• Monisha Ravi
  • Nisha Ravi
  • N. Ravi
Keywords: primary user emulation, primary user, sensing technique, network simulator, effective spectrum usage, secondary users, malicious users


Recently, the expansive growth of wireless services, regulated by governmental agencies assigning spectrum to licensed users, has led to a shortage of radio spectrum. Since the FCC (Federal Communications Commissions) approved unlicensed users to access the unused channels of the reserved spectrum, new research areas seeped in, to develop Cognitive Radio Networks (CRN), in order to improve spectrum efficiency and to exploit this feature by enabling secondary users to gain from the spectrum in an opportunistic manner via optimally distributed traffic demands over the spectrum, so as to reduce the risk for monetary loss, from the unused channels. However, Cognitive Radio Networks become vulnerable to various classes of threats that decrease the bandwidth and spectrum usage efficiency. Hence, this survey deals with defining and demonstrating framework of one such attack called the Primary User Emulation Attack and suggests preventive Sensing Protocols to counteract the same. It presents a scenario of the attack and its prevention using Network Simulator-2 for the attack performances and gives an outlook on the various techniques defined to curb the anomaly.


1. Jaydip Sen, “Security and Privacy Challenges in Cognitive Wireless Sensor Networks”, Book Chapter in Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks, Natarajan Meghanathan and Y. B. Reddy (Eds.), IGI-Global, USA, July 2013.
2. Husheng Li and Zhu Han,“ Dogfight in Spectrum: Combating Primary User Emulation Attacks in CognitiveRadio Systems–Part II: Unknown Channel Statistics”, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 1, January 2011.
3. Sandip Dash, “Cognitive Wireless Sensor Network: Security and Privacy Challenges”, NIST thesis, 2013.
4. Gyanendra Prasad Joshi, Seung Yeob Nam and Sung Won Kim, “Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends”, Sensors 2013, 13, 11196-11228, 2013.
5. Swathi Chandrashekar and Loukas Lazos, “A Primary User Authentication System for Mobile Cognitive Radio Networks”, Applied Sciences in Biomedical and Communication Technologies (ISABEL), 2010 3rd International Symposium, IEEE, 2010.
6. Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li, “Mitigating Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard”, GLOBECOM2013- Signals Processing for Communications Symposium, IEEE, 2013.
7. Rong Yu, Yan Zhang, Yi Liu, Stein Gjessing, Mohsen Guizani, “Securing Cognitive Radio Networks against Primary User Emulation Attacks”, arXiv:1308.6216 cs.ET, 2013.
8. Olga León, Juan Hernández-Serrano, Miguel Soriano, “Robust Detection of Primary User Emulation Attacks in IEEE 802.22 Networks”, CogART '11 Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management, ISBN: 978-1-4503-0912-7, Article No. 51, 2011.
9. T. Charles Clancy, Nathan Goergen, “Security in Cognitive Radio Networks: Threats and Mitigation”, Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008. 3rd International Conference, 2008.
10. Pu, Di, “Primary User Emulation Detection in Cognitive Radio Networks”, Diss. Worcester Polytechnic Institute, 2013.
11. Natraj Jaganmohan, Sandeep A Rao, “Mitigation of Primary User Emulation Attack using Time of Emission Estimation”, Advanced Network Security, NCSU Presentation.
12. A.C.SUMATHI, Dr.R.VIDHYAPRIYA, “Intense Explore Algorithm – A Proactive way to eliminate PUE attacks in Cognitive Radio Networks”, WSEAS Conference 2015, Advances in Information Science and Computer Engineering, ISBN: 978-1-61804-276-7,2015.
13. Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato, and Mostafa M. Fouda, “Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks,” IEEE Network Magazine, vol. 27, no. 3, pp. 51-56, May-June 2013.
How to Cite
Ravi, M., Ravi, N. and Ravi, N. (2015) “A SURVEY OF IMPLEMENTATION OF OPPORTUNISTIC SPECTRUM ACCESS ATTACK WITH ITS PREVENTIVE SENSING PROTOCOLS IN COGNITIVE RADIO NETWORKS”, International Journal of Students’ Research in Technology & Management, 3(6), pp. 389-395. doi: https://doi.org/10.18510/ijsrtm.2015.362.
IT & Computer Engineering