LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Online Primary User Emulation Attacks in Cognitive Radio Networks Using Thompson Sampling

Photo from wikipedia

Spectrum sensing is one of the main components of the cognitive radio (CR) system, based on which secondary users (SUs) can get access to spectrum holes available. On the other… Click to show full abstract

Spectrum sensing is one of the main components of the cognitive radio (CR) system, based on which secondary users (SUs) can get access to spectrum holes available. On the other hand, a malicious adversary can also attack the primary user (PU) system and the legitimate CR system via spectrum sensing, which can lead to serious security issue for both systems. In this article, we study an online attacking strategy, referred to as PU emulation attacker (PEA), which transmits forged PU signals over available channels to deteriorate the spectrum sensing performance of the SUs. We propose an online learning based attacking scheme for both the single attacker and the multiple-attacker cases, and analyze the regret upper bound of the proposed algorithm. The proposed PEA strategy can work in both stationary and non-stationary CR networks where the statistical characteristics of channels and the access strategy of SUs change over time. Numerical results show that it is more efficient than others in two different performance metrics: successful accesses of SUs and effective attacks of PEAs. Our proposal raises an interesting open question on how to develop CR networks with security guarantee.

Keywords: online primary; spectrum sensing; cognitive radio; primary user; emulation

Journal Title: IEEE Transactions on Wireless Communications
Year Published: 2021

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.