SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Science and Engineering Applications
Volume 4 Issue 5,2015, ISSN 2319
Detection of PUE Attack by SPARS Model using WSPRT
S.Karthik Sairam
Department of ECE
Vardhaman College of Engineering
Telangana, India
Abstract: Cognitive radio is a system which improves the utilization of the spectrum by sensing the white spaces in its vicinity. This
sensed information will be utilized by the Secondary User (SU) to transmit the data. But some of the malicious users attacks th
system by generating the signal same as that of the primary transmitter. The attack caused by generating the signal same as t
primary transmitter is called as Primary User Emulation Attack (PUEA). In this paper the Signal Activity Pattern Acquisition
Reconstruction System (SPARS) is used to detect the attack. But this system suffers from low True Positive Rate. To incr
positive rate or sensitivity a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT). By
improving the true positive rate or sensitivity, the detection capability of the system will be improved.
Keywords: Primary User Emulation Attack;
Reconstruction System; True Positive Rate; Weighted Se
1. INTRODUCTION
Cognitive radio is a dynamic spectrum management system
which continuously senses the available channels in the
wireless spectrum. The sensing process is continuously
performed to detect the white spaces. The white spaces are the
unused frequency bands of the primary user. The secondary
user transmits the information by using the white spaces. But
when the primary user comes, the secondary user has to
vacate that frequency band. There are several spectral sensing
algorithms [1] to detect the white spaces. As the information
about the white spaces is continuously updated, the secondary
user can jump from one frequency band or white space to
another frequency band and continues its transmission.
But some of the secondary users act as selfish or malicious
users. The selfish user attacks the unoccupied frequency band.
It attacks the unoccupied frequency band for its own
transmission. But the malicious user attacks both unoccupied
frequency band and the band used by the legitimate secondary
user for disturbing the transmission. They disturb the
transmission by generating signal same as that of secondary
user. The attack caused by generating the signal same as that
of primary user is called Primary User Emulation Attack
(PUEA) [2].
Primary user emulation attack has severe impact on the
cognitive radio network. The impact includes Quality of
Service degradation, wastage of bandwidth, connection
unreliability and Denial of Service given by [3]. There are
several detection schemes to detect Primary User Emulation
Attack (PUEA) like Location Based Method, Hearing is
believing [4], Dogfight [5], Belief Propagation [6] etc.
In this paper, a new detection technique called Signal Activity
Pattern Acquisition and Reconstruction System (SPARS)
technique [7] is used to detect the Primary User Emulation
Attack. The advantages of the SPARS technique includes
1. SPARS technique doesn’t require prior knowledge
of Primary Users like location of primary user.
2. It has no limitation on static primary users or
primary users with extractable identities.
International Journal of Science and Engineering Applications
Volume 4 Issue 5,2015, ISSN 2319-7560 (Online)
Detection of PUE Attack by SPARS Model using WSPRT
Vardhaman College of Engineering
T. Ramakrishnaiah
Department of ECE
Vardhaman College of Engineering
Telangana, India
Cognitive radio is a system which improves the utilization of the spectrum by sensing the white spaces in its vicinity. This
nsed information will be utilized by the Secondary User (SU) to transmit the data. But some of the malicious users attacks th
system by generating the signal same as that of the primary transmitter. The attack caused by generating the signal same as t
primary transmitter is called as Primary User Emulation Attack (PUEA). In this paper the Signal Activity Pattern Acquisition
Reconstruction System (SPARS) is used to detect the attack. But this system suffers from low True Positive Rate. To incr
positive rate or sensitivity a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT). By
improving the true positive rate or sensitivity, the detection capability of the system will be improved.
Secondary User; Signal Activity Pattern; Signal Activity Pattern Acquisition and
Weighted Sequential Probability Ratio Test; White Space.
ectrum management system
which continuously senses the available channels in the
wireless spectrum. The sensing process is continuously
performed to detect the white spaces. The white spaces are the
unused frequency bands of the primary user. The secondary
user transmits the information by using the white spaces. But
when the primary user comes, the secondary user has to
vacate that frequency band. There are several spectral sensing
algorithms [1] to detect the white spaces. As the information
te spaces is continuously updated, the secondary
user can jump from one frequency band or white space to
another frequency band and continues its transmission.
But some of the secondary users act as selfish or malicious
unoccupied frequency band.
It attacks the unoccupied frequency band for its own
transmission. But the malicious user attacks both unoccupied
frequency band and the band used by the legitimate secondary
user for disturbing the transmission. They disturb the
transmission by generating signal same as that of secondary
user. The attack caused by generating the signal same as that
of primary user is called Primary User Emulation Attack
Primary user emulation attack has severe impact on the
radio network. The impact includes Quality of
Service degradation, wastage of bandwidth, connection
unreliability and Denial of Service given by [3]. There are
several detection schemes to detect Primary User Emulation
hod, Hearing is
believing [4], Dogfight [5], Belief Propagation [6] etc.
In this paper, a new detection technique called Signal Activity
Pattern Acquisition and Reconstruction System (SPARS)
technique [7] is used to detect the Primary User Emulation
k. The advantages of the SPARS technique includes
SPARS technique doesn’t require prior knowledge
of Primary Users like location of primary user.
It has no limitation on static primary users or
primary users with extractable identities.
3. This technique directly targets the objective of the
attacker, which the attacker cannot hide.
