Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Adversary Detection For Cognitive Radio NetworksCase Study I: Link Signature Assisted PUE Attack Detection

Adversary Detection For Cognitive Radio Networks: Case Study I: Link Signature Assisted PUE... [This chapter aims to present a detailed case study of a link signature assisted PUE attack detection scheme. As discussed in the previous chapter, one of the main hurdles making the design of a PUE attack detection scheme nontrivial is the FCC’s requirement that no change should be made to the PU. Due to this requirement, most of the existing detection methods are designed solely for the SU side. Nonetheless, if one can deploy a nearby helper node that holds similar behavioral and physical properties as the PU and allow it to cooperate with the SU, the PUE detection performance may be further improved without disobeying the FCC’s requirement. To convey this idea, in this chapter, some background on link signature will be introduced first, followed by an illustration of how the helper node can exploit its physical closeness to the PU to accurately authenticate the PU signal. Then, the overall link signature based PUE attack detection algorithm is illustrated.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Adversary Detection For Cognitive Radio NetworksCase Study I: Link Signature Assisted PUE Attack Detection

Loading next page...
 
/lp/springer-journals/adversary-detection-for-cognitive-radio-networks-case-study-i-link-037Y2F3eJH

References (12)

Publisher
Springer International Publishing
Copyright
© The Author(s) 2018
ISBN
978-3-319-75867-1
Pages
45 –50
DOI
10.1007/978-3-319-75868-8_4
Publisher site
See Chapter on Publisher Site

Abstract

[This chapter aims to present a detailed case study of a link signature assisted PUE attack detection scheme. As discussed in the previous chapter, one of the main hurdles making the design of a PUE attack detection scheme nontrivial is the FCC’s requirement that no change should be made to the PU. Due to this requirement, most of the existing detection methods are designed solely for the SU side. Nonetheless, if one can deploy a nearby helper node that holds similar behavioral and physical properties as the PU and allow it to cooperate with the SU, the PUE detection performance may be further improved without disobeying the FCC’s requirement. To convey this idea, in this chapter, some background on link signature will be introduced first, followed by an illustration of how the helper node can exploit its physical closeness to the PU to accurately authenticate the PU signal. Then, the overall link signature based PUE attack detection algorithm is illustrated.]

Published: Mar 8, 2018

Keywords: Link Signature; Helper Nodes; Existing Detection Methods; Physical Closeness; Detailed Case Studies

There are no references for this article.