Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel

Ali Karimi; Abbas Taherpour; Danijela Cabric

In this paper, an agile smart attacker model in spectrum sensing of cognitive radio network (CRN) is introduced. This smart attacker does not make the channel busy all the time, instead it senses spectrum and when a primary user leaves, it occupies the spectrum by mimicking the signal characteristics of the primary users. To model such a smart attacker, we use a dependent Markov chain to model the primary user and primary user emulation attacker activities, simultaneously. We derive the transition probabilities for the assumed dependent Markov model. Then, the effect of the primary user and attacker traffic on a secondary user's throughput under Rayleigh flat fading channel is investigated and closed form expressions are derived for the average probability of detection and false alarm. Furthermore, the impact of this attacker on the performance of a CRN and the throughput of the secondary user network is studied analytically. We also derive a test rule based on the generalized likelihood ratio test, to detect the legitimate user from smart illegitimate user. In addition, launching primary user emulation attacker in the conventional and proposed smart attacking procedures are compared, where the results demonstrate that by using smart attacking, the deterioration in throughput of the secondary user's network is considerable. In fact, it is shown that under proper selection of the traffic parameters, the secondary user's network throughput may tend toward zero. Finally, the accuracy of the obtained results are analyzed and verified by the simulation results.

SPS on Twitter

  • CALL FOR PAPERS: The IEEE/ACM Transactions on Audio, Speech, and Language Processing is now accepting submissions f…
  • DEADLINE EXTENDED: The IEEE Journal of Selected Topics in Signal Processing is now accepting submissions for a Spec…
  • Our Information Forensics and Security Webinar Series continues on Tuesday, 23 August when Dr. Anderson Rocha prese…
  • There is still time to submit your proposal to host the 2023 IEEE Workshop on Automatic Speech Recognition and Unde…
  • DEADLINE EXTENDED: The IEEE Transactions on Multimedia is now accepting submissions for a Special Issue on Perceivi…

SPS Videos

Signal Processing in Home Assistants


Multimedia Forensics

Careers in Signal Processing             


Under the Radar