Primary User Emulation Attack (PUEA) is one of the major threats to the spectrum sensing in cognitive radio networks. This paper studies the PUEA using energy detection that is based on the energy of the received signal. It discusses the impact of increasing the number of attackers on the performance of secondary user. Moreover, studying how the malicious user can emulate the Primary User (PU) signal is made. This is the first analytical method to study PUEA under a different number of attackers. The detection of the PUEA increases with increasing the number of attackers and decreases when changing the channel from lognormal to Rayleigh fading.
An Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive RadioIJERD Editor
With rapid growth of wireless devices, the Scarcity of Spectrum resources arises ,due to the improper and inefficient usage of available spectrum band. This problem can be alleviated by Cognitive radio . The major function of the cognitive radio rely on efficient sensing of available spectrum and Spectrum sensing techniques have been used to enhance the detection performance. Among these techniques, Energy detection is considered to be the implemented in practice because of less complexity. In this paper we propose an Adaptive threshold scheme which improves the detection performance under low SNR region. In this paper, noise uncertainty factor is considered wherein the Probability of error is minimized in various SNR regions.
A novel scheme to improve the spectrum sensing performanceIJCNCJournal
Due to limited availability of spectrum for license
d users only, the need for secondary access by unli
censed
users is increasing. Cognitive radio turns out to b
e helping this situation because all that is needed
is a
technique that could efficiently detect the empty s
paces and provide them to the secondary devices wit
hout
causing any interference to the primary (licensed)
users. Spectrum sensing is the foremost function of
the
cognitive radio which senses the environment for wh
ite spaces. Energy detection is one of the various
spectrum sensing techniques that are under research
. Earlier it was shown that energy detection works
better under AWGN channel as compared to Rayleigh c
hannel, however the conventional spectrum sensing
techniques have a high probability of false alarm a
nd also show a better probability of detection for
higher
values of SNR. There is a need for a new technique
that shows a reduced probability of false alarm as
well
as an increase in the probability of detection for
lower values of SNR. In the present work the conven
tional
energy detection technique has been enhanced to get
better results.
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
Wireless Sensor Networks (Wsn) Are Used In Various Areas. These Networks Are Deployed In An Open Environment. So, They Are Very Weak Against An Attack, And Easily Damaged.The Wsn Has Limited Resources In Terms Of Battery Life, Computing Power, Communication Bandwidth And So On. Many Attacks Aim At That Point.The False Report Injection Attack Is One Of Them. Yu Et Al. Proposed A Dynamic En-Route Filtering Scheme (Def),To Prevent A False Report Injection Attack.In This Paper, We Propose An Energy Enhancement Scheme For Def Using A Fuzzy System. The Def Is Divided Into Three Phases (Key Pre-Distribution Phase, Key Dissemination Phase, Report Forwarding Phase). We Applied Our Scheme At The Next Forwarding Node Determination. So We Used Three Input Factors Of A Fuzzy System To Make A Determination. These Are The Availability Of Energy, Distance To The Base Station,
And Usage Count.Through The Experiments, Our Proposed Method Shows Up To 8.2% Energy Efficiency,Compared With The Def. If The Networks Consume More Energy, Our Proposed Method Shows More Efficiency For The Energy.
Comparative Study of Different Non-Cooperative Techniques in Cognitive RadioRSIS International
Wireless technology is expanding its domain and with it
is growing the need for more frequencies for communication.
Cognitive radio offers a solution to this problem by using the
concept of Dynamic spectrum access instead of fixed spectrum
allocation. Such radios are capable of sensing the RF spectrum
for identifying idle frequency bands. It then transmits
opportunistically so as to avoid interference with primary user
over same band. In cognitive radio, intelligent spectrum sensing
forms the major and most important part. Out of the various
sensing techniques, we will give an overview of some of the
prominent non-cooperative techniques. The paper deals with
comparative study of these methods.
Spectrum Sensing Detection Techniques for Overlay UsersIJMTST Journal
Spectrum allocated Agency (FCC) is currently working on the concept of white space users “borrowing” spectrum from free license holders temporarily to improve the spectrum utilization, i.e known as dynamic spectrum access (DSA). CRN systems can utilize dispersed spectrum, and thus such approach is known as dispersed spectrum cognitive radio systems. This project provides a tradeoff between a false alarm probability (Pf) and the signal to noise ratio (SNR) value of any spectrum detector to have a certain performance. Moreover, the performance of the cyclostationary detector (CD) and the matched filter detector (MF) is better than the energy detector(ED) especially at low signal to noise ratio values. Unfortunately, the cyclostationary spectrum sensing method, performance is not satisfying when the wireless fading channels are employed. In this project we provide the best trade off for spectrum usage for over lay users.
An Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive RadioIJERD Editor
With rapid growth of wireless devices, the Scarcity of Spectrum resources arises ,due to the improper and inefficient usage of available spectrum band. This problem can be alleviated by Cognitive radio . The major function of the cognitive radio rely on efficient sensing of available spectrum and Spectrum sensing techniques have been used to enhance the detection performance. Among these techniques, Energy detection is considered to be the implemented in practice because of less complexity. In this paper we propose an Adaptive threshold scheme which improves the detection performance under low SNR region. In this paper, noise uncertainty factor is considered wherein the Probability of error is minimized in various SNR regions.
A novel scheme to improve the spectrum sensing performanceIJCNCJournal
Due to limited availability of spectrum for license
d users only, the need for secondary access by unli
censed
users is increasing. Cognitive radio turns out to b
e helping this situation because all that is needed
is a
technique that could efficiently detect the empty s
paces and provide them to the secondary devices wit
hout
causing any interference to the primary (licensed)
users. Spectrum sensing is the foremost function of
the
cognitive radio which senses the environment for wh
ite spaces. Energy detection is one of the various
spectrum sensing techniques that are under research
. Earlier it was shown that energy detection works
better under AWGN channel as compared to Rayleigh c
hannel, however the conventional spectrum sensing
techniques have a high probability of false alarm a
nd also show a better probability of detection for
higher
values of SNR. There is a need for a new technique
that shows a reduced probability of false alarm as
well
as an increase in the probability of detection for
lower values of SNR. In the present work the conven
tional
energy detection technique has been enhanced to get
better results.
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
Wireless Sensor Networks (Wsn) Are Used In Various Areas. These Networks Are Deployed In An Open Environment. So, They Are Very Weak Against An Attack, And Easily Damaged.The Wsn Has Limited Resources In Terms Of Battery Life, Computing Power, Communication Bandwidth And So On. Many Attacks Aim At That Point.The False Report Injection Attack Is One Of Them. Yu Et Al. Proposed A Dynamic En-Route Filtering Scheme (Def),To Prevent A False Report Injection Attack.In This Paper, We Propose An Energy Enhancement Scheme For Def Using A Fuzzy System. The Def Is Divided Into Three Phases (Key Pre-Distribution Phase, Key Dissemination Phase, Report Forwarding Phase). We Applied Our Scheme At The Next Forwarding Node Determination. So We Used Three Input Factors Of A Fuzzy System To Make A Determination. These Are The Availability Of Energy, Distance To The Base Station,
And Usage Count.Through The Experiments, Our Proposed Method Shows Up To 8.2% Energy Efficiency,Compared With The Def. If The Networks Consume More Energy, Our Proposed Method Shows More Efficiency For The Energy.
