SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 5, October 2020, pp. 5385~5391
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i5.pp5385-5391  5385
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Error rate detection due to primary user emulation attack in
cognitive radio networks
N. Armi1
, W. Gharibi2
, W. Z. Khan3
1
Indonesian Institute of Sciences, Research Center for Electronics and Telecommunication, Indonesia
1
Department of Electrical Engineering, Telkom University, Indonesia
2
Department of Computer Science and Electrical Engineering, University of Missouri-Kansas City, United State
3
Department of Computer and Network Engineering, Jazan University, Kingdom of Saudi Arabia
Article Info ABSTRACT
Article history:
Received Aug 31, 2019
Revised Apr 16, 2020
Accepted Apr 29, 2020
Security threat is a crucial issue in cognitive radio network (CRN).
These threats come from physical layer, data link layer, network layer,
transport layer, and application layer. Hence, security system to all layers in
CRN has a responsibility to protect the communication between among
Secondary User (SU) or to maintain valid detection to the presence of
Primary User (PU) signals. Primary User Emulation Attack (PUEA) is
a threat on physical layer where malicious user emulates PU signal.
This paper studies the effect of exclusive region of PUEA in CRN. We take
two setting of exclusive distances, 30m and 50m, where this radius of area is
free of malicious users. Probability of false alarm (Pf) and miss detection
(Pm) are used to evaluate the performances. The result shows that increasing
distance of exclusive region may decrease Pf and Pm.
Keywords:
Cognitive radio
False detection
Malicious user
Miss detection
Spectrum sensing Copyright Β© 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Nasrullah Armi,
Research Center for Electronics and Telecommunication,
Indonesian Institute of Sciences,
Cisitu street, No. 21/154 D, Bandung 40135, Indonesia.
Email: nasrullah.armi@gmail.com
1. INTRODUCTION
Besides sensing and access over imperfect channel [1-3], security threat is crucial issue in cognitive
radio. It comes from most layer such as physical, data link, network, transport, or application layer [4-10].
Unlike traditional wireless networks where operates in fixed spectrum, cognitive radio networks operate in
dynamic spectrum where user opportunistically access available spectrum channel with prior sensing [11-14].
Hence, various factors must be taken into consideration since cognitive radio (CR) deals with the utilization
of unused spectrum in opportunistic manner with the unscheduled appearance of primary users [15].
Physical layer is the lowest level which provides an interface to the medium. Security on physical
layer is related to some possible attack such as intentional jamming attack, primary receiver jamming attack,
primary user emulation attack, and overlapping secondary user attack. Intentional jamming attack means that
malicious user transmit signal intentionally in the existing license bands and jams primary and other
secondary user. The worst case is occurred when malicious users attack in one geographical area and move to
another area very quickly without being identified. The unknown location of primary user is a benefit for
attackers to launch primary receiver jamming attack. The attacker may shift to the primary receiver and
requests transmission from secondary users. This case causes interference to primary receiver.
In CRN, multiple secondary networks perform sensing for available spectrum to access at the same
region with the same time. The transmission from malicious users in one network may cause interference to
the primary and secondary users from the other networks. This threat is known as overlapping secondary user
attack where a malicious user may also imitate the primary user. The fake primary signal is considered as
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5385 - 5391
5386
original signal by secondary user. Hence, secondary user refrain from transmission or terminate the ongoing
communication and release the frequency spectrum [16]. This fake signal transmitted by malicious user is
known as primary user emulation attack.
Primary user emulation attack is a threat on physical layer. It harms SU to achieve the correct
sensing outcome. Malicious user attacks signal detection by transmitting signal whose has the same
characteristic as primary signal. It causes SU has a difficulty to identify vacant spectrum. Malicious user does
not utilize those vacant bands for its own communication purposes. They only transmit fake primary signal in
vacant bands to obstruct SU from detecting original one.
The existing works related to this issue have been done. Smart attacker was introduced in [17].
The authors use Markov chain technique to model the activities of attackers. Then, energy detection of
attackers was investigated in [18]. The authors used NI-USRP 2922 devices to derive probability of detection
and false alarm. Chen et al in [19] investigated the attackers which is considered as interference to result
inaccurate position of primary user location. The authors implemented directional antenna to explore position
of primary transmitter. The used parameter like angle, arrival time, and strength of signal is explored to
detect an accurate position. An analytical of successful probability to attact primary user location was firstly
studied by authors in [20]. Fading was considered into account to calculate successful probability of
attackers and define a lower limit by applying Fenton’s and Markov approximation, respectively.
CR signaling was introduced by authors in [21] to ease accessing available spectrum efficiently.
The investigation proved that the framework is able to maximize SU transmission rate with low probility of
miss detection and probability of false alarm. Using the statistical characteristic of users to prevent PUEA
issue was proposed by Ghaznavi et al [22].
The used method on this article was well proved that its technique is able to increase the detection
performance compared with the existing works. Investigation of primary user attackers with blind
information of users was presented by authors in [23]. They investigated miss detection rate both
theoretically and experimentally different number of SU. However, the disavadvantages of this study such as
ignoring probability of false detection and the received power performance performance were not clearly
presented. The technique to reduce the impact of attackers to primary user due to selfish and malicious users
was introduced by authors in [24]. They implemented game strategy to counter the attacker and reduce
the error rate detection of primary user. The effect of number of attackers to the performance of detection in
PUEA was studied in [25, 26] with Neyman Pearson decision tecnique. They concluded that increasing
number of attacker may decrease the performance.
This paper explores more performance affected by radius of exclusive region. Two different radius
of exclusive region values is considered with two hypothesis of Neyman Pearson technique to decide
the existence of primary user. Error rates detection such as false alarm and miss detection are used to present
the derived performance evaluation. The rest of the paper is organized as follows. Section 2 discusses system
and numerical model considered in the simulation. The derived result and discussion are presented in
section 3. Finally, conclusion is taken briefly in Section 4.
2. PRIMARY USER EMULATION ATTACK MODEL
The major issue in primary signal detection is how SUs can identify fake primary signal.
Primary user emulation attack (PUEA) is one threat on physical layer in cognitive radio network where
attacker transmit fake primary signal. Two types of well-known PUEA is selfish PUEA and malicious
PUEA. Attackers maximize its bandwidth by preventing other SUs to use the spectrum bands in selfish
PUEA. Attackers transmit signal to resemble the primary signal. Whereas the aim of attackers in malicious
PUEA is obstructing SU to identify the vacant spectrum bands, so that they cannot use those bands. Two type
of errors caused by PUEA are probability of false alarm (Pf) and miss detection (Pm). These two detection
errors are used as main parameter for performance evaluation.
Figure 1 describes a brief concept of how attackers interfere primary user detection. As figure,
there are a number of attackers located on a circular network with radius R and single secondary user located
at the center. Each attackers transmit signal among each other. The attackers (M) are distributed randomly
covering secondary user with a certain radius R. These attackers transmit signal independently. On the other
side, secondary user is located at the center of network with the distance Dp from primary transmitter.
Fixed location of primary transmitter possibly to transmit signal with power Pt. Meanwhile, secondary user is
free attackers at radius Ro where this region is known as exlusive area of secondary user.
