A mitigation strategy against malicious primary user emulation attack in cognitive radio networks

B Naqvi, S Murtaza, B Aslam - 2014 International Conference …, 2014 - ieeexplore.ieee.org
The increasing demand of usable spectrum range startled the world of serious shortage in
coming years. Cognitive Radio technology emerged to solve this problem by allowing …

Primary user emulation attack and their mitigation strategies: A survey

B Naqvi, I Rashid, F Riaz… - 2013 2nd National …, 2013 - ieeexplore.ieee.org
Cognitive Radio emerged as a solution to solve the spectrum scarcity by allowing
unlicensed user to exist with the licensed users of the network whenever the licensed users …

Detection of primary user emulation attack in cognitive radio environment

KM Saifuddin, KF Reza, MANI Fahim… - 2017 6th International …, 2017 - ieeexplore.ieee.org
Cognitive Radio (CR) is a potential solution for radio spectrum limitation problem. It is a
promising technology for the ever-developing wireless networks in order to efficiently utilize …

A proactive elimination of primary user emulation attack in cognitive radio networks using intense explore algorithm

AC Sumathi, R Vidhyapriya… - … Conference on Computer …, 2015 - ieeexplore.ieee.org
In cognitive radio network, secondary users (without license) are allowed to access the
licensed spectrum if primary users (having license) are not present. A serious threat in …

An analytical model for primary user emulation attacks in cognitive radio networks

S Anand, Z Jin, KP Subbalakshmi - 2008 3rd IEEE Symposium …, 2008 - ieeexplore.ieee.org
In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognitive
radio network by primary user emulation (PUE). Most approaches in the literature on primary …

Improved detection of primary user emulation attacks in cognitive radio networks

F Jin, V Varadharajan… - … Networks and Applications …, 2015 - ieeexplore.ieee.org
Modern society heavily depends on wireless spectrum for communication purposes. With
the rapid increase in mobile devices and Internet of Things (IoT), the need for wireless …

Mitigating Primary User Emulation attacks in Cognitive Radio networks using advanced encryption standard

H Jiang, XJ Jing, S Sun, H Huang, Y Li… - … : Proceedings of the …, 2016 - books.google.com
Cognitive Radio (CR) can ease the problem of spectrum scarcity by allowing secondary
users to coexist with incumbent users in licensed spectrum bands, while it causes no …

Channel-based detection of primary user emulation attacks in cognitive radios

WL Chin, CL Tseng, CS Tsai, WC Kao… - 2012 IEEE 75th …, 2012 - ieeexplore.ieee.org
Recently, cognitive radio (CR) has recently emerged as a useful technology to improve the
efficiency of spectrum utilization. However, wireless networks are accompanied with an …

Countermeasures for primary user emulation attack: a comprehensive review

N Mishra, S Srivastava, SN Sharan - Wireless Personal Communications, 2020 - Springer
Cognitive radio (CR) is a flexible wireless network that can solve the scarcity and
underutilization problem of the spectrum by permitting unlicensed users to access licensed …

[引用][C] A survey on security issues and primary user emulation attack detection techniques in cognitive radio network

N Thalia, A Ingle, K Raut, M Tilak - International Journal of Computer Applications, 2016