Comparative Study of Different Non-Cooperative Techniques in Cognitive RadioRSIS International
Wireless technology is expanding its domain and with it
is growing the need for more frequencies for communication.
Cognitive radio offers a solution to this problem by using the
concept of Dynamic spectrum access instead of fixed spectrum
allocation. Such radios are capable of sensing the RF spectrum
for identifying idle frequency bands. It then transmits
opportunistically so as to avoid interference with primary user
over same band. In cognitive radio, intelligent spectrum sensing
forms the major and most important part. Out of the various
sensing techniques, we will give an overview of some of the
prominent non-cooperative techniques. The paper deals with
comparative study of these methods.
Spectrum Sensing Detection Techniques for Overlay UsersIJMTST Journal
Spectrum allocated Agency (FCC) is currently working on the concept of white space users “borrowing” spectrum from free license holders temporarily to improve the spectrum utilization, i.e known as dynamic spectrum access (DSA). CRN systems can utilize dispersed spectrum, and thus such approach is known as dispersed spectrum cognitive radio systems. This project provides a tradeoff between a false alarm probability (Pf) and the signal to noise ratio (SNR) value of any spectrum detector to have a certain performance. Moreover, the performance of the cyclostationary detector (CD) and the matched filter detector (MF) is better than the energy detector(ED) especially at low signal to noise ratio values. Unfortunately, the cyclostationary spectrum sensing method, performance is not satisfying when the wireless fading channels are employed. In this project we provide the best trade off for spectrum usage for over lay users.
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...csijjournal
Primary User Emulation Attack (PUEA) is one of the major threats to the spectrum sensing in cognitive
radio networks. This paper studies the PUEA using energy detection that is based on the energy of the
received signal. It discusses the impact of increasing the number of attackers on the performance of
secondary user. Moreover, studying how the malicious user can emulate the Primary User (PU) signal is
made. This is the first analytical method to study PUEA under a different number of attackers. The
detection of the PUEA increases with increasing the number of attackers and decreases when changing the
channel from lognormal to Rayleigh fading.
Error rate detection due to primary user emulation attack in cognitive radio ...IJECEIAES
Security threat is a crucial issue in cognitive radio network (CRN). These threats come from physical layer, data link layer, network layer, transport layer, and application layer. Hence, security system to all layers in CRN has a responsibility to protect the communication between among Secondary User (SU) or to maintain valid detection to the presence of Primary User (PU) signals. Primary User Emulation Attack (PUEA) is a threat on physical layer where malicious user emulates PU signal. This paper studies the effect of exclusive region of PUEA in CRN. We take two setting of exclusive distances, 30m and 50m, where this radius of area is free of malicious users. Probability of false alarm (Pf) and miss detection (Pm) are used to evaluate the performances. The result shows that increasing distance of exclusive region may decrease Pf and Pm.
Signal detection in cognitive radio network (CRN) is influenced by several factors. One of them is
malicious user that emulate primary user (PU) signal. Emulation of PU signal causes detection error. This
paper investigates the impact of malicious user attack to PU signal detection. A number of malicious users
are randomly deployed around secondary user (SU) at a certain distance. They attempt to attack primary
signal detection that is transmitted from 100 km to SU receiver. Then, the received signal power at
secondary receiver and the performance of probability of false alarm and probability of miss detection
under two hypothesis of Neyman Pearson criterion are studied. The derived results show that a number of
malicious users has a significant impact to the performance of received power at SU and detection error
rate.
Performance analysis of cooperative spectrum sensing using double dynamic thr...IAESIJAI
Increased use of wireless technologies and in turn more utilization of available spectrum is subsequently leading to the increasing demand for wireless spectrum. This research work incorporates spectrum sensing detection consisting of a double dynamic threshold followed by cooperative type spectrum sensing. The performance has been analyzed using two modulation schemes, quadrature-amplitude-modulation (QAM) and binary-phase-shift-keying (BPSK). Improved probability of detection has been witnessed using the double dynamic threshold where a comparison of average values of local decision (LD) and the observed value of energy (EO) has been considered instead of using direct values of local decisions and
energy. Further, the probability-of-detection (𝑃𝑑) is found to be better with QAM as compared to the BPSK. From the results, it has been observed that the detection of primary users is also affected by the number of samples. The simulation environment considered for this work is MATLAB and the performance of cooperative spectrum sensing for 500 and 1000 samples with -9db and -12 SNR by considering different false alarm values i. e 0.1, 0.3 and 0.5 has been analyzed. The further scope shall be to enhance the primary user detection by considering different QAM schemes and different signal to noise ratio (SNRs).
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMAidescitation
Blind multiuser detectors are attractive for the
suppression of interference in a CDMA environment. This
paper deals with the performance of group blind multiuser
detector for synchronous CDMA is analyzed. The blind multi
user detectors are Direct Matrix Inversion(DMI),Subspace
and group blind multiuser detector. The performance
analysis is performed by means of the Signal to Interference
Noise Ratio(SINR) and Bit Error Rate(BER). The numerical
results are plotted as variation of SINR Vs SNR, K and M,
SINR with respect to correlation coefficient( ) and BER
Vs Number of samples(M) for three detectors using
MATLAB software. The gain rises in group blind multiuser
detector over the DMI and subspace detectors. The
comparison is carried out for equicorrelated signals for
mathematical simplicity.
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
Communication in mobile Ad hoc networks is completed via multi
-
hop ways. Owing to the distributed
specification and restricted resource of nodes, MANET is a lot prone
to wormhole attacks i.e. wormhole
attacks place severe threats to each Ad hoc routing protocol and a few security enhancements. Thus,
so as
to discover wormholes, totally different techniques are in use. In all those techniques fixation of
threshold
is mer
ely by trial & error methodology or by random manner. Conjointly wormhole detection is in twin
part by putting the nodes that is higher than the edge in a suspicious set, however predicting the n
ode as a
wormhole by using some other algorithms. Our aim in
this paper is to deduce the traffic threshold level by
derivational approach for identifying wormholes in a very single phase in relay network having dissi
milar
characteristics.
