SlideShare a Scribd company logo
Detecting PUE attacks in Cognitive Radio Networks
Research Methods
Fan Jin
4047 8963
Cognitive Radio
Existing frequency resources are almost allocated by
companies or organizations
Utilization of frequency resources are unbalanced
Cognitive Radio can improve the efficiency of
utilizing existing frequency resources
Simple Example:
Mobile phone user can use TV signal to talk or SMS
Some Concepts
Primary user: user who has paid for a specific band
Secondary user: user who has not paid for a
frequency, but wants to use a frequency for
communication
White space, hole or fallow band: in a specific time
frame, a primary user is not using his paid frequency
channel
Hand-off: when primary user comes to use his
frequency, secondary users have to quit and look for
another white space
Primary User Emulation
Attack
Malicious users mimic primary user’s signal
Other secondary users believe the primary user is still
in, hence they are unable to use the fallow band
Selfish PUE attacker and Malicious PUE attacker
Impact of PUE attacks
PUE attack detection
Secondary user needs to correctly identify primary
user’s signal
No modification should be applied to primary user
Three research methods: Energy detection,
Cyclostationary feature detection and Localization
a radio signal should
look like…
a real TV signal …
Energy Detection
Energy detector measures the energy in the input
wave over a specific time interval.
Measures the power level of the received signal at
the secondary user receiver and compare it with the
signal from real primary user
A threshold is required for identification
Advantage: Former knowledge of the primary user
signal characteristic (much more than the energy
level) is not required.
Disadvantage: path loss, path fading
Cyclostationary Feature
Detection
Utilizes the cyclic feature of a signal to detect it
If the amplitude is periodic and there exists a peak
value for each period, the value is compared to a
predetermined threshold
Cyclic autocorrelation function (CAF) and Cyclic
spectrum density (CSD)
Advantage: robust against noise with unknown
variance
Disadvantage: computational complexity and long
observation time
Localization
Non-interactive localization scheme is required
Location Verification scheme: ratio of distance and
energy level
Localization scheme:
 Received Signal Strength (RSS) based localization
 Triangulation
RSS based localization scheme
Conclusion
A proper architecture is required, contains primary users,
secondary users and secondary user base stations:
Secondary users will need to communicate each
other or with base stations for exchanging
messages and updating final results
A combination of above methods need to be used to
successfully detect PUE attacks
Other techniques such as machine learning or data
smoothing may be used to increase the accuracy of final
decision
Questions?

More Related Content

What's hot

Transferring quantum information through the
Transferring quantum information through theTransferring quantum information through the
Transferring quantum information through the
ijngnjournal
 
Cognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptCognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptAnupam Yadav
 
Add-on or Integration? The future of CR Deployment in Real World - An Industr...
Add-on or Integration? The future of CR Deployment in Real World - An Industr...Add-on or Integration? The future of CR Deployment in Real World - An Industr...
Add-on or Integration? The future of CR Deployment in Real World - An Industr...
idescitation
 
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
csandit
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
ncct
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Presentation on cognative radio
Presentation on cognative radioPresentation on cognative radio
Presentation on cognative radio
Shewangi Kochhar
 
Research paper on cognitive radio network
Research paper on cognitive radio networkResearch paper on cognitive radio network
Research paper on cognitive radio network
bkmishra21
 
Dynamic user grouping based NOMA
Dynamic user grouping based  NOMADynamic user grouping based  NOMA
Dynamic user grouping based NOMA
ShubhamSingh1797
 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET Journal
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Saroj Dhakal
 
Paper id 37201524
Paper id 37201524Paper id 37201524
Paper id 37201524IJRAT
 
Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...
Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...
Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...
IJEACS
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
ijngnjournal
 
D1082731
D1082731D1082731
D1082731
IJERD Editor
 
Application of multi antenna technologies in cellular mobile communications
Application of multi antenna technologies in cellular mobile communicationsApplication of multi antenna technologies in cellular mobile communications
Application of multi antenna technologies in cellular mobile communications
marwaeng
 
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic PrefixOFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
john236zaq
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
Rahul Sidhu
 

What's hot (19)

Transferring quantum information through the
Transferring quantum information through theTransferring quantum information through the
Transferring quantum information through the
 
Cognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptCognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 ppt
 
Add-on or Integration? The future of CR Deployment in Real World - An Industr...
Add-on or Integration? The future of CR Deployment in Real World - An Industr...Add-on or Integration? The future of CR Deployment in Real World - An Industr...
Add-on or Integration? The future of CR Deployment in Real World - An Industr...
 
