z-logo
open-access-imgOpen Access
Combating PUE Attack in Cognitive Radio Networks using RSSI Based EKF and UKF
Author(s) -
Kattaswamy Mergu
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.b3886.129219
Subject(s) - cognitive radio , computer science , wireless , extended kalman filter , kalman filter , real time computing , universal software radio peripheral , computer network , spectrum management , computer security , telecommunications , artificial intelligence
The problem of spectrum scarcity in wireless communication can be reduced by Cognitive Radio (CR) technology in which the spectrum holes or unused spectrum can be allocated to the secondary or unlicensed users. But the major problem in CR is providing security. Various security issues are present at different layer. One of the major wide spread security issue in the cognitive radio is the Primary user emulsion attack in which the malicious secondary user emulated as primary user to get spectrum resources for a long time. One of way to avoided PUEA is, by obtaining the location of malicious user. The conventional location detection techniques such as time of arrival, time difference of arrival and direction of arrival, will give better performance when the user is stationary. Even though Received Signal Strength Indicator along RF fingerprint technique gives the better location of mobile user but it requires the more hardware. Hence the cost is high. In this paper, the author proposed an algorithm to locate the attacker using EKF and UKF with RSSI. In this algorithm, the initial position of user can be obtained by Received Signal Strength Indicator. This initial position integrated to EKF and UKF to track the location of primary user, which is a mobile user so that PUE Attack can be identified and avoided. The author also compares the performance of Extended Kalman Filter with Unscented Kalman Filter by Matlab software.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here