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...IOSR Journals
Abstract : In cognitive radio, spectrum sensing is an emergent technology to find available and unused spectrum for increasing spectrum utilization and to overcome spectrum scarcity problem without harmful interference to licensed users. Cooperative spectrum sensing is used to give reliable performance in terms of detection probability and false alarm probability as well as in order to reduce fading, noise and shadowing effects on cognitive radio users. In this paper according to detection performance and complexity various cooperative spectrum sensing schemes have been discussed. We have analyzed spectrum sensing with different fusion rules and their comparative behavior has also been studied. Furthermore, we introduced AND-OR fusion rules in 2-bit and 3-bit hard combination schemes. Keywords - Cognitive radio, cooperative spectrum sensing, energy detector, spectrum sensing, hard combination
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...IOSR Journals
In cognitive radio, spectrum sensing is an emergent technology to find available and unused
spectrum for increasing spectrum utilization and to overcome spectrum scarcity problem without harmful
interference to licensed users. Cooperative spectrum sensing is used to give reliable performance in terms of
detection probability and false alarm probability as well as in order to reduce fading, noise and shadowing
effects on cognitive radio users. In this paper according to detection performance and complexity various
cooperative spectrum sensing schemes have been discussed. We have analyzed spectrum sensing with different fusion rules and their comparative behavior has also been studied. Furthermore, we introduced AND-OR fusion rules in 2-bit and 3-bit hard combination schemes
INTRUSION DETECTION SYSTEM USING DISCRETE FOURIER TRANSFORM WITH WINDOW FUNCTIONIJNSA Journal
An Intrusion Detection System (IDS) is countermeasureagainst network attack. There are mainly two
typesof detections; signature-based and anomaly-based. And thereare two kinds of error; false negative
and false positive. Indevelopment of IDS, establishment of a method to reduce suchfalse is a major issue.
In this paper, we propose a new anomaly-baseddetection method using Discrete Fourier Transform
(DFT)with window function. In our method, we assume fluctuation ofpayload in ordinary sessions as
random. On the other hand, we cansee fluctuation in attack sessions have bias. From the viewpointof
spectrum analysis based on such assumption, we can find outdifferent characteristic in spectrum of attack
sessions. Using thecharacteristic, we can detect attack sessions. Example detectionagainst Kyoto2006+
dataset shows 12.0% of false positive at most,and 0.0% of false negative.
Intrusion detection system using discrete fourier transform with window functionIJNSA Journal
An Intrusion Detection System (IDS) is counter measure against network attack. There are mainly two types of detections; signature-based and anomaly-based. And there are two kinds of error; false negative and false positive. In development of IDS, establishment of a method to reduce such false is a major issue. In this paper, we propose a new anomaly-based detection method using Discrete Fourier Transform (DFT)with window function. In our method, we assume fluctuation of payload in ordinary sessions as random. On the other hand, we can see fluctuation in attack sessions have bias. From the view point of spectrum analysis based on such assumption, we can find out different characteristic in spectrum of attack sessions. Using thecharacteristic, we can detect attack sessions. Example detection against Kyoto2006+
dataset shows 12.0% of false positive at most,and 0.0% of false negative.
INTRUSION DETECTION SYSTEM USING DISCRETE FOURIER TRANSFORM WITH WINDOW FUNCTIONIJNSA Journal
An Intrusion Detection System (IDS) is countermeasureagainst network attack. There are mainly two typesof detections; signature-based and anomaly-based. And thereare two kinds of error; false negative and false positive. Indevelopment of IDS, establishment of a method to reduce suchfalse is a major issue. In this paper, we propose a new anomaly-baseddetection method using Discrete Fourier Transform (DFT)with window function. In our method, we assume fluctuation ofpayload in ordinary sessions as random. On the other hand, we cansee fluctuation in attack sessions have bias. From the viewpointof spectrum analysis based on such assumption, we can find outdifferent characteristic in spectrum of attack sessions. Using thecharacteristic, we can detect attack sessions. Example detectionagainst Kyoto2006+ dataset shows 12.0% of false positive at most,and 0.0% of false negative.
Detection of PUE Attack by SPARS Model using WSPRTEditor IJCATR
Cognitive radio is a system which improves the utilization of the spectrum by sensing the white spaces in its vicinity. This
sensed information will be utilized by the Secondary User (SU) to transmit the data. But some of the malicious users attacks th
system by generating the signal same as that of the primary transmitter. The attack caused by generating the signal same as t
primary transmitter is called as Primary User Emulation Attack (PUEA). In this paper the Signal Activity Pattern Acquisition
Reconstruction System (SPARS) is used to detect the attack. But this system suffers from low True Positive Rate. To incr
positive rate or sensitivity a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT). By
improving the true positive rate or sensitivity, the detection capability of the system will be improved.
Detection of PUE Attack by SPARS Model using WSPRTEditor IJCATR
Cognitive radio is a system which improves the utilization of the spectrum by sensing the white spaces in its vicinity. This
sensed information will be utilized by the Secondary User (SU) to transmit the data. But some of the malicious users attacks th
system by generating the signal same as that of the primary transmitter. The attack caused by generating the signal same as t
primary transmitter is called as Primary User Emulation Attack (PUEA). In this paper the Signal Activity Pattern Acquisition
Reconstruction System (SPARS) is used to detect the attack. But this system suffers from low True Positive Rate. To incr
positive rate or sensitivity a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT). By
improving the true positive rate or sensitivity, the detection capability of the system will be improved.
A secure routing process to simultaneously defend against false report and wo...ieijjournal
Most research related to secure routing in sensor networks has focused on how to detect and defend against a single attack. However, it is not feasible to predict which attack will occur in sensor networks. It is possible for multiple attacks to occur simultaneously, degrading the performance of the existing security schemes. For example, an attacker may try simultaneous false report and wormhole attacks to effectively damage a sensor network. Hence, a multiple simultaneous attack environment is much more complex than a single attack environment. Thus, a new security scheme that can detect multiple simultaneous attacks with a high probability and low energy consumption is needed. In this paper, we propose a secure routing scheme to defend against wormhole and false report attacks in sensor networks. The proposed method achieves a higher attack detection ratio and consumes less energy in a multi-attack scenario compared to existing schemes. It can also be extended to other types of attacks and security schemes to detect and defend against possible combinations of multiple attacks.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
More Related Content
Similar to INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN DIFFERENT CHANNEL MODEL
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...csijjournal
Primary User Emulation Attack (PUEA) is one of the major threats to the spectrum sensing in cognitive
radio networks. This paper studies the PUEA using energy detection that is based on the energy of the
received signal. It discusses the impact of increasing the number of attackers on the performance of
secondary user. Moreover, studying how the malicious user can emulate the Primary User (PU) signal is
made. This is the first analytical method to study PUEA under a different number of attackers. The
detection of the PUEA increases with increasing the number of attackers and decreases when changing the
channel from lognormal to Rayleigh fading.
Error rate detection due to primary user emulation attack in cognitive radio ...IJECEIAES
Security threat is a crucial issue in cognitive radio network (CRN). These threats come from physical layer, data link layer, network layer, transport layer, and application layer. Hence, security system to all layers in CRN has a responsibility to protect the communication between among Secondary User (SU) or to maintain valid detection to the presence of Primary User (PU) signals. Primary User Emulation Attack (PUEA) is a threat on physical layer where malicious user emulates PU signal. This paper studies the effect of exclusive region of PUEA in CRN. We take two setting of exclusive distances, 30m and 50m, where this radius of area is free of malicious users. Probability of false alarm (Pf) and miss detection (Pm) are used to evaluate the performances. The result shows that increasing distance of exclusive region may decrease Pf and Pm.