Int J Elec & Comp Eng ISSN: 2088-8708 
Error rate detection due to primary user emulation attack in cognitive radio networks (N. Armi)
5387
R
Ro
Dp
Secondary user
Malicious user
Primary transmitter
Figure 1. Primary user emulation attack (PUEA) model
As described in figure, we have a number of attackers located at (π‘Ÿπ‘—, πœƒπ‘—) where j is value with range
range 1≀j≀M. Then probability density function (PDF) of π‘Ÿπ‘— is derived as follows [10].
𝑝(π‘Ÿπ‘—) =
2π‘Ÿ 𝑗
𝑅2βˆ’π‘…π‘œ2 π‘…π‘œ ≀ π‘Ÿ ≀ 𝑅 (1)
where πœƒπ‘— is equally distributed at range (βˆ’πœ‹, πœ‹). Then, the received power of transmitted signal from primary
transmitter is derived as bellows:
π‘ƒπ‘Ÿ(𝑝)
= 𝑃𝑑 𝑑 𝑝
βˆ’2
𝐺 𝑝
2
(2)
where 𝐺𝑝2
= 10
πœ€π‘
10, πœ€π‘~𝑁(0, πœŽπ‘2). Since 𝑃𝑑 and 𝑑 𝑝 have a fixed values, then the PDF of π‘π‘Ÿ(𝑝)
uses a log
normal distribution and can be calculated as follows:
π‘ƒπ‘Ÿ(𝑝)(𝛾) =
1
π›Ύπ΄πœŽ π‘βˆš2πœ‹
𝑒π‘₯𝑝 {
(10π‘™π‘œπ‘”10 π›Ύβˆ’πœ‡ 𝑝)2
2𝜎 𝑝
2 } (3)
where 𝐴 =
𝑙𝑛10
10
and πœ‡ 𝑝 = 10π‘™π‘œπ‘”10 𝑃𝑑 βˆ’ 20π‘™π‘œπ‘”10 𝑑 𝑝
The total power received from attackers at the secondary user is derived by:
π‘ƒπ‘Ÿ(π‘š)
= βˆ‘ π‘ƒπ‘š 𝐷𝑗
βˆ’4
𝐺𝑗
2𝑀
𝑗=1 (4)
where 𝐷𝑗 and 𝐺𝑗
2
are the distance and shadowing between 𝑗 π‘‘β„Ž
malicious user and secondary user,
respectively.
𝐺𝑗
2
= 10
πœ€ 𝑗
10 where πœ€π‘—~𝑁(0, 𝜎2
π‘š). The right side of equation (4) above is log normally distributed
random variable of the form 10
πœ” 𝑗
10 where πœ”π‘—~𝑁(πœ‡ 𝑗, 𝜎2
π‘š), where πœ‡ 𝑗 is derived by the following equation:
πœ‡ 𝑗 = 10π‘™π‘œπ‘”10 π‘ƒπ‘š βˆ’ 40π‘™π‘œπ‘”10 𝐷𝑗 (5)
The PDF of π‘π‘Ÿ
π‘š
considered as positions of all attackers can be derived as bellows:
𝑃π‘₯|π‘Ÿ
(π‘š)
=
1
π‘₯𝐴𝜎 π‘€βˆš2πœ‹
𝑒π‘₯𝑝 {
(10π‘™π‘œπ‘”10 π‘₯βˆ’πœ‡ 𝑀)2
2𝜎 𝑀
2 } (6)
π‘Ÿ is defined as the vector elements of π‘Ÿ1, π‘Ÿ2,…, π‘Ÿ π‘š. Then, 𝜎2
𝑀 and πœ‡ 𝑀 are derived as the equation bellows:
𝜎 𝑀
2
=
1
𝐴2 𝑙𝑛 [1 +
(𝑒 𝐴2 𝜎 π‘š
2
βˆ’1) βˆ‘ 𝑒
2π΄πœ‡ 𝑗𝑀
𝑗=1
(βˆ‘ 𝑒
π΄πœ‡ 𝑗𝑀
𝑗=1 )
2 ] (7)
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5385 - 5391
5388
πœ‡ 𝑀 =
1
𝐴
𝑙𝑛(βˆ‘ 𝑒 π΄πœ‡ 𝑗𝑀
𝑗=1 ) βˆ’
𝐴
2
(𝜎 𝑀
2
βˆ’ 𝜎 π‘š
2) (8)
The PDF of the received power from attackers is calculated as follows:
𝑃 π‘š
(π‘₯) = ∫ ∏ 𝑃π‘₯|π‘Ÿ
(π‘š)
(π‘₯|π‘Ÿ)𝑝(π‘Ÿπ‘—)π‘‘π‘Ÿπ‘—
𝑀
𝑗=1
𝑅
π‘…π‘œ
(9)
Futhermore, calculation of the receiver power from attacker uses log normally distributed random
variable with πœ‡ π‘₯ and 𝜎π‘₯ as bellows:
𝑝 π‘š
(π‘₯) =
1
π‘₯𝐴𝜎 π‘₯√2πœ‹
𝑒π‘₯𝑝 {βˆ’
(10π‘™π‘œπ‘”10 π‘₯βˆ’πœ‡ π‘₯)2
2𝜎 π‘₯
2 } (10)
The values of πœ‡ π‘₯ and 𝜎π‘₯ can be derived when π‘π‘Ÿ
π‘š
is considered as a log normally distributed
random variable as written in equations bellows:
𝜎π‘₯
2
=
1
𝐴2 (𝑙𝑛𝐸 [(π‘π‘Ÿ
(π‘š)
)
2
] βˆ’ 2𝑙𝑛𝐸[π‘π‘Ÿ
(π‘š)
]) (11)
πœ‡ π‘₯ =
1
𝐴
(2𝑙𝑛𝐸[π‘π‘Ÿ
(π‘š)
]) βˆ’
1
2
𝑙𝑛𝐸 [(π‘π‘Ÿ
(π‘š)
)
2
] (12)
From (6), the values of π‘π‘Ÿ
π‘š
and 𝐸[π‘π‘Ÿ
π‘š
|π‘Ÿ] is derived by the following equation:
𝐸[π‘π‘Ÿ
(π‘š)
|π‘Ÿ] = 𝑀𝑒 π΄πœ‡ 𝑗 βˆ— 𝑒
𝐴2 𝜎 π‘š
2
2 (13)
where
πœ‡ 𝑗 = 10π‘™π‘œπ‘”10(π‘ƒπ‘š βˆ— 𝐷𝑗
βˆ’4
) (14)
𝑒 π΄πœ‡ 𝑗=𝑒 𝐴10π‘™π‘œπ‘”10(𝑃 π‘šβˆ—π· 𝑗
βˆ’4)
= π‘ƒπ‘š βˆ— 𝐷𝑗
βˆ’4
(15)
Hence,
𝐸[π‘π‘Ÿ
(π‘š)
|π‘Ÿ] = π‘€π‘ƒπ‘š βˆ— 𝐷𝑗
βˆ’4
βˆ— 𝑒
𝐴2 𝜎 π‘š
2
2 (16)
By integrating equation over range of π‘Ÿ1, π‘Ÿ2,…, π‘Ÿ 𝑀, it becomes:
𝐸[π‘ƒπ‘Ÿ
(π‘š)
] = ∫ 𝑀𝑝(π‘Ÿπ‘—)π‘ƒπ‘š βˆ— 𝐷𝑗
βˆ’4
βˆ— 𝑒
𝐴2 𝜎 π‘š
2
2 π‘‘π‘Ÿπ‘—
𝑅
π‘…π‘œ
= ∫ π‘€π‘ƒπ‘š 𝑒
𝐴2 𝜎 π‘š
2
2 ∫
2π‘Ÿ 𝑗
𝑅2βˆ’π‘…π‘œ2
𝑅
π‘…π‘œ
𝑅
π‘…π‘œ
βˆ— 𝐷𝑗
βˆ’4
π‘‘π‘Ÿπ‘— (17)
If secondary user is located at coordinate (0, 0), meaning that 𝐷𝑗 = π‘Ÿπ‘—
𝐸[π‘ƒπ‘Ÿ
(π‘š)
] = π‘€π‘ƒπ‘š 𝑒
𝐴2 𝜎 π‘š
2
2 ∫
2π‘Ÿ 𝑗
𝑅2βˆ’π‘…π‘œ2 βˆ—
1
π‘Ÿ 𝑗
4 π‘‘π‘Ÿπ‘—
𝑅
π‘…π‘œ
𝐸[π‘ƒπ‘Ÿ
(π‘š)
] =
𝑀𝑃 π‘š
𝑅2 π‘…π‘œ2 𝑒
𝐴2 𝜎 π‘š
2
2 (18)
Using decision criterion of Newman Pearson, we assume that M1 as primary signal transmission in
progress, and M2 is emulation attack in progress. This study implements two error rate for performance
evaluation, those are false alarm and miss detection. False detection means mistake detection by secondary
user where malicious user as attacker signal is detected as primary signal. Meanwhile, miss detection means
secondary user detect primary user signal as attacker signal. Hence, secondary user is unaware and loss an
opportunity to access available spectrum. The decision variable is derived by including the received signal
power as follows:
Int J Elec & Comp Eng ISSN: 2088-8708 
Error rate detection due to primary user emulation attack in cognitive radio networks (N. Armi)
5389
Ξ› =
𝑝 π‘š(π‘₯)
𝑝(𝑝 π‘Ÿ)(π‘₯)
(19)
The decision is achived by comparing Ξ› with the threshold as bellows:
Ξ› ≀ πœ† 𝐷1 : Primary signal transmission
Ξ› β‰₯ πœ† 𝐷2 : Emulation attack in progress
Then, error rate is determined by the following decision rule:
𝑃{𝐷2|𝑀1} = probability of missed detection, where decides 𝐷2 when 𝑀1 is true.
𝑃{𝐷1|𝑀2} = probability of false alarm, where decides 𝐷1 when 𝑀2 is true.
Those mentioned error rate for final decision above can be written mathematically as follows:
𝑃{𝐷2|𝑀1} = ∫ 𝑝(𝑝 π‘Ÿ)
(π‘₯)𝑑π‘₯ = 𝛼Λβ‰₯πœ†
(20)
𝑃{𝐷1|𝑀2} = ∫ 𝑝(π‘š)
