Countermeasures for Primary User Emulation Attack: A Comprehensive Review
- PDF / 1,069,215 Bytes
- 32 Pages / 439.37 x 666.142 pts Page_size
- 35 Downloads / 183 Views
Countermeasures for Primary User Emulation Attack: A Comprehensive Review Nikita Mishra1 · Sumit Srivastava2 · Shivendra Nath Sharan3
© Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Cognitive radio (CR) is a flexible wireless network that can solve the scarcity and underutilization problem of the spectrum by permitting unlicensed users to access licensed bands. The dynamic nature of CR makes it more vulnerable in terms of security. This paper’s emphasis is on the primary user emulation attack, which poses a severe threat to the spectrum sensing operation of CR. In this attack, a malicious user imitates the signal characteristics of a licensed user (primary user) to disguise its true identity. Although many survey papers enhance our knowledge of cognitive radio security, this paper is an attempt to culminate new findings with the old ones to keep up the pace of the research community. Finally, the paper summarizes with some recommendations and future strategies pertinent to energy-efficient and flexible security methods for next-generation wireless systems. Keywords Cognitive radio · Primary user emulation · Security · Physical layer
1 Introduction In the primitive years of radio spectrum, non-communicative RF energy based applications (oven, heating appliances to name a few) merely occupied the band until in recent times, incremental usage of communication based application compelled to create more space. The band regulations hence got modified by the international telecommunication union (ITU) and covered both energy and communication based applications. This worldwide regulation for such dedicated spectrum slot was majorly classified for applications in the field of industry, science and medical. Industrial Scientific and Medical (ISM) is a band which facilitates a free radio spectrum band in order to operate a cordless telephone, a Bluetooth device, a wi-fi, a garage door opener, an animal tracker or even a baby monitor. Due to phenomenal advancement in wireless technology, artificial intelligence, smart
* Nikita Mishra [email protected] 1
Department of Electronics and Communication Engineering, Manipal University, Jaipur, India
2
Computer Science and Engineering, Manipal University, Jaipur, India
3
Electronics and Communication Engineering, NIIT University, Neemrana, India
13
Vol.:(0123456789)
N. Mishra et al.
phones and the burst of social networking platforms (Instagram, Facebook, and Twitter), demand for the wireless network is increasing exponentially (Fig. 1). Due to exponential demand, ISM band is heading towards a point of suffocation. Primitive allocation of spectrum and the governing policies has led to underutilized spectrum resources. Licensed users like television, cellular, and radio users are assigned a large spectrum portion which varies its operation (or is even turned OFF) with time and geographical location, resulting in underutilization or complete wastage of a limited spectrum [1–3]. To summarize, we work in an environment which is either
Data Loading...