Threats Advancement in Primary User Emulation Attack and Spectrum Sensing Data Falsification (SSDF) Attack in Cognitive Radio Network (CRN) for 5G Wireless Network Environment

Authors

  • A.H. Fauzi Faculty of Computer Science and Information Technology, Universiti Malaysia Sarawak, Sarawak, Malaysia.
  • A.S. Khan Faculty of Computer Science and Information Technology, Universiti Malaysia Sarawak, Sarawak, Malaysia.

Keywords:

CRN, Data Fusion, Radio Network, Wireless 5G, Secure, PUE, SSDF,

Abstract

Primary User Emulation (PUE) attack and Spectrum Sensing Data Falsification (SSDF) attack on Data Fusion Centre and attack on Common Control Channel (CCC) is a serious security problems and need to be addressed in cognitive radio network environment. We are reviewing the recent advances of threats for the future 5th Generation (5G) wireless radio network from these attacks. Several existing security schemes have been proposed and discussed to overcome these attacks. We propose new security scheme that able to mitigate the attacks and provide security solutions. This scheme intended to mitigate the threats from the attacks in CRN and improve the future 5G network security.

Author Biography

A.S. Khan, Faculty of Computer Science and Information Technology, Universiti Malaysia Sarawak, Sarawak, Malaysia.

Khan

References

I. F. Akyildiz, B. F. Lo, and R. Balakrishnan, “Cooperative spectrum sensing in cognitive radio networks: A survey,” pp. 40–62, 2011.

E. Hossain and M. Hasan, “5G cellular: key enabling technologies and research challenges,” IEEE Instrumentation & Measurement Magazine, vol. 18, no. 3, pp. 11–21, 2015. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7108393

F. Boccardi, R. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, “Five disruptive technology directions for 5G,” IEEE Communications Magazine, vol. 52, no. 2, pp. 74–80, 2014.

N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. D. Renzo, “Safeguarding 5G Wireless Communication Networks Using Physical Layer Security,” IEEE Communications Magazine, vol. 53, no. 4, pp. 20–27, 2015.

C. Ma, J. Liu, X. Tian, H. Yu, Y. Cui, and X. Wang, “Interference Exploitation in D2D-enabled Cellular Networks: A Secrecy Perspective,” IEEE Transactions on Communications, vol. PP, no. 99, pp. 1–1, 2014. [Online]. Available:http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6981933

H. Yasuda, A. Kishida, J. Shen, Y. Morihiro, Y. Morioka, S. Suyama, A. Yamada, Y. Okumura, and T. Asai, “A study on moving cell in 5G cellular system,” in 2015 IEEE 82nd Vehicular Technology Conference, VTC Fall 2015-Proceedings, 2016.

M.-c. Chuang, M. Chang, and Y. S. Sun, “Resource Management Issues in 5G Ultra Dense Smallcell Networks,” International Conference on Information Networking(ICOIN),, no. 1, pp. 159–164, 2015.

S. Sun, M. Kadoch, and T. Ran, “Adaptive SON and Cognitive Smart LPN for 5G Heterogeneous Networks,” Mobile Networks and Applications, vol. 20, no. 6, pp. 745–755, 2015.

J. Mitola, “Cognitive radio: An integrated agent architecture for soft-ware defined radio,” Doctor of Technology, Royal Inst. Technol.(KTH), pp. 271–350., 2000.

S. Ma, Y. Peng, T. Wang, X. Gan, F. Yang, X. Wang, and M. Guizani, “Detecting the greedy spectrum occupancy threat in cognitive radio networks,” in 2014 IEEE International Conference on Communications, ICC2014, 2014, pp. 4939–4944.

P. Kaligineedi, M. Khabbazian, and V. K. Bhargava, “Malicious user detection in a cognitive radio cooperative sensing system,” IEEE Transactions on Wireless Communications, vol. 9, no. 8, pp. 2488–2497, 2010.