(π‘₯)𝑑π‘₯Ξ›β‰€πœ†
(21)
3. RESULTS AND ANALYSIS
This section discusses the derived result and performance analysis for the exclusive region effect of
PUEA. We considered two distances for radius of exclusive region, 30 m and 50 m from the center of
network cell. As described in Figure 1, a brief concept how malicious user as attacker interfere primary
signal detection, with a certain number of malicious users located out of exclusive region transmitting fake
primary signal. It is assumed that fix secondary user stand at the center of circular network cell with radius
R = 500 m, π‘ƒπ‘š = 4 π‘Š, 𝜎 𝑝 = 8 𝑑𝐡, 𝜎 π‘š = 5.5 𝑑𝐡, primary transmitter power 𝑃𝑑 = 150 π‘˜π‘Š and the distance
from primary transmitter to secondary user Dp = 100 km. Number of attackers is set to M = 10 users.
Firstly, we define radius of exclusive region into Ro = 30m. Simulation is executed by 500 times.
Probability of false alarm is derived as shown in Figure 2. Its performance is varied from 0.0046 to 0.0087 as
a function of simulation times. The average value is achieved around 0.0057. Meanwhile, the performance of
probability of miss detection is shown in Figure 3. Simulation is executed by 500 run times. The derived
results are varied from 0.0055 to 0.0075 as function of simulation times. However, the average value is
achieved around 0.0063.
Figure 2. Probability of false alarm during 500
simulation times with parameter R = 500 m,
Ro = 30 m and number of attackers M = 10
Figure 3. Probability of miss detection during 500
simulation times with parameter R = 500 m,
Ro = 30 m and number of attackers M = 10
Secondly, we replace the distance of radius of exclusive region by 50 m. This study observes
the effect of exclusive region to the performance of detection due to attackers by changing the radius of
exclusive region. The performance results are derived as shown in figures. Figure 4 shows the performance
of probability of false detection with radius of exclusive region Ro = 50 m. The values are varied from
0.0025 to 0.0065 as a function of simulation times. The average value is achieved at 0.0033. Probability of
false detection decreases when compared with the case of Ro = 30 m. Performance of probability of miss
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5385 - 5391
5390
detection is shown in Figure 5. Its result is fluctuated from 0.0029 to 0.0047. However, the average result is
achieved around 0.0033. Furthermore, CDF of false alarm and miss detection probability is presented in
Figure 6 and Figure 7. The derived results show that the larger radius of exclusive region is used, then
achieve less false alarm and miss detection probabilities.
Figure 4. Probability of false alarm during 500
simulation times with parameter R = 500 m,
Ro = 50 m and number of attackers M = 10
Figure 5. Probability of miss detection during 500
simulation times with parameter R = 500 m,
Ro = 50 m and number of attackers M = 10
Figure 6. CDF of false alarm probability (Pf) Figure 7. CDF of miss detection probability (Pm)
4. CONCLUSION
The effect of radius of exclusive region in primary user emulation attack under Neyman Pearson
techniques has been studied. The statistical model for false alarm and miss detection probability is also
discussed. Exclusive region is an area where secondary user free of attackers. The simulation shows that
increasing radius of this area can decrease either probability of false detection or miss detection. The larger
radius of exclusive region is taken influences to achieve less false alarm and miss detection rate. This study
considered one primary transmitter which is located at a certain distance (100 km) away from secondary user.
For further study, it will be considered two or multiple primary base station with different distances.
REFERENCES
[1] N. Armi, et al., β€œSensing and access over imperfect channel in opportunistic spectrum access system,” 2011
National Postgraduate Conference, Kuala Lumpur, pp. 1-5, 2011.
Int J Elec & Comp Eng ISSN: 2088-8708 
Error rate detection due to primary user emulation attack in cognitive radio networks (N. Armi)
5391
[2] S. Akin and M. C. Gursoy, β€œPerformance Analysis of Cognitive Radio Systems With Imperfect Channel Sensing
and Estimation,” in IEEE Transactions on Communications, vol. 63, no. 5, pp. 1554-1566, May 2015.
[3] I. U. Ohaeri, et al., β€œInvestigating the Effect of Imperfect Sensing on Spectrum Performance in Cognitive Radio
Networks,” 2017 International Conference on Computational Science and Computational Intelligence (CSCI), Las
Vegas, NV, pp. 638-644, 2017.
[4] C. N. Mathur and K. P. Subhalakshami, β€œSecurity issues in cognitive radio networks,” Cognitive network: Towards
Self-Aware Networks, John & Wiley, Ltd, pp. 271-291, 2007.
[5] X. Zhang and C. Li, β€œConstructing secure cognitive wireless networks experiences and challenges,” Wireless
Communications and Mobile Computing, vol. 10, no. 1, pp. 55-69, 2010.
