Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques
This paper discusses the issue of primary user emulation attacks (PUEAs) in cognitive radio networks (CRNs). These attackers imitate the signal characteristics of primary users (PUs), preventing secondary users (SUs) from accessing their assigned spectrum. The research focuses on detecting PUEAs us...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
National University of Modern Languages (NUML), Islamabad
2024-02-01
|
| Series: | NUML International Journal of Engineering and Computing |
| Online Access: | https://nijec.numl.edu.pk/index.php/nijec/article/view/57 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850165415374749696 |
|---|---|
| author | Jabbar Mahmood Rahim Ali Qamar Shahzad Latif |
| author_facet | Jabbar Mahmood Rahim Ali Qamar Shahzad Latif |
| author_sort | Jabbar Mahmood |
| collection | DOAJ |
| description |
This paper discusses the issue of primary user emulation attacks (PUEAs) in cognitive radio networks (CRNs). These attackers imitate the signal characteristics of primary users (PUs), preventing secondary users (SUs) from accessing their assigned spectrum. The research focuses on detecting PUEAs using the time difference of arrivals (TDOA) to detect the attacker and reduce detection errors using heuristic techniques. Differential evolution (DE) and cuckoo search (CS) algorithms are utilized to optimize detection accuracy. Simulation results confirm that the proposed CS algorithm outperforms and gives better performance as compared to the DE algorithm.
|
| format | Article |
| id | doaj-art-d447ddf339b445608a761584e7707491 |
| institution | OA Journals |
| issn | 2788-9629 2791-3465 |
| language | English |
| publishDate | 2024-02-01 |
| publisher | National University of Modern Languages (NUML), Islamabad |
| record_format | Article |
| series | NUML International Journal of Engineering and Computing |
| spelling | doaj-art-d447ddf339b445608a761584e77074912025-08-20T02:21:46ZengNational University of Modern Languages (NUML), IslamabadNUML International Journal of Engineering and Computing2788-96292791-34652024-02-012210.52015/nijec.v2i2.57Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic TechniquesJabbar Mahmood0Rahim Ali Qamar1Shahzad Latif 2School of Engineering and Applied Sciences (SEAS), Isra University, IslamabadSchool of Engineering and Applied Sciences (SEAS), Isra University, IslamabadDepartment of Computer Science, Szabist, Islamabad This paper discusses the issue of primary user emulation attacks (PUEAs) in cognitive radio networks (CRNs). These attackers imitate the signal characteristics of primary users (PUs), preventing secondary users (SUs) from accessing their assigned spectrum. The research focuses on detecting PUEAs using the time difference of arrivals (TDOA) to detect the attacker and reduce detection errors using heuristic techniques. Differential evolution (DE) and cuckoo search (CS) algorithms are utilized to optimize detection accuracy. Simulation results confirm that the proposed CS algorithm outperforms and gives better performance as compared to the DE algorithm. https://nijec.numl.edu.pk/index.php/nijec/article/view/57 |
| spellingShingle | Jabbar Mahmood Rahim Ali Qamar Shahzad Latif Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques NUML International Journal of Engineering and Computing |
| title | Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques |
| title_full | Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques |
| title_fullStr | Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques |
| title_full_unstemmed | Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques |
| title_short | Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques |
| title_sort | detection of emulation attacks in cognitive radio networks using heuristic techniques |
| url | https://nijec.numl.edu.pk/index.php/nijec/article/view/57 |
| work_keys_str_mv | AT jabbarmahmood detectionofemulationattacksincognitiveradionetworksusingheuristictechniques AT rahimaliqamar detectionofemulationattacksincognitiveradionetworksusingheuristictechniques AT shahzadlatif detectionofemulationattacksincognitiveradionetworksusingheuristictechniques |