4. Utilizes a “tolerance interval” technique to test the
normality of the reconstruction error.
The SPARS system uses the Bayesian method [8] for data
fusion to train SPARS and for Signal Activity Pattern (SAP)
reconstruction. The sparse modeling has been widely used in
the literature to solve various problems in science and
engineering fields [9]-[11]. SPARS system suffers from
byzantine failure problem. The Byzantine failure problem
be caused by malfunctioning sensing terminals or Spectrum
Sensing Data Falsification (SSDF) attacks. The Spectrum
Sensing Data Falsification (SSDF) attack was shown in
Figure.1. A malfunctioning sensing terminal is unable to
conduct reliable local spectrum sensing and may send
incorrect sensing reports to the data collector. In an SSDF
attack, a malicious secondary intentionally sends falsified
local spectrum sensing reports to the data collector in an
attempt to cause the data collector to make incorr
sensing decisions. Either case could potentially cause
interference to legitimate secondary users and result in under
utilization of fallow licensed spectrum. We consider the
Byzantine failure problem [12] from the perspective of data
fusion techniques. This problem causes the decrease in True
Positive Ratio.
Figure.1 Spectrum Sensing Data Falsification Attack
Detection of PUE Attack by SPARS Model using WSPRT
T. Ramakrishnaiah
Department of ECE
Vardhaman College of Engineering
Telangana, India
Cognitive radio is a system which improves the utilization of the spectrum by sensing the white spaces in its vicinity. This
nsed information will be utilized by the Secondary User (SU) to transmit the data. But some of the malicious users attacks the
system by generating the signal same as that of the primary transmitter. The attack caused by generating the signal same as that of the
primary transmitter is called as Primary User Emulation Attack (PUEA). In this paper the Signal Activity Pattern Acquisition and
Reconstruction System (SPARS) is used to detect the attack. But this system suffers from low True Positive Rate. To increase the True
positive rate or sensitivity a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT). By
Signal Activity Pattern Acquisition and
ctly targets the objective of the
attacker, which the attacker cannot hide.
Utilizes a “tolerance interval” technique to test the
normality of the reconstruction error.
The SPARS system uses the Bayesian method [8] for data
ignal Activity Pattern (SAP)
reconstruction. The sparse modeling has been widely used in
the literature to solve various problems in science and
[11]. SPARS system suffers from
byzantine failure problem. The Byzantine failure problem can
be caused by malfunctioning sensing terminals or Spectrum
Sensing Data Falsification (SSDF) attacks. The Spectrum
Sensing Data Falsification (SSDF) attack was shown in
1. A malfunctioning sensing terminal is unable to
ctrum sensing and may send
incorrect sensing reports to the data collector. In an SSDF
attack, a malicious secondary intentionally sends falsified
local spectrum sensing reports to the data collector in an
attempt to cause the data collector to make incorrect spectrum
sensing decisions. Either case could potentially cause
interference to legitimate secondary users and result in under-
utilization of fallow licensed spectrum. We consider the
Byzantine failure problem [12] from the perspective of data
echniques. This problem causes the decrease in True
Figure.1 Spectrum Sensing Data Falsification Attack
International Journal of Science and Engineering Applications
Volume 4 Issue 5,2015, ISSN 2319-7560 (Online)
www.ijsea.com 270
True positive rate or Sensitivity measures the proportion of
positives that are correctly detected as Primary User
Emulation Attack. To improve the true positive ratio, a new
technique was proposed called as Weighted Sequential
Probability Ratio Test (WSPRT) [12] to improve robustness
against Byzantine failures.
Rest of the paper organized as follows, Section II explains the
WSPRT Technique, Section III explains the System Model,
Section IV explains Simulation Results and Section V
concludes the paper.
2. WSPRT TECHNIQUE
To improve true positive rate, WSPRT technique is used.
WSPRT is composed of two parts.
1. A credit maintenance/ reputation maintenance/
weight allocation module and
2. A sequential hypothesis test module
In the credit/reputation/weight module, a terminal’s credit is
allocated based on the accuracy of its sensing. If it’s local
sensing report is consistent with the global decision, its credit
receives one point bonus, otherwise one point penalty. The
weight is defined as the normalized credit, and is applied as
the index of probability ratio in the test.
Let r
i
is the each user’s reputation, its weight is w
i
and H0,
H1 are Hypothesis then decision variable
[ / ]1( )
0 [ / ]0
n P u H wi iWn
i P u Hi
∏=
=
(1)
Decision rule is as follows
If 1 1W Accept Hn λ≥ →
If 0 0W Accept Hn λ≤ →
If 0 1W Take another Observationnλ λ< < →
Decision threshold λ0 and λ1 is identified by false alarm
probability Q
f
and Miss Detection probability Q
m
.
/ (1 )0 Q Qm fλ = − (2)
(1 ) /1 Q Qm fλ = − (3)
Assuming, the reputation of a single cognitive radio user is
expressed as ir , each users local decision is u
i
and it is
compared with the fusion center final decision u then update
the reputation according to the rule
( 1)
u uir ri i
+
= + − (4)
The weight of each user can be adjusted as
( ) 0,w f r r gi i i= = ≤ (5)
( ) / max( ) ,w f r r g r g r gi i i i i= = + + > (6)
Where
0wi = judges the user to the malicious user
In order to obtain a hypothesis test using Weighted
Sequential Probability Ratio Test (WSPRT), it is essential to
obtain the probability density function pdf of the received
signal at the secondary user due to transmission by the
primary and the malicious users.
3. SYSTEM MODEL
We consider a scenario where all secondary and malicious
users are distributed in a circular grid. A primary user is
located at some distance from all the users. The Secondary
users sense the spectrum to detect the presence of the primary
transmission. The secondary users 1 measure the received
power on a spectrum band. If the received power is below a
specified threshold then the spectrum band is considered to be
vacant (white space). If the received power is above the
specified threshold then based on the measured power, they
decide whether the received signal is from a primary
transmitter or by a set of malicious users. We design a
WSPRT to obtain a criterion for making the decision