[6] J. Li, et al., β€œA survey of security issues in Cognitive Radio Networks,” in China Communications, vol. 12, no. 3,
pp. 132-150, Mar. 2015.
[7] A. S. Hamood and S. B. Sadkhan, β€œCognitive radio network security status and challenges,” 2017 Annual
Conference on New Trends in Information & Communications Technology Applications (NTICT), Baghdad,
pp. 1-6, 2017.
[8] S. Holcomb and D. B. Rawat, β€œRecent security issues on cognitive radio networks: A survey,” SoutheastCon 2016,
Norfolk, VA, pp. 1-6, 2016.
[9] S. B. Sadkhan and D. M. Reda, β€œSecurity Issues of Cognitive Radio Network,” 2019 2nd International Conference
on Engineering Technology and its Applications (IICETA), Al-Najef, Iraq, pp. 117-122, 2019.
[10] Y. Yao, et al., β€œDynamic Spectrum Access With Physical Layer Security: A Game-Based Jamming Approach,” in
IEEE Access, vol. 6, pp. 12052-12059, 2018.
[11] A. S. Khobragade and R. D. Raut, β€œHybrid Spectrum Sensing Method for Cognitive Radio,” International Journal
of Electrical and Computer Engineering, vol. 7, no. 5, pp. 2683-2695, 2017.
[12] F. Li, et al., β€œDynamic Spectrum Access Networks With Heterogeneous Users: How to Price the Spectrum?” in
IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 5203-5216, Jun. 2018.
[13] K. Umebayashi, et al., β€œDesign of Spectrum Usage Detection in Wideband Spectrum Measurements,” in IEEE
Access, vol. 7, pp. 133725-133737, 2019.
[14] S. Lien, et al., β€œRandom Access or Scheduling: Optimum LTE Licensed-Assisted Access to Unlicensed Spectrum,”
in IEEE Communications Letters, vol. 20, no. 3, pp. 590-593, Mar. 2016.
[15] F. Z. El Bahi, et al., β€œPerformance Evaluation of Energy Detector Based Spectrum Sensing for Cognitive Radio
using NI USRP-2930,” International Journal of Electrical and Computer Engineering, vol. 7, no. 4, pp. 1934-1940,
2017.
[16] R. Chen and J. Park, β€œEnsuring trustworthy spectrum sensing in cognitive radio networks,” in Proceedings of IEEE
Workshop on Networking Technologies for Software Defined Radio Networks (SDR), pp. 110-119, 2006.
[17] A. Karimi, et al., β€œSmart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User
Throughput Under Rayleigh Flat Fading Channel,” in IEEE Transactions on Information Forensics and Security,
vol. 15, pp. 66-80, 2020.
[18] E. C. MuΓ±oz, et al., β€œDetection of Malicious Primary User Emulation on Mobile Cognitive Radio Networks,” 2019
International Conference on Information Systems and Computer Science (INCISCOS), Quito, Ecuador,
pp. 144-149, 2019.
[19] R. Chen, et al., β€œDefence against primary user emulation attacks in cognitive radio networks,” IEEE Journal on
Selected Areas in Communications, Special Issue on Cognitive Radio Theory and Applications, vol. 26, no. 1,
Jan. 2008.
[20] S. Anand, et al., β€œAn analytical model for primary user emulation attacks in cognitive radio networks,” in 3rd IEEE
Symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN), 2008.
[21] M. Karimi and S. M. S. Sadough, β€œEfficient Transmission Strategy for Cognitive Radio Systems Under Primary
User Emulation Attack,” in IEEE Systems Journal, vol. 12, no. 4, pp. 3767-3774, 2018.
[22] M. Ghaznavi and A. Jamshidi, β€œDefence against primary user emulation attack using statistical properties of the
cognitive radio received power,” in IET Communications, vol. 11, no. 9, pp. 1535-1542, 2017.
[23] Z. Jin, et al., β€œDetecting primary user emulation attacks in dynamic spectrum access networks,” in 2009 IEEE
International Conference on Communications (ICC’2009), pp. 1-5, 2009.
[24] N. Nguyen-Thanh, et al., β€œSurveillance strategies against primary user emulation attack in cognitive radio
networks,” in IEEE Transactions on Wireless Communications, vol. 14, no. 9, pp. 4981-4993, Sep 2015.
[25] N. Armi, et al., β€œMalicious user attack in cognitive radio networks,” TELKOMNIKA Telecommunication,
Computing, Electronics, and Control, vol. 15, no. 3, pp. 1096-1102, 2017.
[26] D. S. Vernekar, β€œAn Investigation Of Security Challenges In Cognitive Radio Networks,” Thesis, University of
Nebraska, 2012.

More Related Content

What's hot

A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...pharmaindexing
Β 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
Β 
Wireless Communication - GSM Security
Wireless Communication - GSM SecurityWireless Communication - GSM Security
Wireless Communication - GSM SecurityAnkit Mulani
Β 
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...IAEME Publication
Β 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
Β 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
Β 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessfarrukh Farrukh
Β 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446IJRAT
Β 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETIJMTST Journal
Β 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
Β 
A security method for multiple attacks in sensor networks against false repor...
A security method for multiple attacks in sensor networks against false repor...A security method for multiple attacks in sensor networks against false repor...
A security method for multiple attacks in sensor networks against false repor...ieijjournal
Β 
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...Raja Larik
Β 
A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks
A Mathematical Approach for Hidden Node Problem in Cognitive Radio NetworksA Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks
A Mathematical Approach for Hidden Node Problem in Cognitive Radio NetworksTELKOMNIKA JOURNAL
Β 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wirelessIJCNCJournal
Β 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
Β 
Maximize resource utilization based channel access model with presence of re...
Maximize resource utilization based channel access model  with presence of re...Maximize resource utilization based channel access model  with presence of re...
Maximize resource utilization based channel access model with presence of re...IJECEIAES
Β 
Paper id 37201524
Paper id 37201524Paper id 37201524
Paper id 37201524IJRAT
Β 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
Β 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
Β 

What's hot (20)

A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
Β 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
Β 
Wireless Communication - GSM Security
Wireless Communication - GSM SecurityWireless Communication - GSM Security
Wireless Communication - GSM Security
Β 
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
Β 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
Β 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
Β 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wireless
Β 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446
Β 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANET
Β 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Β 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
Β 
A security method for multiple attacks in sensor networks against false repor...
A security method for multiple attacks in sensor networks against false repor...A security method for multiple attacks in sensor networks against false repor...
A security method for multiple attacks in sensor networks against false repor...
Β 
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...
Β 
A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks
A Mathematical Approach for Hidden Node Problem in Cognitive Radio NetworksA Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks
A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks
Β 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wireless
Β 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
Β 
Maximize resource utilization based channel access model with presence of re...
Maximize resource utilization based channel access model  with presence of re...Maximize resource utilization based channel access model  with presence of re...
Maximize resource utilization based channel access model with presence of re...
Β 
Paper id 37201524
Paper id 37201524Paper id 37201524
Paper id 37201524
Β 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
Β 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
Β 

Similar to Error rate detection due to primary user emulation attack in cognitive radio networks

Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
Attacks in Cognitive Radio Networks (CRN)   A Survey.pdfAttacks in Cognitive Radio Networks (CRN)   A Survey.pdf
Attacks in Cognitive Radio Networks (CRN) A Survey.pdfYolanda Ivey
Β 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radioNavya Shree
Β 
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...csijjournal
Β 
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...csijjournal
Β 
Investigation of Puea in Cognitive Radio Networks Using Energy Detection in D...
