Conference on Electronics and commun ication
system (ICECS), pp. 01-05.
[4]. K.Lu, H.Ke, J.Yang and L.Zhang(Oct 2012), “Research of
PUE attack based on Location”, 11th International Conference
on signal processing, pp. 1345-1348.
International Journal of Engineering Science and Computing, March 2017
5847
http://ijesc.org/