mentioned above.
We make the following assumptions to perform the analysis.
1) Take M malicious users in the system.
2) Take the minimum distance between primary
transmitter and the users is pd .
3) Consider the power transmitted by the primary
transmitter is Pt and by the malicious user is Pm.
4) Take the circular grid of radius R and assume that
the positions of secondary and malicious users are
uniformly distributed and statistically independent.
5) Consider the position of the primary transmitter is
fixed at a point ( , )rp pθ and this position is known
to all the users in the grid.
6) The Rayleigh fading of RF signal generated by the
primary transmitter and malicious secondary users
can be ignored..
7) The loss due to shadowing at any secondary user is
normally distributed with mean 0 and variance
2
pσ and
2
mσ , respectively.
8) The path loss exponent for the propagation from the
primary transmitter to any secondary users is 2 and
that between any malicious user and any secondary
user is 4.
9) For any secondary user fixed at co-ordinates ( , )r θ ,
no malicious users are present within a circle of
radius R0 centered at
3
( , )r θ .
10) There is no communication or co-operation between
the secondary users. The impact of Primary User
Emulation Attack (PUEA) on each secondary user
is analyzed independently.
Since there is no co-operation between the secondary users,
the probability of successful PUEA on any user is same as
that on any other user. Hence, without loss of generality, we
analyze the probability density function pdf of the received
signal at any one secondary user. We transform the co-
ordinates of all malicious users such that the secondary user of
interest lies at the origin (i.e., at (0, 0)).
International Journal of Science and Engineering Applications
Volume 4 Issue 5,2015, ISSN 2319-7560 (Online)
www.ijsea.com 271
Then the primary transmitter is at a co-ordinate
4
( , )d p pθ .
All malicious nodes are uniformly distributed in the annular
region with radii R0 and R by assumption 4. This scenario is
shown in Figure.2. In order to obtain a hypothesis test using
Weighted Sequential Probability Ratio Test (WSPRT), it is
essential to obtain the probability density function pdf of the
received signal at the secondary user due to transmission by
the primary and the malicious users.
Figure. 2 Cognitive Radio Network in a circular grid with Secondary
and Malicious Users
No malicious users can be closer than R0 to the secondary
user because if this restriction is not posted, then the power
received due to transmission from any subset of malicious
users present within this grid will be much larger than that due
to a transmission from a primary transmitter thus resulting in
failed PUEA all the time.
4. SIMULATION RESULTS
In this section we present simulation results of the proposed
method. In our simulation, we take range = [-5 5 -5 5], M
best=4, n=20, Max Generation=100.
The receiver operating characteristic (ROC) curve of SPARS
is a plot of the true positive rate, i.e., 1- miss-detection
probability versus the false positive rate, i.e., the false alarm
probability.
Figure. 3 ROC curves of SPARS for detecting smart attackers
Figure.3 shows the ROC curves of SPARS for detecting smart
attackers. A smart attacker can manipulate its ON/OFF
periods so that the mean ON/OFF period is more close to the
one of PUs. Specifically, a smart attacker randomly generates
a small fraction of very short ON periods.
Figure. 4 ROC curves of SPARS for detecting smart attackers using
WSPRT
Figure.4 shows the improvement of true positive rate in
proposed method compared to the existing method which is
achieved by using Weighted Sequential Probability Ratio Test
(WSPRT) technique.
5. CONCLUSION
The SPARS model is an efficient detection technique which is
used to detect the PUE attack based on the Signal Activity
Pattern (SAP). This system suffers from low True Positive
Ratio due to the impact of byzantine failure problem. In this
paper, we proposed a technique called Weighted Sequential
Probability Ratio Test. The performance of the SPARS model
can be increased by increasing the sensitivity or True Positive
Ratio of the system, which will be achieved by using the
WSPRT technique.
6. REFERENCES
[1] Tevfik Yucek and Huseyin Arslan.2009, “A Survey of
Spectrum Sensing Algorithms for Cognitive Radio
Applications,” IEEE Communication Surveys and
Tutorials, Vol. 11, No. 1, pp. 116-130.
[2] Z. Jin, S. Anand, and K P. Subbalakshmi.2009,
“Detecting primary user emulation attacks in dynamic
spectrum access networks,” IEEE IntI. Conf. on
Commun. (ICC).
[3] Abhilasha Singh and Anita Sharma.2000, “A Survey of
Various Defense Techniques to Detect Primary User
Emulation Attacks,” International Journal of Current
Engineering and Technology, Vol. 4, No. 2.
[4] S. Chen, K. Zeng, and P. Mohapatra.2011, “Hearing is
believing: Detecting mobile primary user emulation
attack in white space,” Proc. IEEE INFOCOM.
[5] H. Li and Z. Han.2011, “Dogfight in spectrum:
Combating primary user emulation attacks in cognitive
radio systems, Part II: Unknown channel statistics,”
IEEE Trans. Wireless Commun, Vol. 10, pp.274-283.
International Journal of Science and Engineering Applications
Volume 4 Issue 5,2015, ISSN 2319-7560 (Online)
www.ijsea.com 272
[6] Z. Yuan, D. Niyato, H. Li, and Z. Han.2011, “Defense
against primary user emulation attacks using belief
propagation of location information in cognitive radio
networks,” Proc. IEEE WCNC.
[7] ChunSheng Xin and Min Song.2014, “Detection of PUE
attack in cognitive radio system based on signal activity
pattern,” IEEE Transactions on mobile computing,
Vol.13, No. 5.
[8] P. K. Varshney.1997, “Distributed Detection and Data
Fusion,” Springer-Verlag.
[9] R. Rubinstein, M. Zibulevsky, and M. Elad.2010,
“Double sparsity: Learning sparse dictionaries for sparse
signal approximation,” IEEE Trans. Signal Process, vol.
58, no. 3, pp. 1553-1564.
[10] D. L. Donoho.2006, “For most large underdetermined
systems of equations, the minimal l1-norm near-solution
approximates the sparsest near-solution,” Wiley
Commun. Pure Appl. Math, vol. 59, no. 7, pp. 907-934.
[11] J. Wright, A. Yang, A. Ganesh, S. Sastry, and Y.
Mal.2009, “Robust face recognition via sparse
representation,” IEEE Trans. Pattern Anal. Mach. Intell,
vol. 31, no. 2, pp. 210-227.
[12] Ruiliang Chen, Jung-Min Park and Kaigui Bian.2008,
“Robust Distributed Spectrum Sensing in Cognitive
Radio Networks,” Lab for ARIAS, DOI:
10.1109/INFOCOM.2008.251.

