A Survey of Various Defense Techniques to Detect Primary User Emulation Attacks

Authors

  • Abhilasha Singh Department of Electrical, Electronics and Communication Engineering, ITM University Author
  • Anita Sharma Department of Electrical, Electronics and Communication Engineering, ITM University Author

Keywords:

Cognitive Radio, Spectrum Sensing, Primary User Emulation Attack

Abstract

With the advancement in wireless technology, there is an increasing problem of spectrum scarcity. To resolve this issue, a technology called Cognitive Radio (CR), based on Joseph Mitola’s Software Defined Radio (SDR) was introduced, in which the secondary users can sense the spectrum and utilize the licensed bands when the spectrum is not being utilized by the primary user. Because of its wireless nature, this device attracts various security threats common to all wireless technologies. In addition to these, there are various security concerns specific to CR, which these networks are vulnerable to. One of the most dominant threats among these is the Primary User Emulation Attack (PUEA). In this paper, our main purpose is to list out the various security threats faced by the cognitive radio networks and in particular, PUEA. Further, we enlist the different defense techniques which can combat the PUE attacks and ultimately compare these defense techniques on various parameters.

References

Downloads

Published

2014-04-30

Issue

Section

Articles

How to Cite

A Survey of Various Defense Techniques to Detect Primary User Emulation Attacks. (2014). International Journal of Current Engineering and Technology, 4(2), 900-908. https://ijcet.evegenis.org/index.php/ijcet/article/view/637