Signal detection in cognitive radio network (CRN) is influenced by several factors. One of them is
malicious user that emulate primary user (PU) signal. Emulation of PU signal causes detection error. This
paper investigates the impact of malicious user attack to PU signal detection. A number of malicious users
are randomly deployed around secondary user (SU) at a certain distance. They attempt to attack primary
signal detection that is transmitted from 100 km to SU receiver. Then, the received signal power at
secondary receiver and the performance of probability of false alarm and probability of miss detection
under two hypothesis of Neyman Pearson criterion are studied. The derived results show that a number of
malicious users has a significant impact to the performance of received power at SU and detection error
rate.
Performance analysis of cooperative spectrum sensing using double dynamic thr...IAESIJAI
Increased use of wireless technologies and in turn more utilization of available spectrum is subsequently leading to the increasing demand for wireless spectrum. This research work incorporates spectrum sensing detection consisting of a double dynamic threshold followed by cooperative type spectrum sensing. The performance has been analyzed using two modulation schemes, quadrature-amplitude-modulation (QAM) and binary-phase-shift-keying (BPSK). Improved probability of detection has been witnessed using the double dynamic threshold where a comparison of average values of local decision (LD) and the observed value of energy (EO) has been considered instead of using direct values of local decisions and
energy. Further, the probability-of-detection (𝑃𝑑) is found to be better with QAM as compared to the BPSK. From the results, it has been observed that the detection of primary users is also affected by the number of samples. The simulation environment considered for this work is MATLAB and the performance of cooperative spectrum sensing for 500 and 1000 samples with -9db and -12 SNR by considering different false alarm values i. e 0.1, 0.3 and 0.5 has been analyzed. The further scope shall be to enhance the primary user detection by considering different QAM schemes and different signal to noise ratio (SNRs).
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMAidescitation
Blind multiuser detectors are attractive for the
suppression of interference in a CDMA environment. This
paper deals with the performance of group blind multiuser
detector for synchronous CDMA is analyzed. The blind multi
user detectors are Direct Matrix Inversion(DMI),Subspace
and group blind multiuser detector. The performance
analysis is performed by means of the Signal to Interference
Noise Ratio(SINR) and Bit Error Rate(BER). The numerical
results are plotted as variation of SINR Vs SNR, K and M,
SINR with respect to correlation coefficient( ) and BER
Vs Number of samples(M) for three detectors using
MATLAB software. The gain rises in group blind multiuser
detector over the DMI and subspace detectors. The
comparison is carried out for equicorrelated signals for
mathematical simplicity.
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
Communication in mobile Ad hoc networks is completed via multi
-
hop ways. Owing to the distributed
specification and restricted resource of nodes, MANET is a lot prone
to wormhole attacks i.e. wormhole
attacks place severe threats to each Ad hoc routing protocol and a few security enhancements. Thus,
so as
to discover wormholes, totally different techniques are in use. In all those techniques fixation of
threshold
is mer
ely by trial & error methodology or by random manner. Conjointly wormhole detection is in twin
part by putting the nodes that is higher than the edge in a suspicious set, however predicting the n
ode as a
wormhole by using some other algorithms. Our aim in
this paper is to deduce the traffic threshold level by
derivational approach for identifying wormholes in a very single phase in relay network having dissi
milar
characteristics.
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...IOSR Journals
Abstract : In cognitive radio, spectrum sensing is an emergent technology to find available and unused spectrum for increasing spectrum utilization and to overcome spectrum scarcity problem without harmful interference to licensed users. Cooperative spectrum sensing is used to give reliable performance in terms of detection probability and false alarm probability as well as in order to reduce fading, noise and shadowing effects on cognitive radio users. In this paper according to detection performance and complexity various cooperative spectrum sensing schemes have been discussed. We have analyzed spectrum sensing with different fusion rules and their comparative behavior has also been studied. Furthermore, we introduced AND-OR fusion rules in 2-bit and 3-bit hard combination schemes. Keywords - Cognitive radio, cooperative spectrum sensing, energy detector, spectrum sensing, hard combination
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...IOSR Journals
In cognitive radio, spectrum sensing is an emergent technology to find available and unused
spectrum for increasing spectrum utilization and to overcome spectrum scarcity problem without harmful
interference to licensed users. Cooperative spectrum sensing is used to give reliable performance in terms of
detection probability and false alarm probability as well as in order to reduce fading, noise and shadowing
effects on cognitive radio users. In this paper according to detection performance and complexity various
cooperative spectrum sensing schemes have been discussed. We have analyzed spectrum sensing with different fusion rules and their comparative behavior has also been studied. Furthermore, we introduced AND-OR fusion rules in 2-bit and 3-bit hard combination schemes
INTRUSION DETECTION SYSTEM USING DISCRETE FOURIER TRANSFORM WITH WINDOW FUNCTIONIJNSA Journal
An Intrusion Detection System (IDS) is countermeasureagainst network attack. There are mainly two
typesof detections; signature-based and anomaly-based. And thereare two kinds of error; false negative
and false positive. Indevelopment of IDS, establishment of a method to reduce suchfalse is a major issue.
In this paper, we propose a new anomaly-baseddetection method using Discrete Fourier Transform
(DFT)with window function. In our method, we assume fluctuation ofpayload in ordinary sessions as
random. On the other hand, we cansee fluctuation in attack sessions have bias. From the viewpointof
spectrum analysis based on such assumption, we can find outdifferent characteristic in spectrum of attack
sessions. Using thecharacteristic, we can detect attack sessions. Example detectionagainst Kyoto2006+
dataset shows 12.0% of false positive at most,and 0.0% of false negative.
Intrusion detection system using discrete fourier transform with window functionIJNSA Journal
An Intrusion Detection System (IDS) is counter measure against network attack. There are mainly two types of detections; signature-based and anomaly-based. And there are two kinds of error; false negative and false positive. In development of IDS, establishment of a method to reduce such false is a major issue. In this paper, we propose a new anomaly-based detection method using Discrete Fourier Transform (DFT)with window function. In our method, we assume fluctuation of payload in ordinary sessions as random. On the other hand, we can see fluctuation in attack sessions have bias. From the view point of spectrum analysis based on such assumption, we can find out different characteristic in spectrum of attack sessions. Using thecharacteristic, we can detect attack sessions. Example detection against Kyoto2006+
dataset shows 12.0% of false positive at most,and 0.0% of false negative.