More Related Content

What's hot

An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...ijsrd.com
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksA Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksIRJET Journal
 
Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...Editor IJCATR
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LogicMindtech Nologies
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
Paper for the Journal of Networks and Systems Management - JNSM 2000
Paper for the Journal of Networks and Systems Management - JNSM 2000Paper for the Journal of Networks and Systems Management - JNSM 2000
Paper for the Journal of Networks and Systems Management - JNSM 2000Dr. Edwin Hernandez
 
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLANAnalysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLANijtsrd
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
 
Secure data aggregation technique for wireless
Secure data aggregation technique for wirelessSecure data aggregation technique for wireless
Secure data aggregation technique for wirelessjpstudcorner
 
SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSING
SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSINGSENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSING
SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSINGIJARIDEA Journal
 
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...cscpconf
 

What's hot (17)

A1803060110
A1803060110A1803060110
A1803060110
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksA Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
 
50120140506010
5012014050601050120140506010
50120140506010
 
Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
Paper for the Journal of Networks and Systems Management - JNSM 2000
Paper for the Journal of Networks and Systems Management - JNSM 2000Paper for the Journal of Networks and Systems Management - JNSM 2000
Paper for the Journal of Networks and Systems Management - JNSM 2000
 
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLANAnalysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
 
Sub1568
Sub1568Sub1568
Sub1568
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
 
Secure data aggregation technique for wireless
Secure data aggregation technique for wirelessSecure data aggregation technique for wireless
Secure data aggregation technique for wireless
 
SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSING
SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSINGSENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSING
SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSING
 
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
 

Viewers also liked

EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...Editor IJCATR
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Route Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringRoute Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringEditor IJCATR
 
Simulation of A TZFI Fed Induction Motor Drive Using Fuzzy Logic Control
Simulation of A TZFI Fed Induction Motor Drive Using Fuzzy Logic ControlSimulation of A TZFI Fed Induction Motor Drive Using Fuzzy Logic Control
Simulation of A TZFI Fed Induction Motor Drive Using Fuzzy Logic ControlEditor IJCATR
 
Effect of Adding Indium on Wetting Behavior, Microstructure and Physical Prop...
Effect of Adding Indium on Wetting Behavior, Microstructure and Physical Prop...Effect of Adding Indium on Wetting Behavior, Microstructure and Physical Prop...
Effect of Adding Indium on Wetting Behavior, Microstructure and Physical Prop...Editor IJCATR
 
A Review on Comparison of the Geographic Routing Protocols in MANET
A Review on Comparison of the Geographic Routing Protocols in MANETA Review on Comparison of the Geographic Routing Protocols in MANET
A Review on Comparison of the Geographic Routing Protocols in MANETEditor IJCATR
 
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...Editor IJCATR
 
A Survey of Existing Mechanisms in Energy-Aware Routing In MANETs
A Survey of Existing Mechanisms in Energy-Aware Routing In MANETsA Survey of Existing Mechanisms in Energy-Aware Routing In MANETs
A Survey of Existing Mechanisms in Energy-Aware Routing In MANETsEditor IJCATR
 
Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alco...
Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alco...Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alco...
Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alco...Editor IJCATR
 
Collision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular CommunicationCollision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular CommunicationEditor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Traffic Light Controller System using Optical Flow Estimation
Traffic Light Controller System using Optical Flow EstimationTraffic Light Controller System using Optical Flow Estimation
Traffic Light Controller System using Optical Flow EstimationEditor IJCATR
 
Relationship between transformational leadership, Innovation, Learning and Gr...
Relationship between transformational leadership, Innovation, Learning and Gr...Relationship between transformational leadership, Innovation, Learning and Gr...
Relationship between transformational leadership, Innovation, Learning and Gr...Editor IJCATR
 
Survey on Indian CLIR and MT systems in Marathi Language
Survey on Indian CLIR and MT systems in Marathi LanguageSurvey on Indian CLIR and MT systems in Marathi Language
Survey on Indian CLIR and MT systems in Marathi LanguageEditor IJCATR
 
A Mediating Role of Knowledge Management System in the Relationship between I...
A Mediating Role of Knowledge Management System in the Relationship between I...A Mediating Role of Knowledge Management System in the Relationship between I...
A Mediating Role of Knowledge Management System in the Relationship between I...Editor IJCATR
 

Viewers also liked (18)

EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Route Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringRoute Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node Clustering
 
Simulation of A TZFI Fed Induction Motor Drive Using Fuzzy Logic Control
Simulation of A TZFI Fed Induction Motor Drive Using Fuzzy Logic ControlSimulation of A TZFI Fed Induction Motor Drive Using Fuzzy Logic Control
Simulation of A TZFI Fed Induction Motor Drive Using Fuzzy Logic Control
 
Effect of Adding Indium on Wetting Behavior, Microstructure and Physical Prop...
Effect of Adding Indium on Wetting Behavior, Microstructure and Physical Prop...Effect of Adding Indium on Wetting Behavior, Microstructure and Physical Prop...
Effect of Adding Indium on Wetting Behavior, Microstructure and Physical Prop...
 
