150
Views
11
CrossRef citations to date
0
Altmetric
Articles

Collaborative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks

, &

References

  • J. Mitola, and G. Q. Maguire, “Cognitive radio: making software radios more personal,” IEEE Pers. Commun., Vol. 6, pp. 13–8, Aug. 1999.
  • S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Sel. Areas Commun., Vol. 23, pp. 201–20, Feb. 2005.
  • I. F. Akyildiz, W. Y. Lee, M. C. Vuran, and S. Mohanty, “NeXt generation/dynamic spectrum access cognitive radio wireless networks: A survey,” Comput. Netw., Vol. 50, pp. 2127–59, Sept. 2006.
  • S. M. Mishra, A. Sahai, and R. W. Brodersen, “Cooperative sensing among cognitive radios,” in Proceedings of the IEEE International Conference on Communications, Istanbul, 2006, pp. 1658–63.
  • I. F. Akyildiz, B. F. Lo, and R. Balakrishnan, “Cooperative spectrum sensing in cognitive radio networks: A survey,” Phys. Commun., Vol. 4, pp. 40–62, Dec. 2011.
  • R. Chen, and J. M. Park, “Ensuring trustworthy spectrum sensing in cognitive radio networks,” in 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, Reston, VA, 2006, pp. 110–9.
  • S. Anand, Z. Jin, and K. Subbalakshmi, “An analytical model for primary user emulation attacks in cognitive radio networks.” in Proceedings of the IEEE International Dynamic Spectrum Access Networks, Chicago, IL, 2008, pp. 1–6.
  • R. Chen, J. M. Park, and J. H. Reed, “Defense against primary user emulation attacks in cognitive radio networks,” IEEE J. Sel. Area Commun., Vol. 26, pp. 25–37, Jan. 2008.
  • Z. Yuan, D. Niyato, H. Li, J. B. Song, and Z. Han, “Defeating primary user emulation attacks using belief propagation in cognitive radio networks,” IEEE J. Sel. Areas Commun., Vol. 30, pp. 1850–60, Nov. 2012.
  • C. Chen, H. Cheng, and Y. D. Yao, “Cooperative spectrum sensing in cognitive radio networks in the presence of the primary user emulation attack,” IEEE Trans. Wirel. Commun., Vol. 10, pp. 2135–41, Jul. 2011.
  • S. Chen, K. Zeng, and P. Mohapatra, “Hearing is believing: detecting wireless microphone emulation attacks in white space,” IEEE Trans. Mobile** Comput., Vol. 12, pp. 401–11, Mar. 2013.
  • C. Xin, and M. Song, “Detection of PUE attacks in cognitive radio networks based on signal activity pattern,” IEEE Trans. Mobile**Comput., Vol. 13, pp. 1022–34, May 2014.
  • M. Haghighat, and S. M. S. Sadough, “Cooperative spectrum sensing for cognitive radio networks in the presence of smart malicious users,” Int. J. Electron. Commun. (AEU**), Vol. 68, pp. 520–7, Jun. 2014.
  • M. Haghighat, and S. M. S. Sadough, “Smart primary user emulation in cognitive radio networks: defense strategies against radio-aware attacks and robust spectrum sensing,” Trans. Emerging Telecommun. Technol., Vol. 26, no. 9, pp. 1154–64, Sep 2015.
  • J. Ma, G. Zhao, and Y. Li, “Soft combination and detection for cooperative spectrum sensing in cognitive radio networks,” IEEE Trans. Wirel. Commun., Vol. 7, pp. 4502–7, Nov. 2008.
  • H. Urkowitz, “Energy detection of unknown deterministic signals,” Proc. IEEE, Vol. 55, pp. 523–31, Apr. 1976.
  • F. Digham, M. Alouini, and M. Simon, “On the energy detection of unknown signals over fading channels,” Proc. IEEE Int. Conf. Commun., Vol. 5, pp. 3575–9, May 2003.
  • P. K. Varshney, Distributed Detection and Data Fusion. New York: Springer-Verlag, 1997.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.