INTRUSION DETECTION SYSTEM USING DISCRETE FOURIER TRANSFORM WITH WINDOW FUNCTIONIJNSA Journal
An Intrusion Detection System (IDS) is countermeasureagainst network attack. There are mainly two typesof detections; signature-based and anomaly-based. And thereare two kinds of error; false negative and false positive. Indevelopment of IDS, establishment of a method to reduce suchfalse is a major issue. In this paper, we propose a new anomaly-baseddetection method using Discrete Fourier Transform (DFT)with window function. In our method, we assume fluctuation ofpayload in ordinary sessions as random. On the other hand, we cansee fluctuation in attack sessions have bias. From the viewpointof spectrum analysis based on such assumption, we can find outdifferent characteristic in spectrum of attack sessions. Using thecharacteristic, we can detect attack sessions. Example detectionagainst Kyoto2006+ dataset shows 12.0% of false positive at most,and 0.0% of false negative.
Detection of PUE Attack by SPARS Model using WSPRTEditor IJCATR
Cognitive radio is a system which improves the utilization of the spectrum by sensing the white spaces in its vicinity. This
sensed information will be utilized by the Secondary User (SU) to transmit the data. But some of the malicious users attacks th
system by generating the signal same as that of the primary transmitter. The attack caused by generating the signal same as t
primary transmitter is called as Primary User Emulation Attack (PUEA). In this paper the Signal Activity Pattern Acquisition
Reconstruction System (SPARS) is used to detect the attack. But this system suffers from low True Positive Rate. To incr
positive rate or sensitivity a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT). By
improving the true positive rate or sensitivity, the detection capability of the system will be improved.
Detection of PUE Attack by SPARS Model using WSPRTEditor IJCATR
Cognitive radio is a system which improves the utilization of the spectrum by sensing the white spaces in its vicinity. This
sensed information will be utilized by the Secondary User (SU) to transmit the data. But some of the malicious users attacks th
system by generating the signal same as that of the primary transmitter. The attack caused by generating the signal same as t
primary transmitter is called as Primary User Emulation Attack (PUEA). In this paper the Signal Activity Pattern Acquisition
Reconstruction System (SPARS) is used to detect the attack. But this system suffers from low True Positive Rate. To incr
positive rate or sensitivity a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT). By
improving the true positive rate or sensitivity, the detection capability of the system will be improved.
A secure routing process to simultaneously defend against false report and wo...ieijjournal
Most research related to secure routing in sensor networks has focused on how to detect and defend against a single attack. However, it is not feasible to predict which attack will occur in sensor networks. It is possible for multiple attacks to occur simultaneously, degrading the performance of the existing security schemes. For example, an attacker may try simultaneous false report and wormhole attacks to effectively damage a sensor network. Hence, a multiple simultaneous attack environment is much more complex than a single attack environment. Thus, a new security scheme that can detect multiple simultaneous attacks with a high probability and low energy consumption is needed. In this paper, we propose a secure routing scheme to defend against wormhole and false report attacks in sensor networks. The proposed method achieves a higher attack detection ratio and consumes less energy in a multi-attack scenario compared to existing schemes. It can also be extended to other types of attacks and security schemes to detect and defend against possible combinations of multiple attacks.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN DIFFERENT CHANNEL MODEL
1. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
DOI: 10.5121/csij.2015.2401 1
INVESTIGATION OF PUEA IN COGNITIVE
RADIO NETWORKS USING ENERGY
DETECTION IN DIFFERENT CHANNEL
MODEL
1
Walid. R. Ghanem, 2
Mona Shokair and 3
MI Dessouky
1, 2, 3
Department of electronic and electrical communication, Faculty of electronic
engineering, Menouf, Egypt
ABSTRACT
Primary User Emulation Attack (PUEA) is one of the major threats to the spectrum sensing in cognitive
radio networks. This paper studies the PUEA using energy detection that is based on the energy of the
received signal. It discusses the impact of increasing the number of attackers on the performance of
secondary user. Moreover, studying how the malicious user can emulate the Primary User (PU) signal is
made. This is the first analytical method to study PUEA under a different number of attackers. The
detection of the PUEA increases with increasing the number of attackers and decreases when changing the
channel from lognormal to Rayleigh fading.
KEYWORDS:
Cognitive Radio, Primary User Emulation Attacks (PUEA), energy detector.
1. INTRODUCTION
Cognitive Radio Networks (CRNs) are a new technology that uses the unused spectrum to enable
much higher spectrum efficiency. The concept of cognitive radio is introduced in [1-6], where
secondary (unlicensed) users utilize the licensed frequencies while the primary user (licensed)
user is absent. To make this utilization, sensing process is needed to know the situation of the
primary user. If the secondary user senses that primary user do not transmit, they can use the
channel to transmit, otherwise, secondary user detect the presence of the primary user it stops
transmitting. Some problems will be found during this process. One of these problems is made
due to many attacks such as a denial of service attack, false sensing data report attack, and
primary user emulation attack. The last one of attack is a serious problem, which is presented by
R. Chen in [7]. When the primary user does not use the spectrum, a malicious user or attacker
sends a signal whose characteristics emulates that of the primary user therefore the secondary
user may think that this signal is from the primary user and thus prevented from accessing the
CRNs. Recently, Primary user emulation attack (PUEA) has been studied in many researches. R.
Chen proposed to use the location of the primary user to identify the primary user emulation
attack [7]. S. Annand made an analytical model based on Fenton's approximation and Markov
inequality [8]. Z. Jin et al. Presented a Neyman–Pearson composite hypothesis test [9] and a
Wald's sequential probability ratio test [10] to detect PUEA. Z. Chen showed how the attacker
emulated the primary user signal to confuse the secondary user and use an advanced strategy
called variance detection to mitigate the effect of an attacker using the difference between the
communication channel of PUEA and primary user [11]. C. Chen et al made a joint position
verification method to enhance the positioning accuracy [12]. Moreover, C. Chen et al discussed
2. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
2
the cooperative spectrum sensing model in the presence of PUEA and established a scheme to
maximize the detection probability of PU [13]. Feijng Bao et al studied the PUEA with the
motion secondary users in cognitive radio network and using a hybrid method based on Energy
Detection (ED) and Variance Detection [14]. ED is one technique from some techniques
depending on the sensing which is the basis of cognitive radio network.
Another technique such as matched filters (MF), cyclostationary detection, covariance detection,
Eigen value based detection, wavelet edge detection. All existing PUEA detection used ED due to
its simplicity and have no prior information about the detecting signal.
In this paper, analytical method is used to study PUEA under a different number of attackers
when the attack strategy is used by each attacker, which hasn't done before. In this system, no
cooperation is considered between the attackers. Therefore, each attacker wants to fool the SU
with transmitting a signal whose characteristics mimics the primary user signal. The victim user
(SU) receives signals from PU and the attacker and makes its decision.
The remainder of this paper is structured as follows. In Section 2, the problem formulation is
introduced. In Section 3, an analytical model for energy detection strategy against primary user
emulation attacks for many numbers of attackers under the strategy used by each attacker. The
numerical and simulation results will be made in Section 4. Finally, conclusions will be done in
Section 5.