Paper 1 2019
Paper 1 2019Paper 1 2019
Paper 1 2019
 
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Presentation on cognative radio
Presentation on cognative radioPresentation on cognative radio
Presentation on cognative radio
 
Research paper on cognitive radio network
Research paper on cognitive radio networkResearch paper on cognitive radio network
Research paper on cognitive radio network
 
Dynamic user grouping based NOMA
Dynamic user grouping based  NOMADynamic user grouping based  NOMA
Dynamic user grouping based NOMA
 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
 
Paper id 37201524
Paper id 37201524Paper id 37201524
Paper id 37201524
 
Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...
Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...
Heterogeneous Spectrum Sensing in Cognitive Radio Network using Traditional E...
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
 
D1082731
D1082731D1082731
D1082731
 
Application of multi antenna technologies in cellular mobile communications
Application of multi antenna technologies in cellular mobile communicationsApplication of multi antenna technologies in cellular mobile communications
Application of multi antenna technologies in cellular mobile communications
 
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic PrefixOFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 

Viewers also liked

Byzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkByzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio Network
Chandra Sharma
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radioNavya Shree
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
Tarek Gaber
 
Stat of the art in cognitive radio
Stat of the art in cognitive radioStat of the art in cognitive radio
Stat of the art in cognitive radio
Mohsen Tantawy
 
What is Cognitive Radio?
What is Cognitive Radio? What is Cognitive Radio?
What is Cognitive Radio?
xG Technology, Inc.
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
Jignesh Patel
 
PPT - Powerful Presentation Techniques
PPT - Powerful Presentation TechniquesPPT - Powerful Presentation Techniques
PPT - Powerful Presentation Techniques
University of Wisconsin Milwaukee
 

Viewers also liked (7)

Byzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkByzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio Network
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radio
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Stat of the art in cognitive radio
Stat of the art in cognitive radioStat of the art in cognitive radio
Stat of the art in cognitive radio
 
What is Cognitive Radio?
What is Cognitive Radio? What is Cognitive Radio?
What is Cognitive Radio?
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
PPT - Powerful Presentation Techniques
PPT - Powerful Presentation TechniquesPPT - Powerful Presentation Techniques
PPT - Powerful Presentation Techniques
 

Similar to Presentation of Research methods of CRN

Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Saroj Dhakal
 
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
IRJET Journal
 
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
IRJET Journal
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
IOSR Journals
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioAn Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
IOSR Journals
 
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET Journal
 
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORKOPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
Praktan Patil
 
A cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyA cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a study
ijngnjournal
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Study
josephjonse
 
27. cognitive radio
27. cognitive radio27. cognitive radio
27. cognitive radio
Wisdom Eduventre
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
Vatsala Sharma
 
International journal of engineering issues vol 2015 - no 2 - paper7
International journal of engineering issues   vol 2015 - no 2 - paper7International journal of engineering issues   vol 2015 - no 2 - paper7
International journal of engineering issues vol 2015 - no 2 - paper7
sophiabelthome
 
Optimization of Cognitive Radio
Optimization of Cognitive Radio Optimization of Cognitive Radio
Optimization of Cognitive Radio
Puneet Arora
 
energy_detection
energy_detectionenergy_detection
energy_detection
Youmni Ziadé
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.doc
IIRindia
 
Comparative Study of Different Non-Cooperative Techniques in Cognitive Radio
Comparative Study of Different Non-Cooperative Techniques in Cognitive RadioComparative Study of Different Non-Cooperative Techniques in Cognitive Radio
Comparative Study of Different Non-Cooperative Techniques in Cognitive Radio
RSIS International
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radio
ijngnjournal
 
