PUE Attack Detection by Using DNN and Entropy in Cooperative Mobile Cognitive Radio Networks
Abstract
:1. Introduction
2. Previous Work
3. Deep Neural Network and Entropy to Multiple PUE Detection in Cooperative MCRN
3.1. Cooperative Spectrum Sensing Model
3.2. Detector Based on Entropy
3.3. Deep Learning Techniques for the Decision of PUE Presence
- Deep or fully connected networks (DNN): These are networks in which each neuron of a layer is connected with all the neurons of the subsequent layer; they have been used mainly in regression problems and the classification of supervised learning [25].
- Convolutional Networks (CNN): These networks, in which a set of filters is implemented in each layer, are very efficient in image processing.
- Recurrent Networks (RNN): In these models, the output depends on the current input and the information processed in the last moments. This characteristic, called short- and long-term memory, allows them to work with data series such as text, audio, or video. They are often used in natural language processing tasks, voice recognition, and time series analysis, among other applications [24].
- Generative Adversarial Networks (GAN): They are a system comprising two neural networks: generative and discriminative. The generative network creates new data from the training data set. In contrast, the discriminative network judges whether the data it receives is training data or data created by the generative network. As this competition process between the two networks progresses, each performs its task more efficiently. Thanks to this architecture, GANs have proven capable of generating high-quality images, music, and videos [26].
3.4. General Proposal for PUE Attack Detection
4. Experiments
5. Results
5.1. Entropy Detection of PUE Attack
5.2. DNN Algorithm Results
5.3. Discussion
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Khan, M.S.; Faisal, M.; Kim, S.M.; Ahmed, S.; St-Hilaire, M.; Kim, J. A correlation-based sensing scheme for outlier detection in cognitive radio networks. Appl. Sci. 2021, 11, 2362. [Google Scholar] [CrossRef]
- Batool, R.; Bibi, N.; Muhammad, N.; Alhazmi, S. Detection of Primary User Emulation Attack Using the Differential Evolution Algorithm in Cognitive Radio Networks. Appl. Sci. 2022, 13, 571. [Google Scholar] [CrossRef]
- Furqan, H.M.; Aygül, M.A.; Nazzal, M.; Arslan, H. Primary user emulation and jamming attack detection in cognitive radio via sparse coding. EURASIP J. Wirel. Commun. Netw. 2020, 2020, 141. [Google Scholar] [CrossRef]
- Balogun, V.; Sarumi, O.A. A Cooperative Spectrum Sensing Architecture and Algorithm for Cloud-and Big Data-based Cognitive Radio Networks. In Proceedings of the 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), London, ON, Canada, 30 August–2 September 2020; pp. 1–5. [Google Scholar]
- Bliss Consultants, B. Detecting the Primary User Emulation Attack Using the Logistic Regression and MLE. 2018. Available online: https://ukdiss.com/examples/primary-user-emulation-attack.php?vref=1 (accessed on 26 May 2023).