2. PROBLEM FORMULATION
2.1. SYTEM MODEL
The network model shown in Fig 1. where the attackers and secondary user (victim) are located
in circular grid. The primary user is a TV tower located at a distance of dp from the CRN and all
users position is fixed in the network. Each attacker wants to fool the victim by transmitting a
signal whose characteristic emulates that of the primary user. The victim listens to the channel to
distinguish between the signal coming from the primary user or the attacker.
Fig. 1 System model of the CRN [8]
The following assumptions are considered for proposed model specification:
1. dJ is the distance between the Jth
attacker and the victim, the target region in which each
Attacker wants to fool the victim is a loop of radius Ro and R1.
2. The primary transmitter located at a distance of dP from the Cognitive Radio network.
3. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
3
3. The primary user transmits a power of Pt and each attacker transmit an adaptive power of
Ps.
4. The signal from primary and the attacker undergoes path loss and, lognormal, or fading.
5. At the victim the free space propagation model is considered for the signal from primary
and two ray ground model for the signal from the attacker, respectively. The received signal at
victim from the primary is proportional to
-2
Pd , and from the attacker is proportional to 4
Jd
[9].
6. The shadowing random variable for the primary transmitter is[15]
(1)
where
ln10
10
a and
2(0, )PNp follows a normal distribution with zero mean and variance
equal to 2
P .
7. The shadowing random variable for the attacker is [15]
(2)
Where
ln10
10
a , 2(0, )sNs follows normal distribution, with zero mean and variance equal
to 2
s .
8. NO cooperation is consumed between the attackers.
2.2. Performance Metrics Parameters
This section discusses the metric parameter for the modal performance measurement. Most
existing work on cognitive sensing focuses on performing a hypothesis testing to decide the
presence of the primary user [11]. In this paper, the interaction between the attacker and the
victim are discussed. As a result, in our work a victim (or a defender) performs a hypothesis
testing to decide whether a signal is from the primary user or from the attacker,
As shown in the following two hypotheses [11].
Ho: the signal is from the primary user
H1: the signal is from the attacker
In the hypothesis testing, two matrices are used to demonstrate the performance of strategies
taken by the attacker and the victim [11].
Probability of false positives (PFP) or (probability of false alarm (PFA)):
When the signal is from the primary user, the probability that the victim falsely identifies as the
signal from the attacker is expressed as [14],
1 0Pr( )FPP H (3)
If this case happens, the victim will attempt to access the network and cause interference to the
primary user. Then the victim may be punished as an attacker user. Hence the victim may use a
strategy to make PFP (PFA) as small as possible while the attacker want to make PFP (PFA) as
large as possible [11].
10
10p
P
a PeG
10
10s
s
a seG
4. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
4
Probability of false negatives (PFN) or the probability of misdetection (PMD):
When the signal is for the attacker, the probability that the victim falsely classifies it as from the
primary user is defined as [11],
0 1Pr( )FNP H (4)
If this case happens, the victim will vacate the spectrum unnecessarily or give up accessing the
network, although the spectrum band is vacant, and the attacker launches a successful PUEA and
take the spectrum resource.
Another widely matrices is the probability of detection (PD) [14].
1 11- Pr( )D FNP HP (5)
The victim should take a strategy to make FNP ( MDP ) as small as possible where the attacker
aims to make FNP or probability of miss detection ( MDP ) as large as possible.
3. ANAYLTICAL MODEL
3.1. The attack strategy
In this part we describe by the equation the attack strategy used by the attacker. Each attacker
wants to fool the victim (SU) by transmitting a signal whose characteristics emulates that of the
primary user to make PFN and PFP as large as possible, in [11] a mean-field approach is used to
derive a solution of Ps and this method focus on the average of the received power Ignoring
fluctuations this approach describe in Fig.2. Where an attacker receive a power from the primary
user and transmit the emulating power to the secondary user.
Fig.2 The attacker strategy
The received power at the victim from primary user, ( )v
rP , is denoted as follows[9]:
( ) -2 -2v a p
r t p p t pP P d G P d e
(6)
Where pG is the shadowing random variable from the primary user to the victim
The received power at victim from each of the jth
attacker is given as [9],
( ) -4 -4 s
j j
j j
asj
r s s sP Ps d G Ps d e
(7)
The attacker mimics the PU
signal and retransmit it to the SU
To take the free band for himself
PU
SU
Victim
Attacker
5. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
5
Where sG is the shadowing random variable from the primary user to the jth
attackers?
The Moment generating function ( )t of a random variable β is expressed as [15],
1 2
2
2
( ) ( )
tt
t E e e
(8)
The mean of ( )
P v
r that given by (3) and ( )
P s
r that given by (4)
1 2 2
2( ) -2 -2 -2
( ) ( ) ( )
a pv a
r t p p t p p
p
tE P P d E G P d E e eP d
(9)
1 2 2
2( ) -4 -4 -4
( ) ( ) )(j a ss a
sjr sj s sj sj sj s
s
jE P P d E G P d E e eP d
(10)
The attacker emulates the primary user signal under the condition of ( ) ( )
E(P ) E(P )sj v
r r [11]
Thus the power of each attacker is expressed as,
1 2 2 2( - )
2sj
sj t
p
a P sd
eP P
d
(11)
3.2. The Energy Detection Defense Model
In this part the mathematical analysis of probability of false Positive (PFP) that is given by (1) and
probability of false negative that given by (2) will be made.
The energy detection is used to defense the PUEA as follows [11]:
2
IF r r rp u k : The signal from the primary user (H0) (12)
2
IF r r rp u k : The signal from the malicious user (H1) (13)
Where Pr is the received power at the victim , and k (k > 0) is a constant that controls the
threshold of determination and is called the threshold factor.
The mean of the received signal is given by
1 2 2
2( 2)
( )
a P
tr r pu E P P d e
(14)
The variance of the received power from primary user is given by:
2 22 2
2 ( 4) 2
d ( 1)( ) -
aa PP
t pr r P e eVar P
(15)
Therefore the root mean square is given by
2 2
r r r1=u u c
a p
e
(16)
Where
2 2
1
a p
c e
6. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
6
When the received signal is from the primary user is given by (3),
( ) -2 -2v a p
r t p p t pP P d G P d e
(17)
From the determination criteria from (12) and (13), the probability of false positives can be
calculated as [11]:
( )
( )FP
r rrp pr p u k
(18)
( ) ( )
( (1 ) ) ( (1 ) )FP
r rr rp pr p kc u pr p kc u
(19)
When 1kc
FP
P
p
p
1 1
p =pr( ln(1+kc))
2 aP
a
P
p
p
1 1
+pr( ln(1-kc))
2 aP
a
(20)
FP
1 1
p
2 a p
p =1+Q( ln(1+kc))a
1 1
p
2 a p
-Q( ln(1-kc))a
(21)
If 1kc ,
FP
P
p
p
1 1
p =pr( ln(1+kc))
2 aP
a
= p
p
1 1
Q( ln(1+kc))
2 a
a
(22)
Where
2
2
2
1
(
x
dxQ e
Note that PFP only depends on P
and k and independent on Pt, dp and .
