Volume & Issue no: Volume 6, Issue 2, March - April 2017
____________________________________________________________________________________________________
Title: |
Primary User Emulation Attack (PUEA) Analysis in Cognitive Radio Network.
|
Author Name: |
P.S Dinesh, S. Dinesh, S. Tephillah, A.M. Balamurugan. |
Abstract: |
Abstract
With the progression in wireless networking, there is an escalating problem of spectrum scarcity. To resolve this issue, a technology called Cognitive Radio (CR) was introduced, in which the secondary users can sense the spectrum and use the licensed bands when the spectrum is not being used by the primary user. So, spectrum sensing is the essential mechanism on which the entire communication depends. If the spectrum sensing result is disrupted, the entire networks activities will be breached. Because of its wireless nature, there are various security threats specific to CR, which these networks are susceptible to. One of the most overriding threats among these is the Primary User Emulation Attack (PUEA).It is an acute threat in physical layer of CR network in which a malicious secondary user exploits the spectrum access etiquette by mimicking the spectral characteristics of a primary user. In this paper, we propose different frameworks to secure CR networks against PUEA to capitulate better results than existing techniques. |
Cite this article: |
P.S Dinesh, S. Dinesh, S. Tephillah, A.M. Balamurugan. , "
Primary User Emulation Attack (PUEA) Analysis in Cognitive Radio Network.
" , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) ,
Volume 6, Issue 2, March - April 2017 , pp.
067-071 , ISSN 2278-6856.
|
Full Text [PDF] Back to Current Issue |
NOTE: Authors note that paper cannot be withdrawn at any condition once it is accepted. The Team of IJETTCS advise you, do not submit same article to the multiple journals simultaneously. This may create a problem for you. Please wait for review report which will take maximum 01 to 02 week.