Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel

By: 
Ali Karimi; Abbas Taherpour; Danijela Cabric

In this paper, an agile smart attacker model in spectrum sensing of cognitive radio network (CRN) is introduced. This smart attacker does not make the channel busy all the time, instead it senses spectrum and when a primary user leaves, it occupies the spectrum by mimicking the signal characteristics of the primary users. To model such a smart attacker, we use a dependent Markov chain to model the primary user and primary user emulation attacker activities, simultaneously. We derive the transition probabilities for the assumed dependent Markov model. Then, the effect of the primary user and attacker traffic on a secondary user's throughput under Rayleigh flat fading channel is investigated and closed form expressions are derived for the average probability of detection and false alarm. Furthermore, the impact of this attacker on the performance of a CRN and the throughput of the secondary user network is studied analytically. We also derive a test rule based on the generalized likelihood ratio test, to detect the legitimate user from smart illegitimate user. In addition, launching primary user emulation attacker in the conventional and proposed smart attacking procedures are compared, where the results demonstrate that by using smart attacking, the deterioration in throughput of the secondary user's network is considerable. In fact, it is shown that under proper selection of the traffic parameters, the secondary user's network throughput may tend toward zero. Finally, the accuracy of the obtained results are analyzed and verified by the simulation results.

SPS Social Media

IEEE SPS Educational Resources

IEEE SPS Resource Center

IEEE SPS YouTube Channel