Inicio  /  Future Internet  /  Vol: 15 Par: 6 (2023)  /  Artículo
ARTÍCULO
TITULO

PUE Attack Detection by Using DNN and Entropy in Cooperative Mobile Cognitive Radio Networks

Ernesto Cadena Muñoz    
Gustavo Chica Pedraza    
Rafael Cubillos-Sánchez    
Alexander Aponte-Moreno and Mónica Espinosa Buitrago    

Resumen

The primary user emulation (PUE) attack is one of the strongest attacks in mobile cognitive radio networks (MCRN) because the primary users (PU) and secondary users (SU) are unable to communicate if a malicious user (MU) is present. In the literature, some techniques are used to detect the attack. However, those techniques do not explore the cooperative detection of PUE attacks using deep neural networks (DNN) in one MCRN network and with experimental results on software-defined radio (SDR). In this paper, we design and implement a PUE attack in an MCRN, including a countermeasure based on the entropy of the signals, DNN, and cooperative spectrum sensing (CSS) to detect the attacks. A blacklist is included in the fusion center (FC) to record the data of the MU. The scenarios are simulated and implemented on the SDR testbed. Results show that this solution increases the probability of detection (PD) by 20% for lower signal noise ratio (SNR) values, allowing the detection of the PUE attack and recording the data for future reference by the attacker, sharing the data for all the SU.

 Artículos similares

       
 
Mazen Gazzan and Frederick T. Sheldon    
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomware ... ver más
Revista: Future Internet

 
Kongpei Wu, Huiqin Qu and Conggui Huang    
For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correlation... ver más
Revista: Future Internet

 
Jiaqi Zhao, Ming Xu, Yunzhi Chen and Guoliang Xu    
Nowdays, DNNs (Deep Neural Networks) are widely used in the field of DDoS attack detection. However, designing a good DNN architecture relies on the designer?s experience and requires considerable work. In this paper, a GA (genetic algorithm) is used to ... ver más
Revista: Future Internet

 
Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil and Zeeshan Najam    
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attac... ver más
Revista: Future Internet

 
Giacomo Gori, Lorenzo Rinieri, Amir Al Sadi, Andrea Melis, Franco Callegati and Marco Prandini    
The correct and efficient measurement of security properties is key to the deployment of effective cyberspace protection strategies. In this work, we propose GRAPH4, which is a system that combines different security metrics to design an attack detection... ver más
Revista: Future Internet