Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques

This paper discusses the issue of primary user emulation attacks (PUEAs) in cognitive radio networks (CRNs). These attackers imitate the signal characteristics of primary users (PUs), preventing secondary users (SUs) from accessing their assigned spectrum. The research focuses on detecting PUEAs us...

Full description

Saved in:
Bibliographic Details
Main Authors: Jabbar Mahmood, Rahim Ali Qamar, Shahzad Latif
Format: Article
Language:English
Published: National University of Modern Languages (NUML), Islamabad 2024-02-01
Series:NUML International Journal of Engineering and Computing
Online Access:https://nijec.numl.edu.pk/index.php/nijec/article/view/57
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850165415374749696
author Jabbar Mahmood
Rahim Ali Qamar
Shahzad Latif
author_facet Jabbar Mahmood
Rahim Ali Qamar
Shahzad Latif
author_sort Jabbar Mahmood
collection DOAJ
description This paper discusses the issue of primary user emulation attacks (PUEAs) in cognitive radio networks (CRNs). These attackers imitate the signal characteristics of primary users (PUs), preventing secondary users (SUs) from accessing their assigned spectrum. The research focuses on detecting PUEAs using the time difference of arrivals (TDOA) to detect the attacker and reduce detection errors using heuristic techniques. Differential evolution (DE) and cuckoo search (CS) algorithms are utilized to optimize detection accuracy. Simulation results confirm that the proposed CS algorithm outperforms and gives better performance as compared to the DE algorithm.
format Article
id doaj-art-d447ddf339b445608a761584e7707491
institution OA Journals
issn 2788-9629
2791-3465
language English
publishDate 2024-02-01
publisher National University of Modern Languages (NUML), Islamabad
record_format Article
series NUML International Journal of Engineering and Computing
spelling doaj-art-d447ddf339b445608a761584e77074912025-08-20T02:21:46ZengNational University of Modern Languages (NUML), IslamabadNUML International Journal of Engineering and Computing2788-96292791-34652024-02-012210.52015/nijec.v2i2.57Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic TechniquesJabbar Mahmood0Rahim Ali Qamar1Shahzad Latif 2School of Engineering and Applied Sciences (SEAS), Isra University, IslamabadSchool of Engineering and Applied Sciences (SEAS), Isra University, IslamabadDepartment of Computer Science, Szabist, Islamabad This paper discusses the issue of primary user emulation attacks (PUEAs) in cognitive radio networks (CRNs). These attackers imitate the signal characteristics of primary users (PUs), preventing secondary users (SUs) from accessing their assigned spectrum. The research focuses on detecting PUEAs using the time difference of arrivals (TDOA) to detect the attacker and reduce detection errors using heuristic techniques. Differential evolution (DE) and cuckoo search (CS) algorithms are utilized to optimize detection accuracy. Simulation results confirm that the proposed CS algorithm outperforms and gives better performance as compared to the DE algorithm. https://nijec.numl.edu.pk/index.php/nijec/article/view/57
spellingShingle Jabbar Mahmood
Rahim Ali Qamar
Shahzad Latif
Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques
NUML International Journal of Engineering and Computing
title Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques
title_full Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques
title_fullStr Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques
title_full_unstemmed Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques
title_short Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques
title_sort detection of emulation attacks in cognitive radio networks using heuristic techniques
url https://nijec.numl.edu.pk/index.php/nijec/article/view/57
work_keys_str_mv AT jabbarmahmood detectionofemulationattacksincognitiveradionetworksusingheuristictechniques
AT rahimaliqamar detectionofemulationattacksincognitiveradionetworksusingheuristictechniques
AT shahzadlatif detectionofemulationattacksincognitiveradionetworksusingheuristictechniques