z-logo
open-access-imgOpen Access
Prevention of Emulation Attack in Cognitive Radio Networks Using Integrated Authentication
Author(s) -
Prof. Ojaswini Ghodkande Mr. Dharmesh Dhabliya
Publication year - 2016
Publication title -
international journal of new practices in management and engineering
Language(s) - English
Resource type - Journals
ISSN - 2250-0839
DOI - 10.17762/ijnpme.v5i04.48
Subject(s) - emulation , computer science , cognitive radio , encryption , computer security , authentication (law) , scheme (mathematics) , false alarm , computer network , signal (programming language) , telecommunications , artificial intelligence , mathematical analysis , mathematics , economics , wireless , economic growth , programming language
Security is the prominent problem in emerging cognitive radio. Protecting the chief user’s and sub-ordinate user’s right to use the spectrum results in the correct cognitive radio operation. The major user emulation attack is a physical layer attack which disrupts the secondary user’s operation. An Advanced Encryption Standard scheme is used in this work that aims to defeat the chief User Emulation Attack by the correct detection of the chief user. The reference signal is encrypted and transmitted along with the Digital TV signal. Using a shared secret the receiver regenerates the reference and the cross association and the auto correlation are calculated which helps in the accurate detection of the chief user as well as the malicious user. The simulations were carried out and the results show that the detection scheme results in zero misdetection and also false alarm which is below a set threshold.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here