Total views : 263

SVM based Two Level Authentication for Primary user Emulation Attack Detection

Affiliations

  • Electronics and Communication Engineering, Bharath University, Chennai – 600 073, Tamil Nadu, India

Abstract


Background/Objectives: Cognitive radio network is the evolutionary network to solve the spectrum scarcity problem. Primary User Emulation Attack is a major security issue that cause to fail the dynamic spectrum access of the cognitive radio network. Methods/Statistical Analysis: This paper proposes two level verification of the primary user signal to enhance the security of the spectrum sensing under PUEA attack. Support Vector Machine is used in the two level verification for detector classify the received data in to a location boundary and higher order statics at second level. Findings: At first level using the location information of the primary user, the primary user signal is verified for its validity. The SVM is first trained to learn the Primary user Location and with the help of known location of the Primary user it can be verified. Then the trained SVM is used to find the location boundary of the user that transmitted the signal. If the signal boundary is within the primary used location boundary it is concluded that the signal is from the primary user; else it is from the PUEA attacker .After verifying in the first level on the second level higher order statics values are calculated then using that as the feature vector the SVM classifier is used to classify the received signal as two class: one from original primary user and other from the PUEA attacker. This two level verification of the primary user signal will be more accurate method of PUEA attack detection comparing to the single level schemes. Applications/Improvements:This two level verification scheme improves the accuracy from 82% at Linear SVM kernel to 100% and also from 77% at RBF SVM kernel to 100%.

Keywords

Cognitive Radio Network, Dynamic Spectrum Access, Primary user Emulation Attack, Support Vector Machines.

Full Text:

 |  (PDF views: 225)

References


  • Vapnik V. The Nature of Statistical Learning Theory, Information Science and Statistics, Springer Science: New York, 2000.
  • Ghosh AK, Schwartzbard A. A study in using neural networks for anomaly and misuse detection, in: Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA. 1999; 141–52.
  • Digham FF, Alouini MS, Simon MK. On the energy detection of unknown signals over fading channels, IEEE International Conference on Communications, ICC ‘03, 2003; 5. p. 3575–79.
  • Kim H, Shin K. In-Band Spectrum Sensing in IEEE 802.22 WRANs for Incumbent Protection. IEEE Transactions on Mobile Computing. 2008; 9(12):1766–79.
  • Avila J, Thenmozhi K. Upgraded Spectrum Sensing Method in Cognitive Radio Network. Indian Journal of Science and Technology. 2015 Jul; 8(16):1–4.
  • Padmavathi G, Shanmugavel S. Performance analysis of cooperative spectrum sensing technique for low SNR regime over fading channels for cognitive radio networks. Indian Journal of Science and Technology. 2015 Jul; 8(16):1–5.
  • Yang Y, Liu Y, Zhang Q, Ni L. Cooperative boundary detection for spectrum sensing using dedicated wireless sensor networks, 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, INFOCOM, San Diego, CA, 2010 Mar. p. 1–9.
  • Chen R, Park JM, Reed JH. Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications. 2008 Jan; 26(1):25–37.
  • Mathur CN, Subbalakshmi KP. Digital signatures for centralized DSA networks. Proceedings 4th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, CCNC. 2007. p. 1037–41.
  • Li H, Han Z. Dogfight in spectrum: jamming and antijamming in cognitive radio systems, in Proc. IEEE Global Telecommunications Conference, GLOBECOM’ 2009, Honolulu, HI. 2009 Nov. p. 1–6.
  • Li H, Han Z. Blind dogfight in spectrum: combating primary user emulation attacks in cognitive radio systems with unknown channel statistics. Proceedings IEEE International Conference on Communications (ICC), Cape Town. 2010 May. p. 1–6.
  • Chen C, Cheng H, Yao YD, Hongbing Cheng CC. Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack. IEEE Transactions on Wireless Communications. 2011 Jul; 10(7):2135–41.
  • Mukkamala S, Sung AH, Abraham A. Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach Proceedings of Innovations in Applied Artificial Intelligence. 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE), Springer: Berlin Heidelberg. 2004 May. p. 634–42.
  • Swami A, Sadler BM. Hierarchical Digital Modulation Classification using Cumulants. IEEE Transactions on Communications. 2000 Mar; 48(3):416–29.
  • Bhagavathy Nanthini S, Hemalatha M, Manivannan D, Devasena L. Attacks in Cognitive Radio Networks (CRN) - A Survey. Indian Journal of Science and Technology. 2014 Jan; 7(4):530–36.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.