Evaluating physical-layer security for secondary users in cognitive radio systems with attackers

Danda B. Rawat, Olumide Malomo, Chandra Bajracharya, Min Song

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Cognitive radio network (CRN) is regarded as an emerging technology for better spectrum efficiency where unlicensed secondary users (SUs) sense RF spectrum to find idle channels and access them opportunistically without causing any harmful interference to licensed primary users (PUs). However, RF spectrum sensing and sharing along with reconfigurable capabilities of SUs bring severe security vulnerabilities in the network. In this paper, we analyze physical-layer security (secrecy rates) of SUs in CRN in the presence of eavesdroppers, jammers and PU emulators (PUEs) where SUs compete not only with jammers and eavesdroppers who are trying to reduce SU's secrecy rates but also against PUEs who are trying to compel the SUs from their current channel by imitating the behavior of PUs. In addition, a legitimate SU competes with other SUs with a sharing attitude for dynamic spectrum access to gain a high secrecy rate, however, the malicious users (i.e., attackers) attempt to abuse the channels egotistically. The main contribution of this work is the design of a game theoretic approach to maximize utilities (that is proportional to secrecy rates) of SUs in the presence of eavesdroppers, jammers and PUEs. Furthermore, SUs use signal energy and cyclostationary feature detection along with location verification technique to detect PUEs. As the proposed approach is generic and considers different attackers, it can be particularized to a situation with eavesdroppers only, jammers only or PUEs only while evaluating physical-layer security of SUs in CRN. We evaluate the performance of the proposed approach using results obtained from simulations. The results show that the proposed approach outperforms other existing methods.

Original languageEnglish
Title of host publicationMILCOM 2017 - 2017 IEEE Military Communications Conference
Pages659-665
Number of pages7
ISBN (Electronic)9781538605950
DOIs
StatePublished - 7 Dec 2017
Event2017 IEEE Military Communications Conference, MILCOM 2017 - Baltimore, United States
Duration: 23 Oct 201725 Oct 2017

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM
Volume2017-October

Conference

Conference2017 IEEE Military Communications Conference, MILCOM 2017
Country/TerritoryUnited States
CityBaltimore
Period23/10/1725/10/17

Fingerprint

Dive into the research topics of 'Evaluating physical-layer security for secondary users in cognitive radio systems with attackers'. Together they form a unique fingerprint.

Cite this