A comprehensive study of signal detection techniques for spectrum sensing in ...
A comprehensive study of signal detection techniques for spectrum sensing in ...A comprehensive study of signal detection techniques for spectrum sensing in ...
A comprehensive study of signal detection techniques for spectrum sensing in ...
IAEME Publication
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
Sandeep Meena
 

Similar to Presentation of Research methods of CRN (20)

Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
 
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
 
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioAn Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
 
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
 
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORKOPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
 
A cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a studyA cognitive radio and dynamic spectrum access – a study
A cognitive radio and dynamic spectrum access – a study
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Study
 
27. cognitive radio
27. cognitive radio27. cognitive radio
27. cognitive radio
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
International journal of engineering issues vol 2015 - no 2 - paper7
International journal of engineering issues   vol 2015 - no 2 - paper7International journal of engineering issues   vol 2015 - no 2 - paper7
International journal of engineering issues vol 2015 - no 2 - paper7
 
Optimization of Cognitive Radio
Optimization of Cognitive Radio Optimization of Cognitive Radio
Optimization of Cognitive Radio
 
energy_detection
energy_detectionenergy_detection
energy_detection
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.doc
 
Comparative Study of Different Non-Cooperative Techniques in Cognitive Radio
Comparative Study of Different Non-Cooperative Techniques in Cognitive RadioComparative Study of Different Non-Cooperative Techniques in Cognitive Radio
Comparative Study of Different Non-Cooperative Techniques in Cognitive Radio
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radio
 
A comprehensive study of signal detection techniques for spectrum sensing in ...
A comprehensive study of signal detection techniques for spectrum sensing in ...A comprehensive study of signal detection techniques for spectrum sensing in ...
A comprehensive study of signal detection techniques for spectrum sensing in ...
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
 
Cr2012b
Cr2012bCr2012b
Cr2012b
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 

Presentation of Research methods of CRN

  • 1. Detecting PUE attacks in Cognitive Radio Networks Research Methods Fan Jin 4047 8963
  • 2. Cognitive Radio Existing frequency resources are almost allocated by companies or organizations Utilization of frequency resources are unbalanced Cognitive Radio can improve the efficiency of utilizing existing frequency resources Simple Example: Mobile phone user can use TV signal to talk or SMS
  • 3. Some Concepts Primary user: user who has paid for a specific band Secondary user: user who has not paid for a frequency, but wants to use a frequency for communication White space, hole or fallow band: in a specific time frame, a primary user is not using his paid frequency channel Hand-off: when primary user comes to use his frequency, secondary users have to quit and look for another white space
  • 4. Primary User Emulation Attack Malicious users mimic primary user’s signal Other secondary users believe the primary user is still in, hence they are unable to use the fallow band Selfish PUE attacker and Malicious PUE attacker Impact of PUE attacks
  • 5. PUE attack detection Secondary user needs to correctly identify primary user’s signal No modification should be applied to primary user Three research methods: Energy detection, Cyclostationary feature detection and Localization
  • 6. a radio signal should look like…
  • 7. a real TV signal …
  • 8. Energy Detection Energy detector measures the energy in the input wave over a specific time interval. Measures the power level of the received signal at the secondary user receiver and compare it with the signal from real primary user A threshold is required for identification Advantage: Former knowledge of the primary user signal characteristic (much more than the energy level) is not required. Disadvantage: path loss, path fading
  • 9. Cyclostationary Feature Detection Utilizes the cyclic feature of a signal to detect it If the amplitude is periodic and there exists a peak value for each period, the value is compared to a predetermined threshold Cyclic autocorrelation function (CAF) and Cyclic spectrum density (CSD) Advantage: robust against noise with unknown variance Disadvantage: computational complexity and long observation time
  • 10. Localization Non-interactive localization scheme is required Location Verification scheme: ratio of distance and energy level Localization scheme:  Received Signal Strength (RSS) based localization  Triangulation
  • 12. Conclusion A proper architecture is required, contains primary users, secondary users and secondary user base stations: Secondary users will need to communicate each other or with base stations for exchanging messages and updating final results A combination of above methods need to be used to successfully detect PUE attacks Other techniques such as machine learning or data smoothing may be used to increase the accuracy of final decision