Securing cognitive radio networks against primary user emulation attacks
المؤلف | Yu, Rong |
المؤلف | Zhang, Yan |
المؤلف | Liu, Yi |
المؤلف | Gjessing, Stein |
المؤلف | Guizani, Mohsen |
تاريخ الإتاحة | 2022-11-10T09:47:23Z |
تاريخ النشر | 2015 |
اسم المنشور | IEEE Network |
المصدر | Scopus |
المصدر | 2-s2.0-84938361224 |
الملخص | CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security is a very important but not well addressed issue in CR networks. In this article we focus on security problems arising from PUE attacks in CR networks. We present a comprehensive introduction to PUE attacks, from the attacking rationale and its impact on CR networks, to detection and defense approaches. In order to secure CR networks against PUE attacks, a two-level database-assisted detection approach is proposed to detect such attacks. Energy detection and location verification are combined for fast and reliable detection. An admission control based defense approach is proposed to mitigate the performance degradation of a CR network under a PUE attack. Illustrative results are presented to demonstrate the effectiveness of the proposed detection and defense approaches. 2015 IEEE. |
اللغة | en |
الناشر | Institute of Electrical and Electronics Engineers Inc. |
الموضوع | Balloons Cognitive radio Secure communication Wireless networks Wireless telecommunication systems Cognitive radio network Detection approach Location verification Next-generation wireless network Performance degradation Primary user emulation attack (PUEA) Reliable detection Wireless application Next generation networks |
النوع | Article |
الصفحات | 68-74 |
رقم العدد | 4 |
رقم المجلد | 29 |
الملفات في هذه التسجيلة
الملفات | الحجم | الصيغة | العرض |
---|---|---|---|
لا توجد ملفات لها صلة بهذه التسجيلة. |
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2402 items ]