TY - GEN
T1 - An analytical model for primary user emulation attacks in cognitive radio networks
AU - Anand, S.
AU - Jin, Z.
AU - Subbalakshmi, K. P.
PY - 2008
Y1 - 2008
N2 - In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognitive radio network by primary user emulation (PUE). Most approaches in the literature on primary user emulation attacks (PUEA) discuss mechanisms to deal with the attacks but not analytical models. Simulation studies and results from test beds have been presented but no analytical model relating the various parameters that could cause a PUE attack has been proposed and studied. We propose an analytical approach based on Fenton's approximation and Markov inequality and obtain a lower bound on the probability of a successful PUEA on a secondary user by a set of co-operating malicious users. We consider a fading wireless environment and discuss the various parameters that can affect the feasibility of a PUEA. We show that the probability of a successful PUEA increases with the distance between the primary transmitter and secondary users. This is the first analytical treatment to study the feasibility of a PUEA.
AB - In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognitive radio network by primary user emulation (PUE). Most approaches in the literature on primary user emulation attacks (PUEA) discuss mechanisms to deal with the attacks but not analytical models. Simulation studies and results from test beds have been presented but no analytical model relating the various parameters that could cause a PUE attack has been proposed and studied. We propose an analytical approach based on Fenton's approximation and Markov inequality and obtain a lower bound on the probability of a successful PUEA on a secondary user by a set of co-operating malicious users. We consider a fading wireless environment and discuss the various parameters that can affect the feasibility of a PUEA. We show that the probability of a successful PUEA increases with the distance between the primary transmitter and secondary users. This is the first analytical treatment to study the feasibility of a PUEA.
KW - Cognitive radio networks malicious user
KW - Primary user emulation attack
UR - http://www.scopus.com/inward/record.url?scp=57849167516&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=57849167516&partnerID=8YFLogxK
U2 - 10.1109/DYSPAN.2008.16
DO - 10.1109/DYSPAN.2008.16
M3 - Conference contribution
AN - SCOPUS:57849167516
SN - 9781424420179
T3 - 2008 IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2008
SP - 76
EP - 81
BT - 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2008
T2 - 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2008
Y2 - 14 October 2008 through 17 October 2008
ER -