Investigation of Puea in Cognitive Radio Networks Using Energy Detection in D...Investigation of Puea in Cognitive Radio Networks Using Energy Detection in D...
Investigation of Puea in Cognitive Radio Networks Using Energy Detection in D...Abigailabril2
Β 
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...csijjournal
Β 
A comprehensive study of signal detection techniques for spectrum sensing in ...
A comprehensive study of signal detection techniques for spectrum sensing in ...A comprehensive study of signal detection techniques for spectrum sensing in ...
A comprehensive study of signal detection techniques for spectrum sensing in ...IAEME Publication
Β 
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...IAEME Publication
Β 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
Β 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET Journal
Β 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
Β 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...ieijjournal
Β 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
Β 
An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Β 
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Β 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161IJERA Editor
Β 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161IJERA Editor
Β 
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...ijsptm
Β 
Detection of PUE Attack by SPARS Model using WSPRT
Detection of PUE Attack by SPARS Model using WSPRTDetection of PUE Attack by SPARS Model using WSPRT
Detection of PUE Attack by SPARS Model using WSPRTEditor IJCATR
Β 

Similar to Error rate detection due to primary user emulation attack in cognitive radio networks (20)

Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
Attacks in Cognitive Radio Networks (CRN)   A Survey.pdfAttacks in Cognitive Radio Networks (CRN)   A Survey.pdf
Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
Β 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radio
Β 
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
Β 
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
Β 
Investigation of Puea in Cognitive Radio Networks Using Energy Detection in D...
Investigation of Puea in Cognitive Radio Networks Using Energy Detection in D...Investigation of Puea in Cognitive Radio Networks Using Energy Detection in D...
Investigation of Puea in Cognitive Radio Networks Using Energy Detection in D...
Β 
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
Β 
A comprehensive study of signal detection techniques for spectrum sensing in ...
A comprehensive study of signal detection techniques for spectrum sensing in ...A comprehensive study of signal detection techniques for spectrum sensing in ...
A comprehensive study of signal detection techniques for spectrum sensing in ...
Β 
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
Β 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
Β 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
Β 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Β 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
Β 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...
Β 
K1803036872
K1803036872K1803036872
K1803036872
Β 
An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...
Β 
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
Β 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
Β 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
Β 
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
Β 
Detection of PUE Attack by SPARS Model using WSPRT
Detection of PUE Attack by SPARS Model using WSPRTDetection of PUE Attack by SPARS Model using WSPRT
Detection of PUE Attack by SPARS Model using WSPRT
Β 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
Β 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
Β 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
Β 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
Β 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
Β 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
Β 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
Β 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
Β 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
Β 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
Β 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
Β 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
Β 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
Β 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
Β 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
Β 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
Β 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
Β 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
Β 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
Β 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
Β 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
Β 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
Β 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Β 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Β 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
Β 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
Β 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
Β 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
Β 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
Β 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
Β 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
Β 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
Β 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
Β 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
Β 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Β 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
Β 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
Β 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
Β 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
Β 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
Β 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
Β 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
Β 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
Β 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
Β 
Study on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube ExchangerAnamika Sarkar
Β 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
Β 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
Β 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
Β 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
Β 
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”soniya singh
Β 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
Β 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
Β 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
Β 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
Β 
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
Β 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
Β 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
Β 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
Β 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
Β 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Β 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Β 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
Β 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Β 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Β 
Study on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube Exchanger
Β 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Β 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
Β 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Β 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Β 
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Β 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Β 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Β 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
