Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel

Ali Karimi; Abbas Taherpour; Danijela Cabric

In this paper, an agile smart attacker model in spectrum sensing of cognitive radio network (CRN) is introduced. This smart attacker does not make the channel busy all the time, instead it senses spectrum and when a primary user leaves, it occupies the spectrum by mimicking the signal characteristics of the primary users. To model such a smart attacker, we use a dependent Markov chain to model the primary user and primary user emulation attacker activities, simultaneously. We derive the transition probabilities for the assumed dependent Markov model. Then, the effect of the primary user and attacker traffic on a secondary user's throughput under Rayleigh flat fading channel is investigated and closed form expressions are derived for the average probability of detection and false alarm. Furthermore, the impact of this attacker on the performance of a CRN and the throughput of the secondary user network is studied analytically. We also derive a test rule based on the generalized likelihood ratio test, to detect the legitimate user from smart illegitimate user. In addition, launching primary user emulation attacker in the conventional and proposed smart attacking procedures are compared, where the results demonstrate that by using smart attacking, the deterioration in throughput of the secondary user's network is considerable. In fact, it is shown that under proper selection of the traffic parameters, the secondary user's network throughput may tend toward zero. Finally, the accuracy of the obtained results are analyzed and verified by the simulation results.

SPS on Twitter

  • now accepting submissions for special sessions, tutorials, and papers! The conference is set for June 2…
  • DEADLINE EXTENDED: The IEEE Journal of Selected Topics in Signal Processing is now accepting papers for a Special I…
  • NEW WEBINAR: Join us on Friday, 14 August at 11:00 AM ET for the 2021 SPS Membership Preview! Society leadership wi…
  • CALL FOR PAPERS: The 2020 IEEE Workshop on Spoken Language Technology is now accepting papers for its January 2021…
  • CALL FOR PAPERS: The 2020 IEEE International Workshop on Information Forensics and Security is now accepting submis…

SPS Videos

Signal Processing in Home Assistants


Multimedia Forensics

Careers in Signal Processing             


Under the Radar