Please use this identifier to cite or link to this item:
http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/25303
Title: | A Survey of the Primary User Emulation Attack in the Cognitive Radio Networks |
Authors: | OLALERU, GRACE OHIZE, HENRY OHIANI DAUDA, UMAR SULEIMAN MOHAMMED, ABUBAKAR SADIQ |
Keywords: | Cognitive Radio, Primary User, Primary User Emulation Attack, Secondary User, Security threats |
Issue Date: | 21-Mar-2023 |
Publisher: | SEET FUT MINNA |
Abstract: | Cognitive Radio Technology (CRT) helps alleviate the spectrum scarcity and spectrum underutilization problems experienced by wireless networks and wireless devices by enabling the intelligent and opportunistic use of the licensed frequency band by unlicensed users. However, due to its wireless nature, it is subject to some security threats that affect the practical implementation of the CRT. In this paper, we have discussed some of the security threats affecting the protocol stack and the five layers of the Cognitive Radio Network (CRN), with a focus on the Primary User Emulation Attack (PUEA). The PUEA is one of the most common attacks on the CRN’s physical layer. In this attack, a selfish or malicious user mimics the primary user's (PU) signal features to fool the legitimate secondary users (SUs), causing the legitimate SUs to leave the available channel while the real PU is absent. Although many review papers enhanced our knowledge of the PUEA, in this paper we meld new research findings with the old ones to keep up the pace in the research community. Also, we discussed some detection and countermeasures for the PUEA in the CRN. Finally, a summary of the findings on how best to mitigate the effect of PUE attacks in the CR is presented |
URI: | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/25303 |
Appears in Collections: | Electrical/Electronic Engineering |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.