Β 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Β 
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Β 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Β 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Β 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Β 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
Β 

Error rate detection due to primary user emulation attack in cognitive radio networks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 5, October 2020, pp. 5385~5391 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i5.pp5385-5391  5385 Journal homepage: http://ijece.iaescore.com/index.php/IJECE Error rate detection due to primary user emulation attack in cognitive radio networks N. Armi1 , W. Gharibi2 , W. Z. Khan3 1 Indonesian Institute of Sciences, Research Center for Electronics and Telecommunication, Indonesia 1 Department of Electrical Engineering, Telkom University, Indonesia 2 Department of Computer Science and Electrical Engineering, University of Missouri-Kansas City, United State 3 Department of Computer and Network Engineering, Jazan University, Kingdom of Saudi Arabia Article Info ABSTRACT Article history: Received Aug 31, 2019 Revised Apr 16, 2020 Accepted Apr 29, 2020 Security threat is a crucial issue in cognitive radio network (CRN). These threats come from physical layer, data link layer, network layer, transport layer, and application layer. Hence, security system to all layers in CRN has a responsibility to protect the communication between among Secondary User (SU) or to maintain valid detection to the presence of Primary User (PU) signals. Primary User Emulation Attack (PUEA) is a threat on physical layer where malicious user emulates PU signal. This paper studies the effect of exclusive region of PUEA in CRN. We take two setting of exclusive distances, 30m and 50m, where this radius of area is free of malicious users. Probability of false alarm (Pf) and miss detection (Pm) are used to evaluate the performances. The result shows that increasing distance of exclusive region may decrease Pf and Pm. Keywords: Cognitive radio False detection Malicious user Miss detection Spectrum sensing Copyright Β© 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Nasrullah Armi, Research Center for Electronics and Telecommunication, Indonesian Institute of Sciences, Cisitu street, No. 21/154 D, Bandung 40135, Indonesia. Email: nasrullah.armi@gmail.com 1. INTRODUCTION Besides sensing and access over imperfect channel [1-3], security threat is crucial issue in cognitive radio. It comes from most layer such as physical, data link, network, transport, or application layer [4-10]. Unlike traditional wireless networks where operates in fixed spectrum, cognitive radio networks operate in dynamic spectrum where user opportunistically access available spectrum channel with prior sensing [11-14]. Hence, various factors must be taken into consideration since cognitive radio (CR) deals with the utilization of unused spectrum in opportunistic manner with the unscheduled appearance of primary users [15]. Physical layer is the lowest level which provides an interface to the medium. Security on physical layer is related to some possible attack such as intentional jamming attack, primary receiver jamming attack, primary user emulation attack, and overlapping secondary user attack. Intentional jamming attack means that malicious user transmit signal intentionally in the existing license bands and jams primary and other secondary user. The worst case is occurred when malicious users attack in one geographical area and move to another area very quickly without being identified. The unknown location of primary user is a benefit for attackers to launch primary receiver jamming attack. The attacker may shift to the primary receiver and requests transmission from secondary users. This case causes interference to primary receiver. In CRN, multiple secondary networks perform sensing for available spectrum to access at the same region with the same time. The transmission from malicious users in one network may cause interference to the primary and secondary users from the other networks. This threat is known as overlapping secondary user attack where a malicious user may also imitate the primary user. The fake primary signal is considered as
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5385 - 5391 5386 original signal by secondary user. Hence, secondary user refrain from transmission or terminate the ongoing communication and release the frequency spectrum [16]. This fake signal transmitted by malicious user is known as primary user emulation attack. Primary user emulation attack is a threat on physical layer. It harms SU to achieve the correct sensing outcome. Malicious user attacks signal detection by transmitting signal whose has the same characteristic as primary signal. It causes SU has a difficulty to identify vacant spectrum. Malicious user does not utilize those vacant bands for its own communication purposes. They only transmit fake primary signal in vacant bands to obstruct SU from detecting original one. The existing works related to this issue have been done. Smart attacker was introduced in [17]. The authors use Markov chain technique to model the activities of attackers. Then, energy detection of attackers was investigated in [18]. The authors used NI-USRP 2922 devices to derive probability of detection and false alarm. Chen et al in [19] investigated the attackers which is considered as interference to result inaccurate position of primary user location. The authors implemented directional antenna to explore position of primary transmitter. The used parameter like angle, arrival time, and strength of signal is explored to detect an accurate position. An analytical of successful probability to attact primary user location was firstly studied by authors in [20]. Fading was considered into account to calculate successful probability of attackers and define a lower limit by applying Fenton’s and Markov approximation, respectively. CR signaling was introduced by authors in [21] to ease accessing available spectrum efficiently. The investigation proved that the framework is able to maximize SU transmission rate with low probility of miss detection and probability of false alarm. Using the statistical characteristic of users to prevent PUEA issue was proposed by Ghaznavi et al [22]. The used method on this article was well proved that its technique is able to increase the detection performance compared with the existing works. Investigation of primary user attackers with blind information of users was presented by authors in [23]. They investigated miss detection rate both theoretically and experimentally different number of SU. However, the disavadvantages of this study such as ignoring probability of false detection and the received power performance performance were not clearly presented. The technique to reduce the impact of attackers to primary user due to selfish and malicious users was introduced by authors in [24]. They implemented game strategy to counter the attacker and reduce the error rate detection of primary user. The effect of number of attackers to the performance of detection in PUEA was studied in [25, 26] with Neyman Pearson decision tecnique. They concluded that increasing number of attacker may decrease the performance. This paper explores more performance affected by radius of exclusive region. Two different radius of exclusive region values is considered with two hypothesis of Neyman Pearson technique to decide the existence of primary user. Error rates detection such as false alarm and miss detection are used to present the derived performance evaluation. The rest of the paper is organized as follows. Section 2 discusses system and numerical model considered in the simulation. The derived result and discussion are presented in section 3. Finally, conclusion is taken briefly in Section 4. 