A Review on Comparison of the Geographic Routing Protocols in MANET
A Review on Comparison of the Geographic Routing Protocols in MANETA Review on Comparison of the Geographic Routing Protocols in MANET
A Review on Comparison of the Geographic Routing Protocols in MANET
 
Ijcatr04061005
Ijcatr04061005Ijcatr04061005
Ijcatr04061005
 
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
 
A Survey of Existing Mechanisms in Energy-Aware Routing In MANETs
A Survey of Existing Mechanisms in Energy-Aware Routing In MANETsA Survey of Existing Mechanisms in Energy-Aware Routing In MANETs
A Survey of Existing Mechanisms in Energy-Aware Routing In MANETs
 
Ijcatr04061008
Ijcatr04061008Ijcatr04061008
Ijcatr04061008
 
Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alco...
Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alco...Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alco...
Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alco...
 
Collision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular CommunicationCollision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular Communication
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Ijcatr04071004
Ijcatr04071004Ijcatr04071004
Ijcatr04071004
 
Traffic Light Controller System using Optical Flow Estimation
Traffic Light Controller System using Optical Flow EstimationTraffic Light Controller System using Optical Flow Estimation
Traffic Light Controller System using Optical Flow Estimation
 
Relationship between transformational leadership, Innovation, Learning and Gr...
Relationship between transformational leadership, Innovation, Learning and Gr...Relationship between transformational leadership, Innovation, Learning and Gr...
Relationship between transformational leadership, Innovation, Learning and Gr...
 
Survey on Indian CLIR and MT systems in Marathi Language
Survey on Indian CLIR and MT systems in Marathi LanguageSurvey on Indian CLIR and MT systems in Marathi Language
Survey on Indian CLIR and MT systems in Marathi Language
 
A Mediating Role of Knowledge Management System in the Relationship between I...
A Mediating Role of Knowledge Management System in the Relationship between I...A Mediating Role of Knowledge Management System in the Relationship between I...
A Mediating Role of Knowledge Management System in the Relationship between I...
 

Similar to Detection of PUE Attack by SPARS Model using WSPRT

DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...IAEME Publication
 
Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...IJECEIAES
 
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKSSURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKSijcseit
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...Eswar Publications
 
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKSSURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKSijcseit
 
Performance Analysis of Bayesian Methods to for the Spectrum Utilization in C...
Performance Analysis of Bayesian Methods to for the Spectrum Utilization in C...Performance Analysis of Bayesian Methods to for the Spectrum Utilization in C...
Performance Analysis of Bayesian Methods to for the Spectrum Utilization in C...ijtsrd
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio IOSR Journals
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioAn Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioIOSR Journals
 
Anomalous payload based network intrusion detection
Anomalous payload based network intrusion detectionAnomalous payload based network intrusion detection
Anomalous payload based network intrusion detectionUltraUploader
 
International Journal of Computer Science and Security Volume (3) Issue (2)
International Journal of Computer Science and Security Volume (3) Issue (2)International Journal of Computer Science and Security Volume (3) Issue (2)
International Journal of Computer Science and Security Volume (3) Issue (2)CSCJournals
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
 
Distributed fault tolerant event
Distributed fault tolerant eventDistributed fault tolerant event
Distributed fault tolerant eventijscai
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksAlexander Decker
 
Malicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksMalicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksTELKOMNIKA JOURNAL
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...1crore projects
 
A security method for multiple attacks in sensor networks against false repor...
A security method for multiple attacks in sensor networks against false repor...A security method for multiple attacks in sensor networks against false repor...
A security method for multiple attacks in sensor networks against false repor...ieijjournal
 
Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...
Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...
Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...ijsc
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSaroj Dhakal
 

Similar to Detection of PUE Attack by SPARS Model using WSPRT (20)

DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
 
Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...
 
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKSSURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
 
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKSSURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
 
Performance Analysis of Bayesian Methods to for the Spectrum Utilization in C...
Performance Analysis of Bayesian Methods to for the Spectrum Utilization in C...Performance Analysis of Bayesian Methods to for the Spectrum Utilization in C...
Performance Analysis of Bayesian Methods to for the Spectrum Utilization in C...
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioAn Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
 
Anomalous payload based network intrusion detection
Anomalous payload based network intrusion detectionAnomalous payload based network intrusion detection
Anomalous payload based network intrusion detection
 
International Journal of Computer Science and Security Volume (3) Issue (2)
International Journal of Computer Science and Security Volume (3) Issue (2)International Journal of Computer Science and Security Volume (3) Issue (2)
International Journal of Computer Science and Security Volume (3) Issue (2)
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
 
Distributed fault tolerant event
Distributed fault tolerant eventDistributed fault tolerant event
Distributed fault tolerant event
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networks
 
Malicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksMalicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio Networks
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
 
A security method for multiple attacks in sensor networks against false repor...
A security method for multiple attacks in sensor networks against false repor...A security method for multiple attacks in sensor networks against false repor...
A security method for multiple attacks in sensor networks against false repor...
 
Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...
Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...
Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
 

More from Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineEditor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in EducationEditor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
 

More from Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Recently uploaded

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Recently uploaded (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Detection of PUE Attack by SPARS Model using WSPRT

  • 1. International Journal of Science and Engineering Applications Volume 4 Issue 5,2015, ISSN 2319 Detection of PUE Attack by SPARS Model using WSPRT S.Karthik Sairam Department of ECE Vardhaman College of Engineering Telangana, India Abstract: Cognitive radio is a system which improves the utilization of the spectrum by sensing the white spaces in its vicinity. This sensed information will be utilized by the Secondary User (SU) to transmit the data. But some of the malicious users attacks th system by generating the signal same as that of the primary transmitter. The attack caused by generating the signal same as t primary transmitter is called as Primary User Emulation Attack (PUEA). In this paper the Signal Activity Pattern Acquisition Reconstruction System (SPARS) is used to detect the attack. But this system suffers from low True Positive Rate. To incr positive rate or sensitivity a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT). By improving the true positive rate or sensitivity, the detection capability of the system will be improved. Keywords: Primary User Emulation Attack; Reconstruction System; True Positive Rate; Weighted Se 1. INTRODUCTION Cognitive radio is a dynamic spectrum management system which continuously senses the available channels in the wireless spectrum. The sensing process is continuously performed to detect the white spaces. The white spaces are the unused frequency bands of the primary user. The secondary user transmits the information by using the white spaces. But when the primary user comes, the secondary user has to vacate that frequency band. There are several spectral sensing algorithms [1] to detect the white spaces. As the information about the white spaces is continuously updated, the secondary user can jump from one frequency band or white space to another frequency band and continues its transmission. But some of the secondary users act as selfish or malicious users. The selfish user attacks the unoccupied frequency band. It attacks the unoccupied frequency band for its own transmission. But the malicious user attacks both unoccupied frequency band and the band used by the legitimate secondary user for disturbing the transmission. They disturb the transmission by generating signal same as that of secondary user. The attack caused by generating the signal same as that of primary user is called Primary User Emulation Attack (PUEA) [2]. Primary user emulation attack has severe impact on the cognitive radio network. The impact includes Quality of Service degradation, wastage of bandwidth, connection unreliability and Denial of Service given by [3]. There are several detection schemes to detect Primary User Emulation Attack (PUEA) like Location Based Method, Hearing is believing [4], Dogfight [5], Belief Propagation [6] etc. In this paper, a new detection technique called Signal Activity Pattern Acquisition and Reconstruction System (SPARS) technique [7] is used to detect the Primary User Emulation Attack. The advantages of the SPARS technique includes 1. SPARS technique doesn’t require prior knowledge of Primary Users like location of primary user. 2. It has no limitation on static primary users or primary users with extractable identities. International Journal of Science and Engineering Applications Volume 4 Issue 5,2015, ISSN 2319-7560 (Online) Detection of PUE Attack by SPARS Model using WSPRT Vardhaman College of Engineering T. Ramakrishnaiah Department of ECE Vardhaman College of Engineering Telangana, India Cognitive radio is a system which improves the utilization of the spectrum by sensing the white spaces in its vicinity. This nsed information will be utilized by the Secondary User (SU) to transmit the data. But some of the malicious users attacks th system by generating the signal same as that of the primary transmitter. The attack caused by generating the signal same as t primary transmitter is called as Primary User Emulation Attack (PUEA). In this paper the Signal Activity Pattern Acquisition Reconstruction System (SPARS) is used to detect the attack. But this system suffers from low True Positive Rate. To incr positive rate or sensitivity a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT). By improving the true positive rate or sensitivity, the detection capability of the system will be improved. Secondary User; Signal Activity Pattern; Signal Activity Pattern Acquisition and Weighted Sequential Probability Ratio Test; White Space. ectrum management system which continuously senses the available channels in the wireless spectrum. The sensing process is continuously performed to detect the white spaces. The white spaces are the unused frequency bands of the primary user. The secondary user transmits the information by using the white spaces. But when the primary user comes, the secondary user has to vacate that frequency band. There are several spectral sensing algorithms [1] to detect the white spaces. As the information te spaces is continuously updated, the secondary user can jump from one frequency band or white space to another frequency band and continues its transmission. But some of the secondary users act as selfish or malicious unoccupied frequency band. It attacks the unoccupied frequency band for its own transmission. But the malicious user attacks both unoccupied frequency band and the band used by the legitimate secondary user for disturbing the transmission. They disturb the transmission by generating signal same as that of secondary user. The attack caused by generating the signal same as that of primary user is called Primary User Emulation Attack Primary user emulation attack has severe impact on the radio network. The impact includes Quality of Service degradation, wastage of bandwidth, connection unreliability and Denial of Service given by [3]. There are several detection schemes to detect Primary User Emulation hod, Hearing is believing [4], Dogfight [5], Belief Propagation [6] etc. In this paper, a new detection technique called Signal Activity Pattern Acquisition and Reconstruction System (SPARS) technique [7] is used to detect the Primary User Emulation k. The advantages of the SPARS technique includes SPARS technique doesn’t require prior knowledge of Primary Users like location of primary user. It has no limitation on static primary users or primary users with extractable identities. 