On the other hand, when the signal from the attacker,
The Probability of false negative is defined as,
( )
Pr( )
s
FN rrP p ur k (23)
FN
( )
P =Pr(1 kc 1 kc)
s
P
r
ur
(24)
Where
( ) 4
1
M
s
sjr j
j
P P d G
(25)
Where sjP the power from the j attacker and dj is is the distance between the j attacker and the
victim, G is the shadowing between each attacker and victim. Since there is no cooperation
between the attackers therefore each attacker wants to conflict the SU with transmitting power
with mean equal to the mean of the primary signal.
Thus
1 2 2 2( )
2
a p ssj
sj t
p
P
d
e
d
P
(26)
7. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
7
2
2
2 2 2
1 2 2
2
4 1 ( ) 42
( )
1
1
( ) j
j
p
p
p s
a s
M a a
t
s M
ajr
t
sj
j
j
r
s
d
dP e e
dp
e e
u P d
(27)
1 2 2
2
1
(1 1 )
a s j
FN
M
a
j
p pr kc e e kc
(28)
By taking Ln for both sides.
2 2 2 2
1
1 1
( ln(1 ) ln(1 ) )
2 2
FN
M
js s
j
p pr a kc a kc a
(29)
2 2 2 2
1
1 1
( ln(1 ) ln(1 ) )
2 2
FN
M
js s
j
p pr a kc a kc a
(30)
Where 2
(0, )j sN , the sum of normal variable is also normal with mean zero and
variance equal to j
1
M
T
j
where T is the normal value with mean equal zero and variance
= 2
s .
The probability of false negative can be expressed as
FN
1 12 2 2 2
2 2
p =pr( a ln(1 kc) ln(1 kc) a )Ts sa (31)
by dividing by . sM
FN
2 2
.
a aln(1 kc) ln(1 kc)
p =pr( )
2 2.
Ts s
s ssM M M Ma aM
(32)
The probability of false negative as a function of false negative
FN
2 2
. .
a aln(1 kc) ln(1 kc)
p =Q( ) Q( )
2 2
s s
s sM M M Ma a
(33)
When kc≥1
The probability can be given by,
FN
2
.
aln(1 kc)
p =pr( )
2.
T s
ss M MaM
(34)
The final expression of the probability of false negative is given by
FN
2
.
aln(1 kc)
p =1 Q( )
2
s
s M Ma
(35)
Note that PFN is depending on ,p s
and k and M the number of malicious users. It is
independent on Pt, dp, dj and α.
8. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
8
3.3. Energy Detection Scheme
Figure 3 shows the ED defense scheme, first the system will be initialize by defining the primary
user, secondary user, the attacker and also the channel models that used. These channels are
AWGN and Rayleigh fading. Then the SU performs spectrum sensing to distinguish that the signal
from the primary user or attacker and that based on some threshold that define above in (12), (13).
Fig.3 Flow chart of ED method defense strategies
4. SIMULATION RESULTS
The values of the system simulation parameters are listed in Table 1 [14].
Table 1 SIMULATIONS PARAMETER.
Parameter Value Parameter Value
dp
Pt
2
p
10Km
100KW
8,4
Ro
R1
2
s
30m
500
4,8,12
In this section, The simulations for the proposed models shown if Fig.1 will be validated and the
simulation parameter given in table 1. First, consider a system with fixed primary user at a
distance of dp from the CRN, and transmit power Pt The shadowing random variable from the
primary transmitter is given by equation (1)
The target region of the victim is loop with inner radius Ro and outer radius R1=, the attackers
located at any distance 1oR R R and each attacker transmit with adaptive power Ps that give
by (8) ,the shadowing random variable from the attacker is given by (2) , the victim is using
energy detection method. The Rayleigh fading channel from the primary user to the CRN is
considered to be a two paths channel. The PFA with PD is plotting with the variability of the
threshold value k, we use monte carol with 100000 run times for every value of the threshold
value
9. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
9
Figure 4 gives the probability density functions (PDFs) of signal power received by the victim
when the primary user and the attacker transmitting under the lognormal channel model. The
attacker applies the advanced strategy that is explained above from this figure we conclude that,
when the number of attackers increase, the PDF of the received signal will differ from that of the
primary user signal and the mean of the received signal is differ, thus the performance detection
increases and the secondary user easy identifies the signal that from PU or from the attacker.
Fig. 4 The PDF's of the received power at the victim from the primary user and the attackers.
Fig.5 gives the relation between the threshold factor (k) and the probability of False alarm (PFA)
that given by (19) when the PUEA method is depend on the energy detection method under
lognormal channel. By varying the value of threshold k value from 0 to 10 the PFA decrease from
1to 0, the threshold factor normally chosen to be around 1.
Fig.5 The impact of k on the probability of false alarm (PFA), when 2 8p , 2 4p under lognormal
channel
Fig.6 gives the relation between the threshold factor k and the probability of detection (PD) that
give by equation (5), when the PUEA method is depend on the energy detection method under
lognormal at different number of attackers and different variance of the channel. By varying the
threshold factor value k from 0 to 10 the probability of detection decrease from 1 to 0. The
simulation results shows that increase the number of attackers increase the probability of
detection(PD) , also change the variance from 2 4s to 2 8s decrease the detection
probability.
10. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
10
Fig.6 The impact of K on the probability of detection (PD) when 2 8p .
Fig.7 shows the relation between the threshold factor k and the probability of detection (PD)
when the PUEA method depends on the energy detection method under lognormal and Rayleigh
Fading channel at different number of attackers. The simulation shows that the probability of
detection is increased when the channel is changed from Lognormal to Rayleigh under the same
number of attackers.
Fig.7 The impact of K on the probability of Detection (PD) when 2 8p and 2 4s under
lognormal and Rayleigh Fading channel.
Fig.8 shows the Receiver operating characteristics (ROC) of the energy detection of one
malicious user at different channel parameters. The analytical results in (16) and (32) match with
the simulation of the proposed model. When 2 2
p s the performance reduce, otherwise the
performance increase.
Fig.8 Receiver operating characteristics (ROCs) of Energy detection
With
2
8p and different
2
s , M=1.
11. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
11
Fig.9 shows the ROCs at a different number of attackers with different channel parameters from
the victim to the attacker under the lognormal channel for both the primary user of victim channel
and from the attacker to victim channel. The performance detection increases with increasing the
number of attackers. The performance detection when 2 2
8p s has a bad detection at the
same number of attackers. At PFA=0.5 the PD=0.7 and 1 for the number of attacker M=2 and 3, the
probability of detection is increase by 30% when the number of attacker change from 2 to 3.