- Inamdar, M.A.; Kumaraswamy, H. Accurate primary user emulation attack (PUEA) detection in cognitive radio network using KNN and ANN classifier. In Proceedings of the 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), Tirunelveli, India, 15–17 June 2020; pp. 490–495. [Google Scholar]
- Cadena Muñoz, E.; Pedraza Martínez, L.F.; Hernandez, C.A. Rényi Entropy-Based Spectrum Sensing in Mobile Cognitive Radio Networks Using Software Defined Radio. Entropy 2020, 22, 626. [Google Scholar] [CrossRef]
- Ernesto, C.M.; Martínez, J.A.R.; Martínez, L.F.P.; Parra, I.P.P. Cooperative Spectrum Sensing with Entropy for Mobile Cognitive Radio Networks. In Proceedings of the 2020 IEEE ANDESCON, Quito, Ecuador, 13–16 October 2020; pp. 1–5. [Google Scholar]
- Muñoz, E.C.; Pedraza, L.F.; Hernández, C.A. Machine Learning Techniques Based on Primary User Emulation Detection in Mobile Cognitive Radio Networks. Sensors 2022, 22, 4659. [Google Scholar] [CrossRef]
- Cadena Muñoz, E.; Pedraza Martínez, L.F.; Ortiz Triviño, J.E. Detection of Malicious Primary User Emulation Based on a Support Vector Machine for a Mobile Cognitive Radio Network Using Software-Defined Radio. Electronics 2020, 9, 1282. [Google Scholar] [CrossRef]
- Shrivastava, S.; Rajesh, A.; Bora, P.K.; Chen, B.; Dai, M.; Lin, X.; Wang, H. A survey on security issues in cognitive radio based cooperative sensing. IET Commun. 2021, 15, 875–905. [Google Scholar] [CrossRef]
- Villalonga, D.A.U.; Cotrina, E.G.; Salgado, A.A.V.; Gómez, J.T.; García, D.L. Cooperative Spectrum Sensing Application Using RTL-Dongle Technology. Rev. Telemática 2019, 18, 139–150. [Google Scholar]
- Li, K.; Wang, J. Optimal Joining Strategies in Cognitive Radio Networks Under Primary User Emulation Attacks. IEEE Access 2019, 7, 183812–183822. [Google Scholar] [CrossRef]
- Rajagopala, M.; Lingareddy, S. Spectrum occupancy-based PUEA detection using SVM-PSO in cognitive networks. Int. J. Commun. Netw. Distrib. Syst. 2021, 26, 30–49. [Google Scholar] [CrossRef]
- Ghanem, W.R.; Mohamed, R.E.; Shokair, M.; Dessouky, M.I. Particle swarm optimization approaches for primary user emulation attack detection and localization in cognitive radio networks. arXiv 2019, arXiv190201944. [Google Scholar]
- Robert, V.N.J.; Vidya, K. OAM-GANN: Online Adaptive Memory Based Genetically Optimized Artificial Neural Network for PUEA Detection in CRN Applications, 12 August 2022, PREPRINT (Version 1). Available online: https://doi.org/10.21203/rs.3.rs-1952113/v1 (accessed on 26 May 2023).
- Camana, M.R.; Garcia, C.E.; Koo, I.; Shakhov, V. Machine Learning Based Primary User Emulation Attack Detection. In Proceedings of the 2022 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sofia, Bulgaria, 6–9 June 2022; pp. 244–248. [Google Scholar]
- Sureka, N.; Gunaseelan, K. Investigations on detection and prevention of primary user emulation attack in cognitive radio networks using extreme machine learning algorithm. J. Ambient Intell. Humaniz. Comput. 2021, 1–10. [Google Scholar] [CrossRef]
- Ajay, V.; Nesasudha, M. Detection of Attackers in Cognitive Radio Network Using Optimized Neural Networks. Intell. Autom. Soft Comput. 2022, 34, 193–204. [Google Scholar] [CrossRef]
- Charan, C. Double Threshold Based Cooperative Spectrum Sensing with Consideration of History of Sensing Nodes in Cognitive Radio Networks. In Proceedings of the 2018 2nd International Conference on Power, Energy and Environment: Towards Smart Technology (ICEPE), Shillong, Inida, 1–2 June 2018; pp. 1–9. [Google Scholar]
- So, J. Entropy-based Spectrum Sensing for Cognitive Radio Networks in the Presence of an Unauthorized Signal. KSII Trans. Internet Inf. Syst. 2015, 9, 20–33. [Google Scholar]
- Aggarwal, C.C. Neural Networks and Deep Learning; Springer: Cham, Switzerland, 2018; ISBN 978-3-319-94462-3. [Google Scholar]
