Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems-Part II: Unknown Channel Statistics

The defense against the Primary User Emulation Attack (PUE) is studied in the scenario of unknown channel statistics (coined blind dogfight in spectrum). The algorithm of the adversarial bandit problem is adapted to the context of blind dogfight. Both cases of complete and partial information about...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on wireless communications Vol. 10; no. 1; pp. 274 - 283
Main Authors Li, Husheng, Han, Zhu
Format Journal Article
LanguageEnglish
Published New York, NY IEEE 01.01.2011
Institute of Electrical and Electronics Engineers
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The defense against the Primary User Emulation Attack (PUE) is studied in the scenario of unknown channel statistics (coined blind dogfight in spectrum). The algorithm of the adversarial bandit problem is adapted to the context of blind dogfight. Both cases of complete and partial information about the rewards of different channels are analyzed. Performance bounds are obtained subject to arbitrary channel statistics and attack policy. Several attack strategies, namely uniformly random, selectively random and maximal interception attacks, are discussed. The validity of the defense strategy is then demonstrated by numerical simulation results.
AbstractList The defense against the Primary User Emulation Attack (PUE) is studied in the scenario of unknown channel statistics (coined blind dogfight in spectrum). The algorithm of the adversarial bandit problem is adapted to the context of blind dogfight. Both cases of complete and partial information about the rewards of different channels are analyzed. Performance bounds are obtained subject to arbitrary channel statistics and attack policy. Several attack strategies, namely uniformly random, selectively random and maximal interception attacks, are discussed. The validity of the defense strategy is then demonstrated by numerical simulation results.
Author Husheng Li
Zhu Han
Author_xml – sequence: 1
  givenname: Husheng
  surname: Li
  fullname: Li, Husheng
– sequence: 2
  givenname: Zhu
  surname: Han
  fullname: Han, Zhu
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=23763853$$DView record in Pascal Francis
BookMark eNqFkLFOwzAURT0UiVL4AiTkhTFgx7GTIhYUClSqREVbMVovjlMMiVPZLoiBfyclwMDC9OSne671zgEa2NZqhE4oOaOUjM-Xj_lZTL5eMdsNQgQjAzSknImIxqnYRwfePxNCU8H5EH1ct-vKrJ8CNhYvNloFt20ucN42BQRj13juTAPuHa-8dnjSbOtu3Vp8FQKoF7-j8nZtTTCvGj9AaVq8ePdBNz6agwt4Or3AK_ti27cu-ATW6hovQtfhg1H-EO1VUHt99D1HaHUzWeZ30ez-dppfzSLFCA_ROAYBKeeq0kCSWBRjCizjRVVATBUvyjJhUGaqAD4uhVK6TLIq6baZFrEoKzZCp33vBryCunJglfFy098mY5aKro91ucs-p1zrvdOVVCZ8HRwcmFpSIneaZadZ7jTLXrPsNXe4-IP__PAveNyDRmv9C3GRZGmask8o_5CH
CODEN ITWCAX
CitedBy_id crossref_primary_10_1109_TCOMM_2020_3005708
crossref_primary_10_1109_JIOT_2021_3059880
crossref_primary_10_4018_IJWNBT_2017070101
crossref_primary_10_1049_cmu2_12131
crossref_primary_10_32604_iasc_2023_026832
crossref_primary_10_1109_TCOMM_2016_2535257
crossref_primary_10_1109_ACCESS_2023_3304244
crossref_primary_10_1109_TWC_2013_071913121570
crossref_primary_10_1016_j_compeleceng_2020_106849
crossref_primary_10_32604_csse_2022_021433
crossref_primary_10_1049_iet_com_2013_0568
crossref_primary_10_1109_JIOT_2022_3170382
crossref_primary_10_1002_wcm_2443
crossref_primary_10_1109_COMST_2017_2718618
crossref_primary_10_1109_TCOMM_2012_071812_100729
crossref_primary_10_1109_TVT_2017_2722409
crossref_primary_10_32604_iasc_2022_024839
crossref_primary_10_1109_TCOMM_2014_2331964
crossref_primary_10_1109_TWC_2022_3185222