2. PRIMARY USER EMULATION ATTACK MODEL The major issue in primary signal detection is how SUs can identify fake primary signal. Primary user emulation attack (PUEA) is one threat on physical layer in cognitive radio network where attacker transmit fake primary signal. Two types of well-known PUEA is selfish PUEA and malicious PUEA. Attackers maximize its bandwidth by preventing other SUs to use the spectrum bands in selfish PUEA. Attackers transmit signal to resemble the primary signal. Whereas the aim of attackers in malicious PUEA is obstructing SU to identify the vacant spectrum bands, so that they cannot use those bands. Two type of errors caused by PUEA are probability of false alarm (Pf) and miss detection (Pm). These two detection errors are used as main parameter for performance evaluation. Figure 1 describes a brief concept of how attackers interfere primary user detection. As figure, there are a number of attackers located on a circular network with radius R and single secondary user located at the center. Each attackers transmit signal among each other. The attackers (M) are distributed randomly covering secondary user with a certain radius R. These attackers transmit signal independently. On the other side, secondary user is located at the center of network with the distance Dp from primary transmitter. Fixed location of primary transmitter possibly to transmit signal with power Pt. Meanwhile, secondary user is free attackers at radius Ro where this region is known as exlusive area of secondary user.
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  Error rate detection due to primary user emulation attack in cognitive radio networks (N. Armi) 5387 R Ro Dp Secondary user Malicious user Primary transmitter Figure 1. Primary user emulation attack (PUEA) model As described in figure, we have a number of attackers located at (π‘Ÿπ‘—, πœƒπ‘—) where j is value with range range 1≀j≀M. Then probability density function (PDF) of π‘Ÿπ‘— is derived as follows [10]. 𝑝(π‘Ÿπ‘—) = 2π‘Ÿ 𝑗 𝑅2βˆ’π‘…π‘œ2 π‘…π‘œ ≀ π‘Ÿ ≀ 𝑅 (1) where πœƒπ‘— is equally distributed at range (βˆ’πœ‹, πœ‹). Then, the received power of transmitted signal from primary transmitter is derived as bellows: π‘ƒπ‘Ÿ(𝑝) = 𝑃𝑑 𝑑 𝑝 βˆ’2 𝐺 𝑝 2 (2) where 𝐺𝑝2 = 10 πœ€π‘ 10, πœ€π‘~𝑁(0, πœŽπ‘2). Since 𝑃𝑑 and 𝑑 𝑝 have a fixed values, then the PDF of π‘π‘Ÿ(𝑝) uses a log normal distribution and can be calculated as follows: π‘ƒπ‘Ÿ(𝑝)(𝛾) = 1 π›Ύπ΄πœŽ π‘βˆš2πœ‹ 𝑒π‘₯𝑝 { (10π‘™π‘œπ‘”10 π›Ύβˆ’πœ‡ 𝑝)2 2𝜎 𝑝 2 } (3) where 𝐴 = 𝑙𝑛10 10 and πœ‡ 𝑝 = 10π‘™π‘œπ‘”10 𝑃𝑑 βˆ’ 20π‘™π‘œπ‘”10 𝑑 𝑝 The total power received from attackers at the secondary user is derived by: π‘ƒπ‘Ÿ(π‘š) = βˆ‘ π‘ƒπ‘š 𝐷𝑗 βˆ’4 𝐺𝑗 2𝑀 𝑗=1 (4) where 𝐷𝑗 and 𝐺𝑗 2 are the distance and shadowing between 𝑗 π‘‘β„Ž malicious user and secondary user, respectively. 𝐺𝑗 2 = 10 πœ€ 𝑗 10 where πœ€π‘—~𝑁(0, 𝜎2 π‘š). The right side of equation (4) above is log normally distributed random variable of the form 10 πœ” 𝑗 10 where πœ”π‘—~𝑁(πœ‡ 𝑗, 𝜎2 π‘š), where πœ‡ 𝑗 is derived by the following equation: πœ‡ 𝑗 = 10π‘™π‘œπ‘”10 π‘ƒπ‘š βˆ’ 40π‘™π‘œπ‘”10 𝐷𝑗 (5) The PDF of π‘π‘Ÿ π‘š considered as positions of all attackers can be derived as bellows: 𝑃π‘₯|π‘Ÿ (π‘š) = 1 π‘₯𝐴𝜎 π‘€βˆš2πœ‹ 𝑒π‘₯𝑝 { (10π‘™π‘œπ‘”10 π‘₯βˆ’πœ‡ 𝑀)2 2𝜎 𝑀 2 } (6) π‘Ÿ is defined as the vector elements of π‘Ÿ1, π‘Ÿ2,…, π‘Ÿ π‘š. Then, 𝜎2 𝑀 and πœ‡ 𝑀 are derived as the equation bellows: 𝜎 𝑀 2 = 1 𝐴2 𝑙𝑛 [1 + (𝑒 𝐴2 𝜎 π‘š 2 βˆ’1) βˆ‘ 𝑒 2π΄πœ‡ 𝑗𝑀 𝑗=1 (βˆ‘ 𝑒 π΄πœ‡ 𝑗𝑀 𝑗=1 ) 2 ] (7)
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5385 - 5391 5388 πœ‡ 𝑀 = 1 𝐴 𝑙𝑛(βˆ‘ 𝑒 π΄πœ‡ 𝑗𝑀 𝑗=1 ) βˆ’ 𝐴 2 (𝜎 𝑀 2 βˆ’ 𝜎 π‘š 2) (8) The PDF of the received power from attackers is calculated as follows: 𝑃 π‘š (π‘₯) = ∫ ∏ 𝑃π‘₯|π‘Ÿ (π‘š) (π‘₯|π‘Ÿ)𝑝(π‘Ÿπ‘—)π‘‘π‘Ÿπ‘— 𝑀 𝑗=1 𝑅 π‘…π‘œ (9) Futhermore, calculation of the receiver power from attacker uses log normally distributed random variable with πœ‡ π‘₯ and 𝜎π‘₯ as bellows: 𝑝 π‘š (π‘₯) = 1 π‘₯𝐴𝜎 π‘₯√2πœ‹ 𝑒π‘₯𝑝 {βˆ’ (10π‘™π‘œπ‘”10 π‘₯βˆ’πœ‡ π‘₯)2 2𝜎 π‘₯ 2 } (10) The values of πœ‡ π‘₯ and 𝜎π‘₯ can be derived when π‘π‘Ÿ π‘š is considered as a log normally distributed random variable as written in equations bellows: 𝜎π‘₯ 2 = 1 𝐴2 (𝑙𝑛𝐸 [(π‘π‘Ÿ (π‘š) ) 2 ] βˆ’ 2𝑙𝑛𝐸[π‘π‘Ÿ (π‘š) ]) (11) πœ‡ π‘₯ = 1 𝐴 (2𝑙𝑛𝐸[π‘π‘Ÿ (π‘š) ]) βˆ’ 1 2 𝑙𝑛𝐸 [(π‘π‘Ÿ (π‘š) ) 2 ] (12) From (6), the values of π‘π‘Ÿ π‘š and 𝐸[π‘π‘Ÿ π‘š |π‘Ÿ] is derived by the following equation: 𝐸[π‘π‘Ÿ (π‘š) |π‘Ÿ] = 𝑀𝑒 π΄πœ‡ 𝑗 βˆ— 𝑒 𝐴2 𝜎 π‘š 2 2 (13) where πœ‡ 𝑗 = 10π‘™π‘œπ‘”10(π‘ƒπ‘š βˆ— 𝐷𝑗 βˆ’4 ) (14) 𝑒 π΄πœ‡ 𝑗=𝑒 𝐴10π‘™π‘œπ‘”10(𝑃 π‘šβˆ—π· 𝑗 βˆ’4) = π‘ƒπ‘š βˆ— 𝐷𝑗 βˆ’4 (15) Hence, 𝐸[π‘π‘Ÿ (π‘š) |π‘Ÿ] = π‘€π‘ƒπ‘š βˆ— 𝐷𝑗 βˆ’4 βˆ— 𝑒 𝐴2 𝜎 π‘š 2 2 (16) By integrating equation over range of π‘Ÿ1, π‘Ÿ2,…, π‘Ÿ 𝑀, it becomes: 𝐸[π‘ƒπ‘Ÿ (π‘š) ] = ∫ 𝑀𝑝(π‘Ÿπ‘—)π‘ƒπ‘š βˆ— 𝐷𝑗 βˆ’4 βˆ— 𝑒 𝐴2 𝜎 π‘š 2 2 π‘‘π‘Ÿπ‘— 𝑅 π‘…π‘œ = ∫ π‘€π‘ƒπ‘š 𝑒 𝐴2 𝜎 π‘š 2 2 ∫ 2π‘Ÿ 𝑗 𝑅2βˆ’π‘…π‘œ2 𝑅 π‘…π‘œ 𝑅 π‘…π‘œ βˆ— 𝐷𝑗 βˆ’4 π‘‘π‘Ÿπ‘— (17) If secondary user is located at coordinate (0, 0), meaning that 𝐷𝑗 = π‘Ÿπ‘— 𝐸[π‘ƒπ‘Ÿ (π‘š) ] = π‘€π‘ƒπ‘š 𝑒 𝐴2 𝜎 π‘š 2 2 ∫ 2π‘Ÿ 𝑗 𝑅2βˆ’π‘…π‘œ2 βˆ— 1 π‘Ÿ 𝑗 4 π‘‘π‘Ÿπ‘— 𝑅 π‘…π‘œ 𝐸[π‘ƒπ‘Ÿ (π‘š) ] = 𝑀𝑃 π‘š 𝑅2 π‘…π‘œ2 𝑒 𝐴2 𝜎 π‘š 2 2 (18) Using decision criterion of Newman Pearson, we assume that M1 as primary signal transmission in progress, and M2 is emulation attack in progress. This study implements two error rate for performance evaluation, those are false alarm and miss detection. False detection means mistake detection by secondary user where malicious user as attacker signal is detected as primary signal. Meanwhile, miss detection means secondary user detect primary user signal as attacker signal. Hence, secondary user is unaware and loss an opportunity to access available spectrum. The decision variable is derived by including the received signal power as follows:
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  Error rate detection due to primary user emulation attack in cognitive radio networks (N. Armi) 5389 Ξ› = 𝑝 π‘š(π‘₯) 𝑝(𝑝 π‘Ÿ)(π‘₯) (19) The decision is achived by comparing Ξ› with the threshold as bellows: Ξ› ≀ πœ† 𝐷1 : Primary signal transmission Ξ› β‰₯ πœ† 𝐷2 : Emulation attack in progress Then, error rate is determined by the following decision rule: 𝑃{𝐷2|𝑀1} = probability of missed detection, where decides 𝐷2 when 𝑀1 is true. 𝑃{𝐷1|𝑀2} = probability of false alarm, where decides 𝐷1 when 𝑀2 is true. Those mentioned error rate for final decision above can be written mathematically as follows: 𝑃{𝐷2|𝑀1} = ∫ 𝑝(𝑝 π‘Ÿ) (π‘₯)𝑑π‘₯ = 𝛼Λβ‰₯πœ† (20) 𝑃{𝐷1|𝑀2} = ∫ 𝑝(π‘š) (π‘₯)𝑑π‘₯Ξ›β‰€πœ† (21) 3. RESULTS AND ANALYSIS This section discusses the derived result and performance analysis for the exclusive region effect of PUEA. We considered two distances for radius of exclusive region, 30 m and 50 m from the center of network cell. As described in Figure 1, a brief concept how malicious user as attacker interfere primary signal detection, with a certain number of malicious users located out of exclusive region transmitting fake primary signal. It is assumed that fix secondary user stand at the center of circular network cell with radius R = 500 m, π‘ƒπ‘š = 4 π‘Š, 𝜎 𝑝 = 8 𝑑𝐡, 𝜎 π‘š = 5.5 𝑑𝐡, primary transmitter power 𝑃𝑑 = 150 π‘˜π‘Š and the distance from primary transmitter to secondary user Dp = 100 km. Number of attackers is set to M = 10 users. Firstly, we define radius of exclusive region into Ro = 30m. Simulation is executed by 500 times. Probability of false alarm is derived as shown in Figure 2. Its performance is varied from 0.0046 to 0.0087 as a function of simulation