CLC number: TN918.91
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2017-10-10
Cited: 0
Clicked: 8378
Qiao-mu Jiang, Hui-fang Chen, Lei Xie, Kuang Wang. On detecting primary user emulation attack using channel impulse response in the cognitive radio network[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.1700203 @article{title="On detecting primary user emulation attack using channel impulse response in the cognitive radio network", %0 Journal Article TY - JOUR
认知无线电网络中利用信道冲击响应的主用户仿真攻击检测技术关键词组: Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article
Reference[1]Chen, R.L., Park, J.M., 2006. Ensuring trustworthy spectrum sensing in cognitive radio networks. Proc. 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, p.110-119. ![]() [2]Chen, R.L., Park, J.M., Reed, J.H., 2008. Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun., 26(1):25-37. ![]() [3]Chin, W.L., Le, T.N., Tseng, C.L., et al., 2014. Cooperative detection of primary user emulation attacks based on channel-tap power in mobile cognitive radio networks. Int. J. Ad Hoc Ubiq. Comput., 15(4):263-274. ![]() [4]Fang, S.H., Chen, J.Y., Shieh, M.D., et al., 2013. Subspace-based blind channel estimation by separating real and imaginary symbols for cyclic-prefixed single-carrier systems. IEEE Trans. Broadcast., 59(4):698-704. ![]() [5]Haykin, S., 2005. Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun., 23(2): 201-220. ![]() [6]Jin, F., Varadharajan, V., Tupakula, U., 2015. Improved detection of primary user emulation attacks in cognitive radio networks. Proc. Int. Telecommunication Networks and Applications Conf., p.274-279. ![]() [7]Jin, Z., Anand, S., Subbalakshmi, K.P., 2009. Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing. ACM SIGMOBILE Mob. Comput. Commun. Rev., 13(2):74-85. ![]() [8]Kay, S.M., 1993. Fundamentals of Statistical Signal Processing: Estimation Theory. Prentice-Hall, New Jersey, p.27-82. ![]() [9]Kim, J.G., Oh, J.H., Lim, J.T., 2012. Subspace-based channel estimation for MIMO-OFDM systems with few received blocks. IEEE Signal Process. Lett., 19(7):435-438. ![]() [10]Lalos, A.S., Rontogiannis, A.A., Berberidis, K., 2010. Frequency domain channel estimation for cooperative communication networks. IEEE Trans. Signal Process., 58(6):3400-3405. ![]() [11]Le, T.N., Chin, W.L., Kao, W.C., 2015. Cross-layer design for primary user emulation attacks detection in mobile cognitive radio networks. IEEE Commun. Lett., 19(5):799-802. ![]() [12]Le, T.N., Chin, W.L., Lin, Y.H., 2016. Non-cooperative and cooperative PUEA detection using physical layer in mobile OFDM-based cognitive radio networks. Proc. Int. Conf. on Computing, Networking and Communications, p.1-5. ![]() [13]Liu, M., Crussiere, M., Helard, J.F., 2012. A novel data-aided channel estimation with reduced complexity for TDS-OFDM systems. IEEE Trans. Broadcast., 58(2):247-260. ![]() [14]Muquet, B., de Courville, M., Duhamel, P., 2002. Subspace-based blind and semi-blind channel estimation for OFDM systems. IEEE Trans. Signal Process., 50(7): 1699-1712. ![]() [15]National Standard of the People’s Republic of China, 2007. Framing Structure, Channel Coding and Modulation for Digital Television Terrestrial Broadcasting System. GB 206000-2006 (in Chinese). ![]() [16]Nguyen, N.T., Zheng, R., Han, Z., 2012. On identifying primary user emulation attacks in cognitive radio systems using nonparametric Bayesian classification. IEEE Trans. Signal Process., 60(3):1432-1445. ![]() [17]Pu, D., Wyglinski, A.M., 2014. Primary-user emulation detection using database-assisted frequency-domain action recognition. IEEE Trans. Veh. Technol., 63(9):4372-4382. ![]() [18]Rao, C.R., 1973. Linear Statistical Inference and Its Applications. John Wiley & Sons, New York, p.516-604. ![]() [19]Su, B., Vaidyanathan, P.P., 2007. Subspace-based blind channel identification for cyclic prefix systems using few received blocks. IEEE Trans. Signal Process., 55(10): 4979-4993. ![]() [20]Tomasoni, A., Gatti, D., Bellini, S., et al., 2013. Efficient OFDM channel estimation via an information criterion. IEEE Trans. Wirel. Commun., 12(3):1352-1362. ![]() [21]Tugnait, J.K., Kim, H., 2010. A channel-based hypothesis testing approach to enhance user authentication in wireless networks. Proc. 2nd Int. Conf. on Communication Systems and Networks, p.1-9. ![]() [22]Wooding, R.A., 1956. The multivariate distribution of complex normal variables. Biometrika, 43(1-2):212-215. ![]() [23]Xin, C.S., Song, M., 2014. Detection of PUE attacks in cognitive radio networks based on signal activity pattern. IEEE Trans. Mob. Comput., 13(5):1022-1034. ![]() [24]Zhou, W., Lam, W.H., 2010. Channel estimation and data detection for OFDM systems over fast-fading and dispersive channels. IEEE Trans. Veh. Technol., 59(3): 1381-1392. ![]() Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou
310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE |
Open peer comments: Debate/Discuss/Question/Opinion
<1>