An analytical model for primary user emulation attacks in cognitive radio networks

S. Anand, Z. Jin, K. P. Subbalakshmi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

140 Scopus citations

Abstract

In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognitive radio network by primary user emulation (PUE). Most approaches in the literature on primary user emulation attacks (PUEA) discuss mechanisms to deal with the attacks but not analytical models. Simulation studies and results from test beds have been presented but no analytical model relating the various parameters that could cause a PUE attack has been proposed and studied. We propose an analytical approach based on Fenton's approximation and Markov inequality and obtain a lower bound on the probability of a successful PUEA on a secondary user by a set of co-operating malicious users. We consider a fading wireless environment and discuss the various parameters that can affect the feasibility of a PUEA. We show that the probability of a successful PUEA increases with the distance between the primary transmitter and secondary users. This is the first analytical treatment to study the feasibility of a PUEA.

Original languageEnglish
Title of host publication2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2008
Pages76-81
Number of pages6
DOIs
StatePublished - 2008
Event2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2008 - Chicago, IL, United States
Duration: 14 Oct 200817 Oct 2008

Publication series

Name2008 IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2008

Conference

Conference2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2008
Country/TerritoryUnited States
CityChicago, IL
Period14/10/0817/10/08

Keywords

  • Cognitive radio networks malicious user
  • Primary user emulation attack

Fingerprint

Dive into the research topics of 'An analytical model for primary user emulation attacks in cognitive radio networks'. Together they form a unique fingerprint.

Cite this