times. The average value is achieved around 0.0057. Meanwhile, the performance of probability of miss detection is shown in Figure 3. Simulation is executed by 500 run times. The derived results are varied from 0.0055 to 0.0075 as function of simulation times. However, the average value is achieved around 0.0063. Figure 2. Probability of false alarm during 500 simulation times with parameter R = 500 m, Ro = 30 m and number of attackers M = 10 Figure 3. Probability of miss detection during 500 simulation times with parameter R = 500 m, Ro = 30 m and number of attackers M = 10 Secondly, we replace the distance of radius of exclusive region by 50 m. This study observes the effect of exclusive region to the performance of detection due to attackers by changing the radius of exclusive region. The performance results are derived as shown in figures. Figure 4 shows the performance of probability of false detection with radius of exclusive region Ro = 50 m. The values are varied from 0.0025 to 0.0065 as a function of simulation times. The average value is achieved at 0.0033. Probability of false detection decreases when compared with the case of Ro = 30 m. Performance of probability of miss
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5385 - 5391 5390 detection is shown in Figure 5. Its result is fluctuated from 0.0029 to 0.0047. However, the average result is achieved around 0.0033. Furthermore, CDF of false alarm and miss detection probability is presented in Figure 6 and Figure 7. The derived results show that the larger radius of exclusive region is used, then achieve less false alarm and miss detection probabilities. Figure 4. Probability of false alarm during 500 simulation times with parameter R = 500 m, Ro = 50 m and number of attackers M = 10 Figure 5. Probability of miss detection during 500 simulation times with parameter R = 500 m, Ro = 50 m and number of attackers M = 10 Figure 6. CDF of false alarm probability (Pf) Figure 7. CDF of miss detection probability (Pm) 4. CONCLUSION The effect of radius of exclusive region in primary user emulation attack under Neyman Pearson techniques has been studied. The statistical model for false alarm and miss detection probability is also discussed. Exclusive region is an area where secondary user free of attackers. The simulation shows that increasing radius of this area can decrease either probability of false detection or miss detection. The larger radius of exclusive region is taken influences to achieve less false alarm and miss detection rate. This study considered one primary transmitter which is located at a certain distance (100 km) away from secondary user. For further study, it will be considered two or multiple primary base station with different distances. REFERENCES [1] N. Armi, et al., β€œSensing and access over imperfect channel in opportunistic spectrum access system,” 2011 National Postgraduate Conference, Kuala Lumpur, pp. 1-5, 2011.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  Error rate detection due to primary user emulation attack in cognitive radio networks (N. Armi) 5391 [2] S. Akin and M. C. Gursoy, β€œPerformance Analysis of Cognitive Radio Systems With Imperfect Channel Sensing and Estimation,” in IEEE Transactions on Communications, vol. 63, no. 5, pp. 1554-1566, May 2015. [3] I. U. Ohaeri, et al., β€œInvestigating the Effect of Imperfect Sensing on Spectrum Performance in Cognitive Radio Networks,” 2017 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, pp. 638-644, 2017. [4] C. N. Mathur and K. P. Subhalakshami, β€œSecurity issues in cognitive radio networks,” Cognitive network: Towards Self-Aware Networks, John & Wiley, Ltd, pp. 271-291, 2007. [5] X. Zhang and C. Li, β€œConstructing secure cognitive wireless networks experiences and challenges,” Wireless Communications and Mobile Computing, vol. 10, no. 1, pp. 55-69, 2010. [6] J. Li, et al., β€œA survey of security issues in Cognitive Radio Networks,” in China Communications, vol. 12, no. 3, pp. 132-150, Mar. 2015. [7] A. S. Hamood and S. B. Sadkhan, β€œCognitive radio network security status and challenges,” 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), Baghdad, pp. 1-6, 2017. [8] S. Holcomb and D. B. Rawat, β€œRecent security issues on cognitive radio networks: A survey,” SoutheastCon 2016, Norfolk, VA, pp. 1-6, 2016. [9] S. B. Sadkhan and D. M. Reda, β€œSecurity Issues of Cognitive Radio Network,” 2019 2nd International Conference on Engineering Technology and its Applications (IICETA), Al-Najef, Iraq, pp. 117-122, 2019. [10] Y. Yao, et al., β€œDynamic Spectrum Access With Physical Layer Security: A Game-Based Jamming Approach,” in IEEE Access, vol. 6, pp. 12052-12059, 2018. [11] A. S. Khobragade and R. D. Raut, β€œHybrid Spectrum Sensing Method for Cognitive Radio,” International Journal of Electrical and Computer Engineering, vol. 7, no. 5, pp. 2683-2695, 2017. [12] F. Li, et al., β€œDynamic Spectrum Access Networks With Heterogeneous Users: How to Price the Spectrum?” in IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 5203-5216, Jun. 2018. [13] K. Umebayashi, et al., β€œDesign of Spectrum Usage Detection in Wideband Spectrum Measurements,” in IEEE Access, vol. 7, pp. 133725-133737, 2019. [14] S. Lien, et al., β€œRandom Access or Scheduling: Optimum LTE Licensed-Assisted Access to Unlicensed Spectrum,” in IEEE Communications Letters, vol. 20, no. 3, pp. 590-593, Mar. 2016. [15] F. Z. El Bahi, et al., β€œPerformance Evaluation of Energy Detector Based Spectrum Sensing for Cognitive Radio using NI USRP-2930,” International Journal of Electrical and Computer Engineering, vol. 7, no. 4, pp. 1934-1940, 2017. [16] R. Chen and J. Park, β€œEnsuring trustworthy spectrum sensing in cognitive radio networks,” in Proceedings of IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR), pp. 110-119, 2006. [17] A. Karimi, et al., β€œSmart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel,” in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 66-80, 2020. [18] E. C. MuΓ±oz, et al., β€œDetection of Malicious Primary User Emulation on Mobile Cognitive Radio Networks,” 2019 International Conference on Information Systems and Computer Science (INCISCOS), Quito, Ecuador, pp. 144-149, 2019. [19] R. Chen, et al., β€œDefence against primary user emulation attacks in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, Special Issue on Cognitive Radio Theory and Applications, vol. 26, no. 1, Jan. 2008. [20] S. Anand, et al., β€œAn analytical model for primary user emulation attacks in cognitive radio networks,” in 3rd IEEE Symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN), 2008. [21] M. Karimi and S. M. S. Sadough, β€œEfficient Transmission Strategy for Cognitive Radio Systems Under Primary User Emulation Attack,” in IEEE Systems Journal, vol. 12, no. 4, pp. 3767-3774, 2018. [22] M. Ghaznavi and A. Jamshidi, β€œDefence against primary user emulation attack using statistical properties of the cognitive radio received power,” in IET Communications, vol. 11, no. 9, pp. 1535-1542, 2017. [23] Z. Jin, et al., β€œDetecting primary user emulation attacks in dynamic spectrum access networks,” in 2009 IEEE International Conference on Communications (ICC’2009), pp. 1-5, 2009. [24] N. Nguyen-Thanh, et al., β€œSurveillance strategies against primary user emulation attack in cognitive radio networks,” in IEEE Transactions on Wireless Communications, vol. 14, no. 9, pp. 4981-4993, Sep 2015. [25] N. Armi, et al., β€œMalicious user attack in cognitive radio networks,” TELKOMNIKA Telecommunication, Computing, Electronics, and Control, vol. 15, no. 3, pp. 1096-1102, 2017. [26] D. S. Vernekar, β€œAn Investigation Of Security Challenges In Cognitive Radio Networks,” Thesis, University of Nebraska, 2012.