Distance Difference Test for Detection of Malicious User in Cognitive Radio

Authors

  • Seema Rajput Department of Electronics and Telecommunication Engineering, Sinhgad Academy of Engineering , University of Pune, Pune - 411 048, India
  • Amol Chaudhari Department of Electronics and Telecommunication Engineering, Sinhgad Academy of Engineering , University of Pune, Pune - 411 048, India
  • Pratiksha Landge Department of Electronics and Telecommunication Engineering, Sinhgad Academy of Engineering , University of Pune, Pune - 411 048, India
  • Swapnali Kumbhar Department of Electronics and Telecommunication Engineering, Sinhgad Academy of Engineering , University of Pune, Pune - 411 048, India

DOI:

https://doi.org/10.51983/ajes-2012.1.1.1647

Keywords:

Federal Communication Commission, Cognitive Radio, Primary User Emulation

Abstract

A number of wireless applications have been growing over the last decade. Most of the frequency spectrum has already been licensed by government agencies, such as Federal Communications Commission (FCC). Therefore, there exists an apparent spectrum scarcity for new wireless applications and services. Cognitive radio(CR) can efficiently utilize the unused spectrum for secondary usage without interfering a primary licensed user. In cooperative environment, a primary licensed user can share spectrum occupancy information with a secondary user to enable dynamic spectrum access. However, a secondary user needs to verify accuracy of the spectrum occupancy information and it comes from the legitimate primary users. Without the verification, a malicious user can falsify the spectrum occupancy information. This can result in Interference to the primary users and Primary User Emulation attack(PUE) which can minimize spectrum occupancy for secondary user. In this paper, we propose to develop an efficient technique to verify the source of the spectrum occupancy information to be from the legitimate primary user thereby maximizing the spectrum utilization efficiency and minimizing any interference to the primary licensed users.

References

S. Capkun, M. Cagalj, and M. Srivastava, “Secure localization with hidden and mobile base stations,” IEEE INJOCOMR, 2006.

S. Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications”, IEEE Journal on Selected Areas in Communications, Vol. 23, No.2, pp. 201-220, 2005.

Wikipedia-The online encyclopedia. 2009. Retrieved from http://en.wikipedia.org/wiki/ROI.

Federal Communication Commission, “Notice for Proposed Rulemaking (NPRM 03- 22): Facilitating Opportunities fbr Flexible,Efficient, and Reliable Spectrum Use Employing Cognitive Radio Technologies,” ETDocket, No. 03-108, Dec. 2003.

E. P. J. Tozer, Broadcast Engineer Reference Book, Elsevier,2004.

Federal Communications Commission, “’Unlicensed operation in the TV broadcast bands and additional spectrum for unlicensed devices below 900 MHz in the 3GHz band,” ETDocket No. 04-186,May 2004.

M. G. Kuhn, An asymmetric security mechanism for navigation signals, Information Hiding Workshop, May 2004, pp.239-252.

Downloads

Published

05-05-2012

How to Cite

Rajput, S., Chaudhari, A., Landge, P., & Kumbhar, S. . (2012). Distance Difference Test for Detection of Malicious User in Cognitive Radio. Asian Journal of Electrical Sciences, 1(1), 58–62. https://doi.org/10.51983/ajes-2012.1.1.1647