Professional Documents
Culture Documents
ISSIN:
Abstract: In cognitive radio networks CRN the main aim is to allow the secondary users SUs to
identify the empty bands and use them to transmit or receive data opportunistically. Primary users
PUs have the priority to use a channel while the secondary users must vacant this channel once a
primary user request it. An attack known in the cognitive radio as a primary user emulation
attacks (PUEA), its aim is to prevent the SU from using the empty bands.
In this paper, an analytical and experimental approach is presented to mitigate the PUEA, this
approach is based on obtaining the probability density functions PDFs of the received powers at
the secondary users from malicious nodes and also from the primary transmitter in the cognitive
network. Then, these obtained PDFs are used in Neyman-pearson composite hypothesis test to
measure the performance metrics (probability of false alarm and miss detection in the network).
The results proved that the performance metrics greatly influenced by the network area where the
secondary user presented and the threshold value λ that is used in the decision rule. Also there are
boundaries for the λ choices that can not be overtaken.
Keywords: Cognitive Radio CR; Probability Density Function (PDF); Primary User Emulation
Attack (PUEA).
*Corresponding Author: Mahmoud Ammar, m.ammar@zu.edu.ly, Department of Computer Engineering, University of Zawia, Zawia, Libya
1
Al-Mukhtar Journal of Sciences 00 (0): 00-00, 2021
ISSIN:
*Corresponding Author: Mahmoud Ammar, m.ammar@zu.edu.ly, Department of Computer Engineering, University of Zawia, Zawia, Libya
2
Al-Mukhtar Journal of Sciences 00 (0): 00-00, 2021
ISSIN:
2
p( p ) P d k 2
r t p
p/10
K 10
Where k is the path
loss
Thus the probability density function of the
Good User
Malicious
Primary received power is
user
user
*Corresponding Author: Mahmoud Ammar, m.ammar@zu.edu.ly, Department of Computer Engineering, University of Zawia, Zawia, Libya
3
Al-Mukhtar Journal of Sciences 00 (0): 00-00, 2021
ISSIN:
1
2
(10 log10 x−μ p ) The results obtained using Matlab simulation
Pr
P ( x)=
Aσ p √ 2πx (
exp −
2σ 2p ) 3 are presented in this section, the performance
of the cognitive network under the PUE
attack is studied in terms of probability of
miss detection and false alarm.
µp , σp are the mean and variance of the
distribution , and given by Both the probability of miss detection and
false alarms are calculated for 1000 times of
10 log p 20 log d simulations to be averaged to perform
p 10 t 10 p accurate results. The result obtained first
based on the threshold value λ=0.45 . The
Secondly, the received power from each network is assumed as it’s under a high
malicious user P (mi) at the secondary user is number of malicious attackers M=20. In this
calculated according to the equation below: case it is noticed that when λ is too small ,the
( mi) −4 achieved false alarm probability is very small
P =( PT ) d i K 4 which in this case is about 0.05 as shown in
mi
Figure 2 below. In the same time, the miss
Where k is the path loss . d i is the distance
detection probability is high and is about
from the secondary user.
0.325 as shown in Figure 3. These values are
Based on the above equations , the decision averaged out of 1000 runs.
variable Λ that is used to find the false alarm
and miss detection probabilities can be
calculated as follow
m Pr
Λ= P (χ) / P (χ) 5
Pr
Where P ( χ ) and P ( χ ) is the pdf of
m
*Corresponding Author: Mahmoud Ammar, m.ammar@zu.edu.ly, Department of Computer Engineering, University of Zawia, Zawia, Libya
4
Al-Mukhtar Journal of Sciences 00 (0): 00-00, 2021
ISSIN:
*Corresponding Author: Mahmoud Ammar, m.ammar@zu.edu.ly, Department of Computer Engineering, University of Zawia, Zawia, Libya
5
Al-Mukhtar Journal of Sciences 00 (0): 00-00, 2021
ISSIN:
*Corresponding Author: Mahmoud Ammar, m.ammar@zu.edu.ly, Department of Computer Engineering, University of Zawia, Zawia, Libya
6
Al-Mukhtar Journal of Sciences 00 (0): 00-00, 2021
ISSIN:
*Corresponding Author: Mahmoud Ammar, m.ammar@zu.edu.ly, Department of Computer Engineering, University of Zawia, Zawia, Libya
7
مجلة المختار للعلوم 2018 ,00-00 :)0( 00
الملخص :في شبكات الراديو المعرفية) Cognitive Radio Networks ( CRNالهدف الرئيسي هو السماح للمستخدمين الثانويين
( Secondary users )SUsبتحديد Lالنطاقات الفارغة واستخدامها لنقل البيانات أو استقبالها بشكل انتهازي .يتمتع المستخدمين
االساسيين ) Primary Users (Pusباألولوية في استخدام قناة او تردد ما بينما يجب على المستخدمين الثانويين إخالء هذه القناة
بمجرد أن يطلبها المستخدم األساسي .هناك هجوم امني ُيعرف في الراديو المعرفي بأنه هجوم محاكاة المستخدم األساسي Primary
) ، user emulation attack (PUEAويهدف إلى منع SUمن استخدام النطاقات الفارغة.
في هذه الورقة ،تم تقديم نهج تحليلي وتجريبي للتخفيف من ، PUEAويستند هذا النهج إلى الحصول على وظائف الكثافة
االحتمالية .( PDF) Probability density functionبعد ذلك ،يتم استخدام ملفات PDFالتي تم الحصول عليها في اختبار
الفرضية المركبة Neyman-pearsonلقياس مقاييس األداء (احتمال اإلنذار الخاطئ واكتشاف األخطاء في الشبكة) .أثبتت النتائج
أن مقاييس األداء تتأثر بشكل كبير بموقع الشبكة حيث قدم المستخدم الثانوي وقيمة العتبة المستخدمة في قاعدة القرار .كما أن هناك
حدودا لالختيارات ال يمكن تجاوزها.
ً
الكلمات المفتاحية :الراديو المعرفي CR؛ دالة الكثافة االحتمالية ( )PDF؛ هجوم محاكاة المستخدم األساسي (.)PUEA
*Corresponding Author: Mahmoud Ammar, m.ammar@zu.edu.ly, Department of Computer Engineering, University of Zawia, Zawia, Libya
8