Next Article in Journal
Priority-Based Machine-To-Machine Overlay Network over LTE for a Smart City
Previous Article in Journal
Fundamental Limitations in Energy Detection for Spectrum Sensing
Article Menu

Export Article

Open AccessArticle
J. Sens. Actuator Netw. 2018, 7(3), 26; https://doi.org/10.3390/jsan7030026

Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter

1
Department of Electrical Engineering, University of North Dakota, Grand Forks, ND 58202, USA
2
National Institute of Posts & Telecommunication, Rabat 10100, Morocco
3
Department of Mathematics, Mohammed V University, Rabat 1014, Morocco
*
Author to whom correspondence should be addressed.
Received: 18 April 2018 / Revised: 13 June 2018 / Accepted: 13 June 2018 / Published: 4 July 2018
View Full-Text   |   Download PDF [2382 KB, uploaded 5 July 2018]   |  

Abstract

Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to use the vacant spectrum bands without causing interference to the primary users. However, several attacks could disturb the normal functioning of the cognitive radio network. Primary user emulation attacks are one of the most severe attacks in which a malicious user emulates the primary user signal characteristics to either prevent other legitimate secondary users from accessing the idle channels or causing harmful interference to the primary users. There are several proposed approaches to detect the primary user emulation attackers. However, most of these techniques assume that the primary user location is fixed, which does not make them valid when the primary user is mobile. In this paper, we propose a new approach based on the Kalman filter framework for detecting the primary user emulation attacks with a non-stationary primary user. Several experiments have been conducted and the advantages of the proposed approach are demonstrated through the simulation results. View Full-Text
Keywords: cognitive radio; primary user emulation attacks; mobile primary user; Kalman filter; received signal strength cognitive radio; primary user emulation attacks; mobile primary user; Kalman filter; received signal strength
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

El Mrabet, Z.; Arjoune, Y.; El Ghazi, H.; Abou Al Majd, B.; Kaabouch, N. Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter. J. Sens. Actuator Netw. 2018, 7, 26.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
J. Sens. Actuator Netw. EISSN 2224-2708 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top