Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard

Alahmadi, A and Abdelhakim, M and Ren, J and Li, T (2014) Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Transactions on Information Forensics and Security, 9 (5). 772 - 781. ISSN 1556-6013

[img] Plain Text (licence)
Available under License : See the attached license file.

Download (1kB)

Abstract

This paper considers primary user emulation attacks in cognitive radio networks operating in the white spaces of the digital TV (DTV) band. We propose a reliable AES-assisted DTV scheme, in which an AES-encrypted reference signal is generated at the TV transmitter and used as the sync bits of the DTV data frames. By allowing a shared secret between the transmitter and the receiver, the reference signal can be regenerated at the receiver and used to achieve accurate identification of the authorized primary users. In addition, when combined with the analysis on the autocorrelation of the received signal, the presence of the malicious user can be detected accurately whether or not the primary user is present. We analyze the effectiveness of the proposed approach through both theoretical analysis and simulation examples. It is shown that with the AES-assisted DTV scheme, the primary user, as well as malicious user, can be detected with high accuracy under primary user emulation attacks. It should be emphasized that the proposed scheme requires no changes in hardware or system structure except for a plug-in AES chip. Potentially, it can be applied directly to today's DTV system under primary user emulation attacks for more efficient spectrum sharing. © 2014 IEEE.


Share

Citation/Export:
Social Networking:
Share |

Details

Item Type: Article
Status: Published
Creators/Authors:
CreatorsEmailPitt UsernameORCID
Alahmadi, A
Abdelhakim, MMAIA@pitt.eduMAIA0000-0001-8442-0974
Ren, J
Li, T
Date: 1 January 2014
Date Type: Publication
Journal or Publication Title: IEEE Transactions on Information Forensics and Security
Volume: 9
Number: 5
Page Range: 772 - 781
DOI or Unique Handle: 10.1109/tifs.2014.2310355
Schools and Programs: School of Information Sciences > Telecommunications
Refereed: Yes
ISSN: 1556-6013
Date Deposited: 30 Jun 2017 14:49
Last Modified: 09 Aug 2019 16:55
URI: http://d-scholarship.pitt.edu/id/eprint/32608

Metrics

Monthly Views for the past 3 years

Plum Analytics

Altmetric.com


Actions (login required)

View Item View Item