Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 9571592, 8 pages
http://dx.doi.org/10.1155/2016/9571592
Research Article

Location Aided Cooperative Detection of Primary User Emulation Attacks in Cognitive Wireless Sensor Networks Using Nonparametric Techniques

Departamento Señales, Sistemas y Radiocomunicaciones, ETSI Telecomunicación, Universidad Politécnica de Madrid, Avenida Complutense 30, 28040 Madrid, Spain

Received 17 April 2015; Revised 13 September 2015; Accepted 14 September 2015

Academic Editor: Walid Saad

Copyright © 2016 Mariano García-Otero and Adrián Población-Hernández. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201–220, 2005. View at Publisher · View at Google Scholar · View at Scopus
  2. R. Chen, J.-M. Park, and J. H. Reed, “Defense against primary user emulation attacks in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 25–37, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. A. G. Fragkiadakis, E. Z. Tragos, and I. G. Askoxylakis, “A survey on security threats and detection techniques in cognitive radio networks,” IEEE Communications Surveys and Tutorials, vol. 15, no. 1, pp. 428–445, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. Y.-C. Hu, A. Perrig, and D. Johnson, “Wormhole attacks in wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370–380, 2006. View at Publisher · View at Google Scholar · View at Scopus
  5. Z. Jin, S. Anand, and K. P. Subbalakshmi, “Detecting primary user emulation attacks in dynamic spectrum access networks,” in Proceedings of the IEEE International Conference on Communications (ICC '09), Dresden, Germany, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. Z. Yuan, D. Niyato, H. Li, J. B. Song, and Z. Han, “Defeating primary user emulation attacks using belief propagation in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 10, pp. 1850–1860, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. X. Xie and W. Wang, “Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding,” Journal of Ubiquitous Systems and Pervasive Networks, vol. 5, no. 1, pp. 1–8, 2014. View at Google Scholar
  8. J. Blesa, E. Romero, A. Rozas, A. Araujo, and O. Nieto-Taladriz, “PUE attack detection in CWSN using collaboration and learning behavior,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 815959, 8 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Alahmadi, M. Abdelhakim, J. Ren, and T. Li, “Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 5, pp. 772–781, 2014. View at Publisher · View at Google Scholar
  10. Y. Liu, P. Ning, and H. Dai, “Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures,” in Proceedings of the 31st IEEE Symposium on Security and Privacy (SP '10), pp. 286–301, Oakland, Calif, USA, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. O. R. Afolabi, K. Kim, and A. Ahmad, “On secure spectrum sensing in cognitive radio networks using emitters electromagnetic signature,” in Proceedings of the 18th International Conference on Computer Communications and Networks (ICCCN '09), pp. 1–5, IEEE, San Francisco, Calif, USA, August 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. N. T. Nguyen, R. Zheng, and Z. Han, “On identifying primary user emulation attacks in cognitive radio systems using nonparametric Bayesian classification,” IEEE Transactions on Signal Processing, vol. 60, no. 3, pp. 1432–1445, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Sharaf-Dabbagh and W. Saad, “Transfer learning for device fingerprinting with application to cognitive radio networks,” in Proceedings of the 26th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '15), pp. 2333–2337, IEEE, Istanbul, Turkey, September 2015.
  14. M. García-Otero and A. Población-Hernández, “Secure neighbor discovery in wireless sensor networks using range-free localization techniques,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 763187, 12 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. T. S. Rappaport, Wireless Communications: Principles and Practice, Prentice Hall PTR, Upper Saddle River, NJ, USA, 2nd edition, 2002.
  16. S. M. Kay, Fundamentals of Statistical Signal Processing, Volume II: Detection Theory, Prentice Hall PTR, Upper Saddle River, NJ, USA, 1998.
  17. M. Kendall and A. Stuart, The Advanced Theory of Statistics, vol. 2, Charles Griffin, London, UK, 1979.
  18. N. Patwari, A. O. Hero III, M. Perkins, N. S. Correal, and R. J. O'Dea, “Relative location estimation in wireless sensor networks,” IEEE Transactions on Signal Processing, vol. 51, no. 8, pp. 2137–2148, 2003. View at Publisher · View at Google Scholar · View at Scopus