Please use this identifier to cite or link to this item: http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30180
Title: A Survey of the Primary User Emulation Attack in the Cognitive Radio Networks
Other Titles: 4th International Engineering Conference (IEC 2022)
Authors: Olaleru, Grace
Ohize, H
Dauda, U. S.
Mohammed, Abubakar Saddiq
Keywords: Cognitive Radio
Primary User
Primary User Emulation Attack
Secondary User
Security threats.
Issue Date: 2022
Publisher: Federal University of Technology, Minna, Nigeria (SEET)
Citation: Abubakar Saddiq Mohammed
Series/Report no.: 4th International Conference IEC 2022;pp. 357-372
Abstract: Cognitive Radio Technology (CRT) helps alleviate the spectrum scarcity and spectrum underutilization problems experienced by wireless networks and wireless devices by enabling the intelligent and opportunistic use of the licensed frequency band by unlicensed users. However, due to its wireless nature, it is subject to some security threats that affect the practical implementation of the CRT. In this paper, we have discussed some of the security threats affecting the protocol stack and the five layers of the Cognitive Radio Network (CRN), with a focus on the Primary User Emulation Attack (PUEA). The PUEA is one of the most common attacks on the CRN’s physical layer. In this attack, a selfish or malicious user mimics the primary user's (PU) signal features to fool the legitimate secondary users (SUs), causing the legitimate SUs to leave the available channel while the real PU is absent. Although many review papers enhanced our knowledge of the PUEA, in this paper we meld new research findings with the old ones to keep up the pace in the research community. Also, we discussed some detection and countermeasures for the PUEA in the CRN. Finally, a summary of the findings on how best to mitigate the effect of PUE attacks in the CR is presented.
URI: http://irepo.futminna.edu.ng:8080/jspui/submit?resume=35773
http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30180
Appears in Collections:Telecommunication Engineering

Files in This Item:
File Description SizeFormat 
A Survey of the Primary User Emulation Attack in the Cognitive Radio Networks.pdfA Survey of the Primary User Emulation Attack in the Cognitive Radio Networks5.56 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.