3. This technique directly targets the objective of the attacker, which the attacker cannot hide. 4. Utilizes a “tolerance interval” technique to test the normality of the reconstruction error. The SPARS system uses the Bayesian method [8] for data fusion to train SPARS and for Signal Activity Pattern (SAP) reconstruction. The sparse modeling has been widely used in the literature to solve various problems in science and engineering fields [9]-[11]. SPARS system suffers from byzantine failure problem. The Byzantine failure problem be caused by malfunctioning sensing terminals or Spectrum Sensing Data Falsification (SSDF) attacks. The Spectrum Sensing Data Falsification (SSDF) attack was shown in Figure.1. A malfunctioning sensing terminal is unable to conduct reliable local spectrum sensing and may send incorrect sensing reports to the data collector. In an SSDF attack, a malicious secondary intentionally sends falsified local spectrum sensing reports to the data collector in an attempt to cause the data collector to make incorr sensing decisions. Either case could potentially cause interference to legitimate secondary users and result in under utilization of fallow licensed spectrum. We consider the Byzantine failure problem [12] from the perspective of data fusion techniques. This problem causes the decrease in True Positive Ratio. Figure.1 Spectrum Sensing Data Falsification Attack Detection of PUE Attack by SPARS Model using WSPRT T. Ramakrishnaiah Department of ECE Vardhaman College of Engineering Telangana, India Cognitive radio is a system which improves the utilization of the spectrum by sensing the white spaces in its vicinity. This nsed information will be utilized by the Secondary User (SU) to transmit the data. But some of the malicious users attacks the system by generating the signal same as that of the primary transmitter. The attack caused by generating the signal same as that of the primary transmitter is called as Primary User Emulation Attack (PUEA). In this paper the Signal Activity Pattern Acquisition and Reconstruction System (SPARS) is used to detect the attack. But this system suffers from low True Positive Rate. To increase the True positive rate or sensitivity a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT). By Signal Activity Pattern Acquisition and ctly targets the objective of the attacker, which the attacker cannot hide. Utilizes a “tolerance interval” technique to test the normality of the reconstruction error. The SPARS system uses the Bayesian method [8] for data ignal Activity Pattern (SAP) reconstruction. The sparse modeling has been widely used in the literature to solve various problems in science and [11]. SPARS system suffers from byzantine failure problem. The Byzantine failure problem can be caused by malfunctioning sensing terminals or Spectrum Sensing Data Falsification (SSDF) attacks. The Spectrum Sensing Data Falsification (SSDF) attack was shown in 1. A malfunctioning sensing terminal is unable to ctrum sensing and may send incorrect sensing reports to the data collector. In an SSDF attack, a malicious secondary intentionally sends falsified local spectrum sensing reports to the data collector in an attempt to cause the data collector to make incorrect spectrum sensing decisions. Either case could potentially cause interference to legitimate secondary users and result in under- utilization of fallow licensed spectrum. We consider the Byzantine failure problem [12] from the perspective of data echniques. This problem causes the decrease in True Figure.1 Spectrum Sensing Data Falsification Attack
  • 2. International Journal of Science and Engineering Applications Volume 4 Issue 5,2015, ISSN 2319-7560 (Online) www.ijsea.com 270 True positive rate or Sensitivity measures the proportion of positives that are correctly detected as Primary User Emulation Attack. To improve the true positive ratio, a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT) [12] to improve robustness against Byzantine failures. Rest of the paper organized as follows, Section II explains the WSPRT Technique, Section III explains the System Model, Section IV explains Simulation Results and Section V concludes the paper. 2. WSPRT TECHNIQUE To improve true positive rate, WSPRT technique is used. WSPRT is composed of two parts. 1. A credit maintenance/ reputation maintenance/ weight allocation module and 2. A sequential hypothesis test module In the credit/reputation/weight module, a terminal’s credit is allocated based on the accuracy of its sensing. If it’s local sensing report is consistent with the global decision, its credit receives one point bonus, otherwise one point penalty. The weight is defined as the normalized credit, and is applied as the index of probability ratio in the test. Let r i is the each user’s reputation, its weight is w i and H0, H1 are Hypothesis then decision variable [ / ]1( ) 0 [ / ]0 n P u H wi iWn i P u Hi ∏= = (1) Decision rule is as follows If 1 1W Accept Hn λ≥ → If 0 0W Accept Hn λ≤ → If 0 1W Take another Observationnλ λ< < → Decision threshold λ0 and λ1 is identified by false alarm probability Q f and Miss Detection probability Q m . / (1 )0 Q Qm fλ = − (2) (1 ) /1 Q Qm fλ = − (3) Assuming, the reputation of a single cognitive radio user is expressed as ir , each users local decision is u i and it is compared with the fusion center final decision u then update the reputation according to the rule ( 1) u uir ri i + = + − (4) The weight of each user can be adjusted as ( ) 0,w f r r gi i i= = ≤ (5) ( ) / max( ) ,w f r r g r g r gi i i i i= = + + > (6) Where 0wi = judges the user to the malicious user In order to obtain a hypothesis test using Weighted Sequential Probability Ratio Test (WSPRT), it is essential to obtain the probability density function pdf of the received signal at the secondary user due to transmission by the primary and the malicious users. 3. SYSTEM MODEL We consider a scenario where all secondary and malicious users are distributed in a circular grid. A primary user is located at some distance from all the users. The Secondary users sense the spectrum to detect the presence of the primary transmission. The secondary users 1 measure the received power on a spectrum band. If the received power is below a specified threshold then the spectrum band is considered to be vacant (white space). If the received power is above the specified threshold then based on the measured power, they decide whether the received signal is from a primary transmitter or by a set of malicious users. We design a WSPRT to obtain a criterion for making the decision mentioned above. We make the following assumptions to perform the analysis. 