Fig.9 Receiver operating characteristics (ROCs) of energy detection with different channel parameter under
a different number of attackers
Fig.10 shows the ROCs of energy detection under lognormal and Rayleigh fading from the
primary user to the victim, and lognormal from the attacker to the victim, the performance
detection of the victim gives small PD for the same value of the PFA for the same number of
malicious users therefore the detection is worse for the Rayleigh fading channel. At PFA =0.5 the
probability of detection equal to 0.65 and 0.8 for Rayleigh and Lognormal at M=2 so the
performance decrease by 15% when the channel change from lognormal to Rayleigh fading.
Fig.10 ROCs of energy detection under different number of attackers under lognormal and
Rayleigh fading channel 2
8p ,
2
4s .
5. CONCLUSION
12. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
12
The PUEA is one of the major threats to the spectrum sensing in CRN, and it was degrading the
performance of the CRN. In this paper, a CRN Network model consists of a primary user,
secondary user and many numbers of attackers. Channel models such as lognormal shadowing
and Rayleigh fading are used. In this model each attacker applies an attack strategy to fool the
victim with emulating the primary user signal. Then the energy detection method is applied to
mitigate the effect of the attackers. The analysis and simulation of the system shows that the
performance of the detection gives worse when changing the channel from lognormal to
Rayleigh fading and get better with the increase number of attackers.
6. REFERANCES
[1] J. Mitola & G. Q. Maguire Jr(1999) “ Cognitive Radio: Making Software Radios More Personal”,
IEEE Personal Communications, Vol. 6, No. 4, pp. 13–18.
[2] Hefdhallah Sakran, Mona Shokair, El-Sayed El-Rabaie & Atef Abou El-Azm(2010) “Hard Decision
Algorithm for Cooperative Spectrum Sensing in Cognitive Radio Networks,” in Proc. Of the
ECSE'10 Conference, Cairo, Egypt.
[3] Hefdhallah Sakran & Mona Shokair(2010) “An Efficient Scheme for Cooperative Spectrum Sensing
in Cognitive Radio Networks”, in Proc. Of the AEIC'2010, Cairo, Egypt, Dec.
[4] Hefdhallah Sakran, Mona Shokair, El-Sayed El-Rabaie & Atef Abou El-Azm(2011) “Three Bits
Softened Decision Scheme in Cooperative Spectrum Sensing Among Cognitive Radio Networks,”
28th National Radio Science Conference (NRSC), pp. 183-191, Cairo, Egypt.
[5] Hefdhallah Sakran, Mona Shokair, El-Sayed El-Rabaie, Omar Nasr & Atef Abou El-Azm(2012)
“Proposed Relay Selection Scheme for Physical Layer Security in Cognitive Radio Networks,” IEEE
IWCMC, pp. 1052-1056.
[6] Hefdhallah Sakran and Mona Shokair(2010) “An Efficient Scheme for Cooperative Spectrum
Sensing in Cognitive Radio Networks” JAUES, Vol. 5, No. 3, pp. 579- 587.
[7] R. Chen, J. Park & J. Reed (2006) “Ensuring Trustworthy Spectrum Sensing in Cognitive Radio
Networks”, Proc. Of IEEE Workshop Network Technology Software Defined Radio Networks, pp.
110-119.
[8] S. Anand, Z. Jin, & K. P. Subbalakshmi (2008) “An Analytical Model for Primary User Emulation
Attacks in Cognitive Radio Networks”,3rd
IEEE Symposium on new frontiers in dynamic spectrum
access Networks, pp.1-6.
[9] Z. Jin, S. Anand and K. P. Subbalakshmi (2009) “Mitigating Primary User Emulation Attacks in
Dynamic Spectrum Access Networks Using Hypothesis Testing”, ACM SIGMOBILE Mobile
Computing and Communications Review. Vol. 13,No.2, pp. 74-85.
[10] Z. Jin and K. P. Subbalakshmi (2009) “Detecting Primary User Emulation Attacks in Dynamic
Spectrum Access Networks,” Proc. Of ICC 2009, pp. 1-5.
[11] Z. Chen, T. Cooklev and C. Chen and C. Plmalaza-Raez(2009) “Modeling Primary User Emulation
Attacks and Defenses in Cognitive Radio Networks”, Proc. Of 2009 IEEE 28th International
Performance Computing and Communications Conference, pp. 208-215.
[12] C. Zhao, W. Wang, L. Huang, and Y. Yao(2010) " Anti-PUE Attack Based on Joint Position
Verification in Cognitive Radio networks'', Proc. Of the international conference on communication
and mobile computing, pp. 169-173.
[13] C. Chen, H. Cheng & Y. Yao (2011) “Cooperative Spectrum Sensing in Cognitive Radio Networks in
the Presence of the Primary User Emulation Attack”, IEEE Trans. Wireless Communication, Vol.10,
No.7 pp. 2135–2141.
[14] F. Bao, H. Chen, and L. Xie (2012) '' Analysis of Primary User Emulation Attack with Motional
Secondary Users in Cognitive Radio Networks", Proc. Of 2012 IEEE 23rd International Symposium
on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[15] S. M. Ross (2007) Introduction to Probability Models, Ninth Edition. Academic Press.
13. Circuits and Systems: An International Journal (CSIJ), Vol.2, No.2/3/4, October 2015
13
AUTHORS
Walid Ghanem received the B.Sc. degree in communication engineering from Faculty of
Electronic Engineering, Menoufia University, Egypt, in May 2011, and he is currently
working toward the MSc degree in Electrical communication engineering. His current
research interests are cognitive radio networks, Localization, wireless security, encryption
and optimization algorithms.
Mona Shokair received the B.Sc., and M.Sc. degrees in electronics engineering from
Menoufia University, Menoufia, Egypt, in 1993, and 1997, respectively. She received the
Ph.D. degree from Kyushu University, Japan, in 2005. She received VTS chapter IEEE
award from Japan, in 2003. She published about 70 papers until 2014. She received the
Associated Professor degree in 2011. Presently, she is an Associated Professor at
Menoufia University. Her research interests include adaptive array antennas, CDMA
system, WIMAX system, OFDM system, game theory , next generation networks and
optimization algorithms.
Moawad I. Dessouky received the B.Sc. (Honors) and M.Sc. degrees from the Faculty of
Electronic Engineering, Menoufia University, Menouf, Egypt, in 1976 and 1981,
respectively, and the Ph.D. from McMaster University, Canada, in 1986. He joined the
teaching staff of the Department of Electronics and Electrical Communications, Faculty of
Electronic Engineering, Menoufia University, Menouf, Egypt, in 1986. He has published
more than 200 scientific papers in national and International conference proceedings and
journals. He has received the most cited paper award from Digital Signal Processing
journal for 2008. His current research areas of interest include spectral estimation
techniques, image enhancement, image restoration, super resolution reconstruction of
images, satellite communications, and spread spectrum techniques.