Threats Advancement in Primary User Emulation Attack and Spectrum Sensing Data Falsification (SSDF) Attack in Cognitive Radio Network (CRN) for 5G Wireless Network Environment
Keywords:
CRN, Data Fusion, Radio Network, Wireless 5G, Secure, PUE, SSDF,Abstract
Primary User Emulation (PUE) attack and Spectrum Sensing Data Falsification (SSDF) attack on Data Fusion Centre and attack on Common Control Channel (CCC) is a serious security problems and need to be addressed in cognitive radio network environment. We are reviewing the recent advances of threats for the future 5th Generation (5G) wireless radio network from these attacks. Several existing security schemes have been proposed and discussed to overcome these attacks. We propose new security scheme that able to mitigate the attacks and provide security solutions. This scheme intended to mitigate the threats from the attacks in CRN and improve the future 5G network security.References
I. F. Akyildiz, B. F. Lo, and R. Balakrishnan, “Cooperative spectrum sensing in cognitive radio networks: A survey,” pp. 40–62, 2011.
E. Hossain and M. Hasan, “5G cellular: key enabling technologies and research challenges,” IEEE Instrumentation & Measurement Magazine, vol. 18, no. 3, pp. 11–21, 2015. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7108393
F. Boccardi, R. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, “Five disruptive technology directions for 5G,” IEEE Communications Magazine, vol. 52, no. 2, pp. 74–80, 2014.
N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. D. Renzo, “Safeguarding 5G Wireless Communication Networks Using Physical Layer Security,” IEEE Communications Magazine, vol. 53, no. 4, pp. 20–27, 2015.
C. Ma, J. Liu, X. Tian, H. Yu, Y. Cui, and X. Wang, “Interference Exploitation in D2D-enabled Cellular Networks: A Secrecy Perspective,” IEEE Transactions on Communications, vol. PP, no. 99, pp. 1–1, 2014. [Online]. Available:http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6981933
H. Yasuda, A. Kishida, J. Shen, Y. Morihiro, Y. Morioka, S. Suyama, A. Yamada, Y. Okumura, and T. Asai, “A study on moving cell in 5G cellular system,” in 2015 IEEE 82nd Vehicular Technology Conference, VTC Fall 2015-Proceedings, 2016.
M.-c. Chuang, M. Chang, and Y. S. Sun, “Resource Management Issues in 5G Ultra Dense Smallcell Networks,” International Conference on Information Networking(ICOIN),, no. 1, pp. 159–164, 2015.
S. Sun, M. Kadoch, and T. Ran, “Adaptive SON and Cognitive Smart LPN for 5G Heterogeneous Networks,” Mobile Networks and Applications, vol. 20, no. 6, pp. 745–755, 2015.
J. Mitola, “Cognitive radio: An integrated agent architecture for soft-ware defined radio,” Doctor of Technology, Royal Inst. Technol.(KTH), pp. 271–350., 2000.
S. Ma, Y. Peng, T. Wang, X. Gan, F. Yang, X. Wang, and M. Guizani, “Detecting the greedy spectrum occupancy threat in cognitive radio networks,” in 2014 IEEE International Conference on Communications, ICC2014, 2014, pp. 4939–4944.
P. Kaligineedi, M. Khabbazian, and V. K. Bhargava, “Malicious user detection in a cognitive radio cooperative sensing system,” IEEE Transactions on Wireless Communications, vol. 9, no. 8, pp. 2488–2497, 2010.
B. Naqvi, S. Murtaza, and B. Aslam, “A mitigation strategy against malicious Primary User Emulation Attack in Cognitive Radio networks,” Proceedings-2014 International Conference on Emerging Technologies, ICET2014, pp. 112–117, 2014.
N. Nguyen Thanh, P. Ciblat, A. T. Pham, and V. T. Nguyen, “Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks,” IEEE Transactions on Wireless Communications, vol. 14, no. 9, pp. 4981–4993, 2015.
R. Yu, Y. Zhang, Y. Liu, S. Gjessing, and M. Guizani, “Securing cognitive radio networks against primary user emulation attacks,” IEEE Network, vol. 29, no. 4, pp. 68–74, 2015.
R. K. Sharma and D. B. Rawat, “Advances on security threats and countermeasures for cognitive radio networks: A survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 2, pp. 1023–1043, 2015. [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0 84930508485&partnerID=40&md5=3ab0bb1c2a41172f887c90a02f1c9c45
Z. Jin, S. Anand, and K. P. Subbalakshmi, “Detecting primary user emulation attacks in dynamic spectrum access networks,” in IEEE International Conference on Communications, 2009.
J. Marinho, J. Granjal, and E. Monteiro, “A survey on security attacksand countermeasures with primary user detection in cognitive radio networks,” EURASIP Journal on Information Security, vol. 2015, no. 1, p. 4, 2015. [Online]. Available: http://www.scopus.com/inward/record.url?eid=2s2.0-84928387229&partnerID=tZOtx3y1
Y. Zou and S. J. Yoo, “A cooperative attack detection scheme for common control channel security in cognitive radio networks,” in International Conference on Ubiquitous and Future Networks, ICUFN, vol. 2015-Augus, 2015, pp. 606–611.
A. Araujo, J. Blesa, E. Romero, and D. Villanueva, “Security in cognitive wireless sensor networks. Challenges and open problems,” EURASIP Journal on Wireless Communications and Networking, vol. 2012, no. 1, p. 48, 2012. [Online]. Available: http://jwcn.eurasipjournals.springeropen.com/articles/10.1186/16871499-2012-48
Y. Hou and J. Reed, “Toward secure distributed spectrum sensing in cognitive radio networks,” IEEE Communications Magazine, vol. 46, no. 4, pp. 50–55, 2008. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4481340
J. Lu, P. Wei, and Z. Chen, “A scheme to counter SSDF attacks based on hard decision in cognitive radio networks,” WSEAS Transactions on Communications, vol. 13, pp. 242–248, 2014.
R. Chen, J.-M. J. Park, and K. Bian, “Robustness against byzantine failures in distributed spectrum sensing,” Computer Communications, vol. 35, no. 17, pp. 2115–2124, 2012.
C. Chen, M. Song, and C. Xin, “Copd: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks,” Wireless networks, vol. 20, no. 8, pp. 2521–2528, 2014.
A. A. Sharifi and M. J. M. Niya, “Defense against SSDF attack in cognitive radio networks: Attack-aware collaborative spectrum sensing approach,” IEEE Communications Letters, vol. 20, no. 1, pp. 93–96, 2016.
S. Bhattacharjee, R. Keitangnao, and N. Marchang, “Association rule mining for detection of colluding SSDF attack in Cognitive Radio Networks,” in 2016 International Conference on Computer Communication and Informatics, ICCCI 2016, 2016.
R. Amutha Priya, M. S. Nandhakumar, and M. Tech, “Attack prevention for spectrum sensing data falsification attacks in cognitive radio networks using arc.”
S. Ciftci and M. Torlak, “A comparison of energy for cognitive radios in fading environments,” Wireless Communications, vol. 68, no. 3, pp. 553–574, 2013.
Downloads
Published
How to Cite
Issue
Section
License
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.