B. Naqvi, S. Murtaza, and B. Aslam, “A mitigation strategy against malicious Primary User Emulation Attack in Cognitive Radio networks,” Proceedings-2014 International Conference on Emerging Technologies, ICET2014, pp. 112–117, 2014.

N. Nguyen Thanh, P. Ciblat, A. T. Pham, and V. T. Nguyen, “Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks,” IEEE Transactions on Wireless Communications, vol. 14, no. 9, pp. 4981–4993, 2015.

R. Yu, Y. Zhang, Y. Liu, S. Gjessing, and M. Guizani, “Securing cognitive radio networks against primary user emulation attacks,” IEEE Network, vol. 29, no. 4, pp. 68–74, 2015.

R. K. Sharma and D. B. Rawat, “Advances on security threats and countermeasures for cognitive radio networks: A survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 2, pp. 1023–1043, 2015. [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0 84930508485&partnerID=40&md5=3ab0bb1c2a41172f887c90a02f1c9c45

Z. Jin, S. Anand, and K. P. Subbalakshmi, “Detecting primary user emulation attacks in dynamic spectrum access networks,” in IEEE International Conference on Communications, 2009.

J. Marinho, J. Granjal, and E. Monteiro, “A survey on security attacksand countermeasures with primary user detection in cognitive radio networks,” EURASIP Journal on Information Security, vol. 2015, no. 1, p. 4, 2015. [Online]. Available: http://www.scopus.com/inward/record.url?eid=2s2.0-84928387229&partnerID=tZOtx3y1

Y. Zou and S. J. Yoo, “A cooperative attack detection scheme for common control channel security in cognitive radio networks,” in International Conference on Ubiquitous and Future Networks, ICUFN, vol. 2015-Augus, 2015, pp. 606–611.

A. Araujo, J. Blesa, E. Romero, and D. Villanueva, “Security in cognitive wireless sensor networks. Challenges and open problems,” EURASIP Journal on Wireless Communications and Networking, vol. 2012, no. 1, p. 48, 2012. [Online]. Available: http://jwcn.eurasipjournals.springeropen.com/articles/10.1186/16871499-2012-48

Y. Hou and J. Reed, “Toward secure distributed spectrum sensing in cognitive radio networks,” IEEE Communications Magazine, vol. 46, no. 4, pp. 50–55, 2008. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4481340

J. Lu, P. Wei, and Z. Chen, “A scheme to counter SSDF attacks based on hard decision in cognitive radio networks,” WSEAS Transactions on Communications, vol. 13, pp. 242–248, 2014.

R. Chen, J.-M. J. Park, and K. Bian, “Robustness against byzantine failures in distributed spectrum sensing,” Computer Communications, vol. 35, no. 17, pp. 2115–2124, 2012.

C. Chen, M. Song, and C. Xin, “Copd: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks,” Wireless networks, vol. 20, no. 8, pp. 2521–2528, 2014.

A. A. Sharifi and M. J. M. Niya, “Defense against SSDF attack in cognitive radio networks: Attack-aware collaborative spectrum sensing approach,” IEEE Communications Letters, vol. 20, no. 1, pp. 93–96, 2016.

S. Bhattacharjee, R. Keitangnao, and N. Marchang, “Association rule mining for detection of colluding SSDF attack in Cognitive Radio Networks,” in 2016 International Conference on Computer Communication and Informatics, ICCCI 2016, 2016.

R. Amutha Priya, M. S. Nandhakumar, and M. Tech, “Attack prevention for spectrum sensing data falsification attacks in cognitive radio networks using arc.”

S. Ciftci and M. Torlak, “A comparison of energy for cognitive radios in fading environments,” Wireless Communications, vol. 68, no. 3, pp. 553–574, 2013.

Downloads

Published

2017-09-15

How to Cite

Fauzi, A., & Khan, A. (2017). Threats Advancement in Primary User Emulation Attack and Spectrum Sensing Data Falsification (SSDF) Attack in Cognitive Radio Network (CRN) for 5G Wireless Network Environment. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-10), 179–183. Retrieved from https://jtec.utem.edu.my/jtec/article/view/2723