Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
194 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Detection Of Primary User Emulation Attack (PUEA) In Cognitive Radio Networks Using One-Class Classification (2106.10964v1)

Published 21 Jun 2021 in cs.NI and eess.SP

Abstract: Opportunistic usage of spectrum owned by licensed (or primary) users is the cornerstone on which the Cognitive Radio technology is built. Unlicensed (or secondary) users that thus use the spectrum rely opportunistically on spectrum sensing to determine the presence of primary user signal. In such a context, an attacker may mimic the behavior of a primary user (PU) to deceive the secondary users (SUs) into believing that a PU signal is present whereas it is not. Such an attack is known as the Primary User Emulation Attack (PUEA). A malicious user may launch a PUEA with the intention of grabbing the vacant bands for its own transmission. Another reason may be to simply disrupt the functioning of the Cognitive Radio Network (CRN). This work investigates the use of one-class classification for detecting PUEA in an infrastructure-based CRN. We opine that sensing data collected at the fusion center mainly for Collaborative Spectrum Sensing (CSS) can be exploited to characterize a PU signal. The PU signal features thus learned can aid in distinguishing a PU signal from a PU signal emulation. In particular, we investigate the use of one-class classification techniques, viz., Isolation Forest, Support Vector Machines (SVM), Minimum Covariance Determinant(MCD) and Local Outlier Factor(LOF) for detection of PUEA attacks. Simulation results support the validity of using one-class classification for detection of PUEA.

Summary

We haven't generated a summary for this paper yet.