1) Take M malicious users in the system. 2) Take the minimum distance between primary transmitter and the users is pd . 3) Consider the power transmitted by the primary transmitter is Pt and by the malicious user is Pm. 4) Take the circular grid of radius R and assume that the positions of secondary and malicious users are uniformly distributed and statistically independent. 5) Consider the position of the primary transmitter is fixed at a point ( , )rp pθ and this position is known to all the users in the grid. 6) The Rayleigh fading of RF signal generated by the primary transmitter and malicious secondary users can be ignored.. 7) The loss due to shadowing at any secondary user is normally distributed with mean 0 and variance 2 pσ and 2 mσ , respectively. 8) The path loss exponent for the propagation from the primary transmitter to any secondary users is 2 and that between any malicious user and any secondary user is 4. 9) For any secondary user fixed at co-ordinates ( , )r θ , no malicious users are present within a circle of radius R0 centered at 3 ( , )r θ . 10) There is no communication or co-operation between the secondary users. The impact of Primary User Emulation Attack (PUEA) on each secondary user is analyzed independently. Since there is no co-operation between the secondary users, the probability of successful PUEA on any user is same as that on any other user. Hence, without loss of generality, we analyze the probability density function pdf of the received signal at any one secondary user. We transform the co- ordinates of all malicious users such that the secondary user of interest lies at the origin (i.e., at (0, 0)).
  • 3. International Journal of Science and Engineering Applications Volume 4 Issue 5,2015, ISSN 2319-7560 (Online) www.ijsea.com 271 Then the primary transmitter is at a co-ordinate 4 ( , )d p pθ . All malicious nodes are uniformly distributed in the annular region with radii R0 and R by assumption 4. This scenario is shown in Figure.2. In order to obtain a hypothesis test using Weighted Sequential Probability Ratio Test (WSPRT), it is essential to obtain the probability density function pdf of the received signal at the secondary user due to transmission by the primary and the malicious users. Figure. 2 Cognitive Radio Network in a circular grid with Secondary and Malicious Users No malicious users can be closer than R0 to the secondary user because if this restriction is not posted, then the power received due to transmission from any subset of malicious users present within this grid will be much larger than that due to a transmission from a primary transmitter thus resulting in failed PUEA all the time. 4. SIMULATION RESULTS In this section we present simulation results of the proposed method. In our simulation, we take range = [-5 5 -5 5], M best=4, n=20, Max Generation=100. The receiver operating characteristic (ROC) curve of SPARS is a plot of the true positive rate, i.e., 1- miss-detection probability versus the false positive rate, i.e., the false alarm probability. Figure. 3 ROC curves of SPARS for detecting smart attackers Figure.3 shows the ROC curves of SPARS for detecting smart attackers. A smart attacker can manipulate its ON/OFF periods so that the mean ON/OFF period is more close to the one of PUs. Specifically, a smart attacker randomly generates a small fraction of very short ON periods. Figure. 4 ROC curves of SPARS for detecting smart attackers using WSPRT Figure.4 shows the improvement of true positive rate in proposed method compared to the existing method which is achieved by using Weighted Sequential Probability Ratio Test (WSPRT) technique. 5. CONCLUSION The SPARS model is an efficient detection technique which is used to detect the PUE attack based on the Signal Activity Pattern (SAP). This system suffers from low True Positive Ratio due to the impact of byzantine failure problem. In this paper, we proposed a technique called Weighted Sequential Probability Ratio Test. The performance of the SPARS model can be increased by increasing the sensitivity or True Positive Ratio of the system, which will be achieved by using the WSPRT technique. 6. REFERENCES [1] Tevfik Yucek and Huseyin Arslan.2009, “A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications,” IEEE Communication Surveys and Tutorials, Vol. 11, No. 1, pp. 116-130. [2] Z. Jin, S. Anand, and K P. Subbalakshmi.2009, “Detecting primary user emulation attacks in dynamic spectrum access networks,” IEEE IntI. Conf. on Commun. (ICC). [3] Abhilasha Singh and Anita Sharma.2000, “A Survey of Various Defense Techniques to Detect Primary User Emulation Attacks,” International Journal of Current Engineering and Technology, Vol. 4, No. 2. [4] S. Chen, K. Zeng, and P. Mohapatra.2011, “Hearing is believing: Detecting mobile primary user emulation attack in white space,” Proc. IEEE INFOCOM. [5] H. Li and Z. Han.2011, “Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, Part II: Unknown channel statistics,” IEEE Trans. Wireless Commun, Vol. 10, pp.274-283.
  • 4. International Journal of Science and Engineering Applications Volume 4 Issue 5,2015, ISSN 2319-7560 (Online) www.ijsea.com 272 [6] Z. Yuan, D. Niyato, H. Li, and Z. Han.2011, “Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks,” Proc. IEEE WCNC. [7] ChunSheng Xin and Min Song.2014, “Detection of PUE attack in cognitive radio system based on signal activity pattern,” IEEE Transactions on mobile computing, Vol.13, No. 5. [8] P. K. Varshney.1997, “Distributed Detection and Data Fusion,” Springer-Verlag. [9] R. Rubinstein, M. Zibulevsky, and M. Elad.2010, “Double sparsity: Learning sparse dictionaries for sparse signal approximation,” IEEE Trans. Signal Process, vol. 58, no. 3, pp. 1553-1564. [10] D. L. Donoho.2006, “For most large underdetermined systems of equations, the minimal l1-norm near-solution approximates the sparsest near-solution,” Wiley Commun. Pure Appl. Math, vol. 59, no. 7, pp. 907-934. [11] J. Wright, A. Yang, A. Ganesh, S. Sastry, and Y. Mal.2009, “Robust face recognition via sparse representation,” IEEE Trans. Pattern Anal. Mach. Intell, vol. 31, no. 2, pp. 210-227. [12] Ruiliang Chen, Jung-Min Park and Kaigui Bian.2008, “Robust Distributed Spectrum Sensing in Cognitive Radio Networks,” Lab for ARIAS, DOI: 10.1109/INFOCOM.2008.251.