A survey on security attacks and countermeasures with primary user detection in cognitive radio networks

J Marinho, J Granjal, E Monteiro - EURASIP Journal on Information …, 2015 - Springer
Currently, there are several ongoing efforts for the definition of new regulation policies,
paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this …

To mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches: Towards next generation green IoT

H Mazumdar, A Kaushik, HA Gohel - Engineering Reports, 2023 - Wiley Online Library
The growing cognizance of spectrum scarcity has become a more significant concern in
wireless radio communications. Due to the exponential growth of data transmission in …

Malicious users control and management in cognitive radio networks with priority queues

SD Okegbile, BT Maharaj… - 2020 IEEE 92nd Vehicular …, 2020 - ieeexplore.ieee.org
Malicious users (MUs) have the tendency to disrupt the activities of honest users in the
network if not properly controlled. In a massive cognitive radio network (CRN) with priority …

Threats Advancement in Primary User Emulation Attack and Spectrum Sensing Data Falsification (SSDF) Attack in Cognitive Radio Network (CRN) for 5G Wireless …

AH Fauzi, AS Khan - Journal of Telecommunication, Electronic …, 2017 - jtec.utem.edu.my
Abstract Primary User Emulation (PUE) attack and Spectrum Sensing Data Falsification
(SSDF) attack on Data Fusion Centre and attack on Common Control Channel (CCC) is a …