- Ding, H.; Wu, J.; Zhao, W.; Matinlinna, J.P.; Burrow, M.F.; Tsoi, J.K.-H. Artificial intelligence in dentistry—A review. Front. Dent. Med. 2023, 4, 1085251. [Google Scholar] [CrossRef]
- Yu, Y.; Si, X.; Hu, C.; Zhang, J. A review of recurrent neural networks: LSTM cells and network architectures. Neural Comput. 2019, 31, 1235–1270. [Google Scholar] [CrossRef]
- Bharti, R.; Khamparia, A.; Shabaz, M.; Dhiman, G.; Pande, S.; Singh, P. Prediction of heart disease using a combination of machine learning and deep learning. Comput. Intell. Neurosci. 2021, 2021, 8387680. [Google Scholar] [CrossRef] [PubMed]
- Aggarwal, A.; Mittal, M.; Battineni, G. Generative adversarial network: An overview of theory and applications. Int. J. Inf. Manag. Data Insights 2021, 1, 100004. [Google Scholar] [CrossRef]
- Montesinos López, O.A.; Montesinos López, A.; Crossa, J. Multivariate Statistical Machine Learning Methods for Genomic Prediction; Springer Nature: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Bengio, Y.; Lecun, Y.; Hinton, G. Deep learning for AI. Commun. ACM 2021, 64, 58–65. [Google Scholar] [CrossRef]
- Higham, C.F.; Higham, D.J. Deep learning: An introduction for applied mathematicians. Siam Rev. 2019, 61, 860–891. [Google Scholar] [CrossRef]
- Molla, D.M.; Badis, H.; George, L.; Berbineau, M. Software defined radio platforms for wireless technologies. IEEE Access 2022, 10, 26203–26229. [Google Scholar] [CrossRef]
- Ettus, C. Building_and_Installing_the_USRP_Open-Source_Toolchain_(UHD_and_GNU_Radio)_on_Linux. 2019. Available online: https://kb.ettus.com/Building_and_Installing_the_USRP_Open-Source_Toolchain_(UHD_and_GNU_Radio)_on_Linux (accessed on 20 May 2023).
- Partiansyah, F.H.; Kusmaryanto, S.; Ambarwati, R.; Pramono, S.H. Experimental Study of USRP N210 as Simple GSM OpenBTS 5.0 for Remote Areas. In Proceedings of the 2022 11th Electrical Power, Electronics, Communications, Controls and Informatics Seminar (EECCIS), Malang, Indonesia, 23–25 August 2022; pp. 185–190. [Google Scholar]
- Esmaeily, A.; Kralevska, K. Small-scale 5g testbeds for network slicing deployment: A systematic review. Wirel. Commun. Mob. Comput. 2021, 2021, 6655216. [Google Scholar] [CrossRef]
- Chica-Pedraza, G.; Mojica-Nava, E.; Cadena-Muñoz, E. Boltzmann distributed replicator dynamics: Population games in a microgrid context. Games 2021, 12, 8. [Google Scholar] [CrossRef]
Parameter | Value |
---|---|
Samples | 20,000 samples |
Averaged Values | 100 samples for each point of the grid with an on/off value |
Noise Signal | AWGN |
Service | Phone Call-PUEA |
Frequency | 831.8 MHz |
Confidence Level | 95% |
Margin of error | 5% |
Users | 3 SU, 1 FC, 1 PUE |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Muñoz, E.C.; Pedraza, G.C.; Cubillos-Sánchez, R.; Aponte-Moreno, A.; Buitrago, M.E. PUE Attack Detection by Using DNN and Entropy in Cooperative Mobile Cognitive Radio Networks. Future Internet 2023, 15, 202. https://doi.org/10.3390/fi15060202
Muñoz EC, Pedraza GC, Cubillos-Sánchez R, Aponte-Moreno A, Buitrago ME. PUE Attack Detection by Using DNN and Entropy in Cooperative Mobile Cognitive Radio Networks. Future Internet. 2023; 15(6):202. https://doi.org/10.3390/fi15060202
Chicago/Turabian StyleMuñoz, Ernesto Cadena, Gustavo Chica Pedraza, Rafael Cubillos-Sánchez, Alexander Aponte-Moreno, and Mónica Espinosa Buitrago. 2023. "PUE Attack Detection by Using DNN and Entropy in Cooperative Mobile Cognitive Radio Networks" Future Internet 15, no. 6: 202. https://doi.org/10.3390/fi15060202
APA StyleMuñoz, E. C., Pedraza, G. C., Cubillos-Sánchez, R., Aponte-Moreno, A., & Buitrago, M. E. (2023). PUE Attack Detection by Using DNN and Entropy in Cooperative Mobile Cognitive Radio Networks. Future Internet, 15(6), 202. https://doi.org/10.3390/fi15060202