SlideShare a Scribd company logo
1 of 13
Detecting PUE attacks in Cognitive Radio Networks
Research Methods
Fan Jin
4047 8963
Cognitive Radio
Existing frequency resources are almost allocated by
companies or organizations
Utilization of frequency resources are unbalanced
Cognitive Radio can improve the efficiency of
utilizing existing frequency resources
Simple Example:
Mobile phone user can use TV signal to talk or SMS
Some Concepts
Primary user: user who has paid for a specific band
Secondary user: user who has not paid for a
frequency, but wants to use a frequency for
communication
White space, hole or fallow band: in a specific time
frame, a primary user is not using his paid frequency
channel
Hand-off: when primary user comes to use his
frequency, secondary users have to quit and look for
another white space
Primary User Emulation
Attack
Malicious users mimic primary user’s signal
Other secondary users believe the primary user is still
in, hence they are unable to use the fallow band
Selfish PUE attacker and Malicious PUE attacker
Impact of PUE attacks
PUE attack detection
Secondary user needs to correctly identify primary
user’s signal
No modification should be applied to primary user
Three research methods: Energy detection,
Cyclostationary feature detection and Localization
a radio signal should
look like…
a real TV signal …
Energy Detection
Energy detector measures the energy in the input
wave over a specific time interval.
Measures the power level of the received signal at
the secondary user receiver and compare it with the
signal from real primary user
A threshold is required for identification
Advantage: Former knowledge of the primary user
signal characteristic (much more than the energy
level) is not required.
Disadvantage: path loss, path fading
Cyclostationary Feature
Detection
Utilizes the cyclic feature of a signal to detect it
If the amplitude is periodic and there exists a peak
value for each period, the value is compared to a
predetermined threshold
Cyclic autocorrelation function (CAF) and Cyclic
spectrum density (CSD)
Advantage: robust against noise with unknown
variance
Disadvantage: computational complexity and long
observation time
Localization
Non-interactive localization scheme is required
Location Verification scheme: ratio of distance and
energy level
Localization scheme:
 Received Signal Strength (RSS) based localization
 Triangulation
RSS based localization scheme
Conclusion
A proper architecture is required, contains primary users,
secondary users and secondary user base stations:
Secondary users will need to communicate each
other or with base stations for exchanging
messages and updating final results
A combination of above methods need to be used to
successfully detect PUE attacks
Other techniques such as machine learning or data
smoothing may be used to increase the accuracy of final
decision
Questions?

More Related Content

What's hot

Transferring quantum information through the
Transferring quantum information through theTransferring quantum information through the
Transferring quantum information through theijngnjournal
 
Cognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptCognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptAnupam Yadav
 
Add-on or Integration? The future of CR Deployment in Real World - An Industr...
Add-on or Integration? The future of CR Deployment in Real World - An Industr...Add-on or Integration? The future of CR Deployment in Real World - An Industr...
Add-on or Integration? The future of CR Deployment in Real World - An Industr...idescitation
 
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations csandit
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Presentation on cognative radio
Presentation on cognative radioPresentation on cognative radio
Presentation on cognative radioShewangi Kochhar
 
Research paper on cognitive radio network
Research paper on cognitive radio networkResearch paper on cognitive radio network
Research paper on cognitive radio networkbkmishra21
 
Dynamic user grouping based NOMA
Dynamic user grouping based  NOMADynamic user grouping based  NOMA
Dynamic user grouping based NOMAShubhamSingh1797
 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET Journal
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSaroj Dhakal
 
Paper id 37201524
Paper id 37201524Paper id 37201524
Paper id 37201524IJRAT
 
Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...
Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...
Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...IJEACS
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOijngnjournal
 
Application of multi antenna technologies in cellular mobile communications
Application of multi antenna technologies in cellular mobile communicationsApplication of multi antenna technologies in cellular mobile communications
Application of multi antenna technologies in cellular mobile communicationsmarwaeng
 
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic PrefixOFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefixjohn236zaq
 

What's hot (19)

Transferring quantum information through the
Transferring quantum information through theTransferring quantum information through the
Transferring quantum information through the
 
Cognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptCognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 ppt
 
Add-on or Integration? The future of CR Deployment in Real World - An Industr...
Add-on or Integration? The future of CR Deployment in Real World - An Industr...Add-on or Integration? The future of CR Deployment in Real World - An Industr...
Add-on or Integration? The future of CR Deployment in Real World - An Industr...
 
Paper 1 2019
Paper 1 2019Paper 1 2019
Paper 1 2019
 
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Presentation on cognative radio
Presentation on cognative radioPresentation on cognative radio
Presentation on cognative radio
 
Research paper on cognitive radio network
Research paper on cognitive radio networkResearch paper on cognitive radio network
Research paper on cognitive radio network
 
Dynamic user grouping based NOMA
Dynamic user grouping based  NOMADynamic user grouping based  NOMA
Dynamic user grouping based NOMA
 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
 
Paper id 37201524
Paper id 37201524Paper id 37201524
Paper id 37201524
 
Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...
Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...
Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
 
D1082731
D1082731D1082731
D1082731
 
Application of multi antenna technologies in cellular mobile communications
Application of multi antenna technologies in cellular mobile communicationsApplication of multi antenna technologies in cellular mobile communications
Application of multi antenna technologies in cellular mobile communications
 
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic PrefixOFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 

Viewers also liked

Byzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkByzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkChandra Sharma
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radioNavya Shree
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
Stat of the art in cognitive radio
Stat of the art in cognitive radioStat of the art in cognitive radio
Stat of the art in cognitive radioMohsen Tantawy
 

Viewers also liked (7)

Byzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkByzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio Network
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radio
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Stat of the art in cognitive radio
Stat of the art in cognitive radioStat of the art in cognitive radio
Stat of the art in cognitive radio
 
What is Cognitive Radio?
What is Cognitive Radio? What is Cognitive Radio?
What is Cognitive Radio?
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
PPT - Powerful Presentation Techniques
PPT - Powerful Presentation TechniquesPPT - Powerful Presentation Techniques
PPT - Powerful Presentation Techniques
 

Similar to Presentation of Research methods of CRN

Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSaroj Dhakal
 
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...IRJET Journal
 
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...IRJET Journal
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio IOSR Journals
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioAn Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioIOSR Journals
 
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...IRJET Journal
 
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORKOPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORKPraktan Patil
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
 
A cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyA cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyijngnjournal
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networksVatsala Sharma
 
International journal of engineering issues vol 2015 - no 2 - paper7
International journal of engineering issues   vol 2015 - no 2 - paper7International journal of engineering issues   vol 2015 - no 2 - paper7
International journal of engineering issues vol 2015 - no 2 - paper7sophiabelthome
 
Optimization of Cognitive Radio
Optimization of Cognitive Radio Optimization of Cognitive Radio
Optimization of Cognitive Radio Puneet Arora
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docIIRindia
 
Comparative Study of Different Non-Cooperative Techniques in Cognitive Radio
Comparative Study of Different Non-Cooperative Techniques in Cognitive RadioComparative Study of Different Non-Cooperative Techniques in Cognitive Radio
Comparative Study of Different Non-Cooperative Techniques in Cognitive RadioRSIS International
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radioijngnjournal
 
A comprehensive study of signal detection techniques for spectrum sensing in ...
A comprehensive study of signal detection techniques for spectrum sensing in ...A comprehensive study of signal detection techniques for spectrum sensing in ...
A comprehensive study of signal detection techniques for spectrum sensing in ...IAEME Publication
 

Similar to Presentation of Research methods of CRN (20)

Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
 
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
 
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioAn Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
 
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
 
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORKOPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Study
 
A cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyA cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a study
 
27. cognitive radio
27. cognitive radio27. cognitive radio
27. cognitive radio
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
International journal of engineering issues vol 2015 - no 2 - paper7
International journal of engineering issues   vol 2015 - no 2 - paper7International journal of engineering issues   vol 2015 - no 2 - paper7
International journal of engineering issues vol 2015 - no 2 - paper7
 
Optimization of Cognitive Radio
Optimization of Cognitive Radio Optimization of Cognitive Radio
Optimization of Cognitive Radio
 
energy_detection
energy_detectionenergy_detection
energy_detection
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.doc
 
Comparative Study of Different Non-Cooperative Techniques in Cognitive Radio
Comparative Study of Different Non-Cooperative Techniques in Cognitive RadioComparative Study of Different Non-Cooperative Techniques in Cognitive Radio
Comparative Study of Different Non-Cooperative Techniques in Cognitive Radio
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radio
 
A comprehensive study of signal detection techniques for spectrum sensing in ...
A comprehensive study of signal detection techniques for spectrum sensing in ...A comprehensive study of signal detection techniques for spectrum sensing in ...
A comprehensive study of signal detection techniques for spectrum sensing in ...
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
 
Cr2012b
Cr2012bCr2012b
Cr2012b
 

Recently uploaded

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Presentation of Research methods of CRN

  • 1. Detecting PUE attacks in Cognitive Radio Networks Research Methods Fan Jin 4047 8963
  • 2. Cognitive Radio Existing frequency resources are almost allocated by companies or organizations Utilization of frequency resources are unbalanced Cognitive Radio can improve the efficiency of utilizing existing frequency resources Simple Example: Mobile phone user can use TV signal to talk or SMS
  • 3. Some Concepts Primary user: user who has paid for a specific band Secondary user: user who has not paid for a frequency, but wants to use a frequency for communication White space, hole or fallow band: in a specific time frame, a primary user is not using his paid frequency channel Hand-off: when primary user comes to use his frequency, secondary users have to quit and look for another white space
  • 4. Primary User Emulation Attack Malicious users mimic primary user’s signal Other secondary users believe the primary user is still in, hence they are unable to use the fallow band Selfish PUE attacker and Malicious PUE attacker Impact of PUE attacks
  • 5. PUE attack detection Secondary user needs to correctly identify primary user’s signal No modification should be applied to primary user Three research methods: Energy detection, Cyclostationary feature detection and Localization
  • 6. a radio signal should look like…
  • 7. a real TV signal …
  • 8. Energy Detection Energy detector measures the energy in the input wave over a specific time interval. Measures the power level of the received signal at the secondary user receiver and compare it with the signal from real primary user A threshold is required for identification Advantage: Former knowledge of the primary user signal characteristic (much more than the energy level) is not required. Disadvantage: path loss, path fading
  • 9. Cyclostationary Feature Detection Utilizes the cyclic feature of a signal to detect it If the amplitude is periodic and there exists a peak value for each period, the value is compared to a predetermined threshold Cyclic autocorrelation function (CAF) and Cyclic spectrum density (CSD) Advantage: robust against noise with unknown variance Disadvantage: computational complexity and long observation time
  • 10. Localization Non-interactive localization scheme is required Location Verification scheme: ratio of distance and energy level Localization scheme:  Received Signal Strength (RSS) based localization  Triangulation
  • 12. Conclusion A proper architecture is required, contains primary users, secondary users and secondary user base stations: Secondary users will need to communicate each other or with base stations for exchanging messages and updating final results A combination of above methods need to be used to successfully detect PUE attacks Other techniques such as machine learning or data smoothing may be used to increase the accuracy of final decision