crossref_primary_10_1109_TWC_2021_3091588
crossref_primary_10_1109_JSAC_2012_121102
crossref_primary_10_1109_TIFS_2017_2774770
crossref_primary_10_1109_JPROC_2012_2208211
crossref_primary_10_1186_1687_1499_2012_28
crossref_primary_10_1186_s13638_017_0857_8
crossref_primary_10_18510_ijsrtm_2015_362
crossref_primary_10_1109_TIFS_2019_2901821
crossref_primary_10_1109_TWC_2012_120312_111706
crossref_primary_10_1109_COMST_2018_2794358
crossref_primary_10_1016_j_phycom_2020_101001
crossref_primary_10_1109_TVT_2015_2511071
crossref_primary_10_1109_TMC_2013_121
crossref_primary_10_1109_TVT_2014_2316831
crossref_primary_10_1007_s11276_020_02519_5
crossref_primary_10_1109_MWC_2013_6549292
crossref_primary_10_1142_S0218126616500973
crossref_primary_10_1049_iet_com_2019_0637
crossref_primary_10_1109_COMST_2017_2661861
crossref_primary_10_1109_JIOT_2021_3066384
crossref_primary_10_1109_TCCN_2015_2488620
crossref_primary_10_1109_TNET_2018_2868166
crossref_primary_10_1109_JSAC_2012_120102
Cites_doi 10.1109/JSAC.2008.080104
10.1109/TWC.2010.091510.100629
10.1109/DYSPAN.2008.16
10.1137/S0097539701398375
10.4108/ICST.WICON2008.4976
10.1155/2010/876216
10.1109/INFOCOM.2008.251
10.1109/ICSMC.2009.5346172
10.1109/ACSSC.2008.5074370
10.1109/ICC.2009.5198911
10.1109/TNN.1998.712192
10.1109/SFCS.1995.492488
ContentType Journal Article
Copyright 2015 INIST-CNRS
Copyright_xml – notice: 2015 INIST-CNRS
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
DOI 10.1109/TWC.2010.112310.100630
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Pascal-Francis
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Applied Sciences
EndPage 283
ExternalDocumentID 23763853
10_1109_TWC_2010_112310_100630
5648777
Genre orig-research
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IES
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
AAYXX
CITATION
RIG
IQODW
ID FETCH-LOGICAL-c305t-92a6a755cfea0426b91a385bfba21c5bdd43ad8cba59d6cced48f4dd48e626df3
IEDL.DBID RIE
ISSN 1536-1276
IngestDate Mon Jul 21 09:15:36 EDT 2025
Tue Jul 01 01:38:17 EDT 2025
Thu Apr 24 22:51:57 EDT 2025
Wed Aug 27 02:52:42 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Performance evaluation
Numerical simulation
primary user emulation attack
Interception
adversarial bandit algorithm
Cognitive radio
Algorithm
Cognitive system
Software radio
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c305t-92a6a755cfea0426b91a385bfba21c5bdd43ad8cba59d6cced48f4dd48e626df3
PageCount 10
ParticipantIDs crossref_citationtrail_10_1109_TWC_2010_112310_100630
crossref_primary_10_1109_TWC_2010_112310_100630
pascalfrancis_primary_23763853
ieee_primary_5648777
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2011-January
2011-01-00
2011
PublicationDateYYYYMMDD 2011-01-01
PublicationDate_xml – month: 01
  year: 2011
  text: 2011-January
PublicationDecade 2010
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
PublicationTitle IEEE transactions on wireless communications
PublicationTitleAbbrev TWC
PublicationYear 2011
Publisher IEEE
Institute of Electrical and Electronics Engineers
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
References ref13
ref12
freund (ref7) 1995
ref15
ref14
jin (ref8) 0
ref11
ref2
ref1
ref9
ref4
ref3
ref6
ref5
kushner (ref10) 2003
References_xml – ident: ref6
  doi: 10.1109/JSAC.2008.080104
– ident: ref14
  doi: 10.1109/TWC.2010.091510.100629
– year: 0
  ident: ref8
  article-title: Mitigting primary user emulation attacks in dynamic spectrum access networks using hypothesis testing
  publication-title: ACM Mobile Computing and Commun Rev
– ident: ref1
  doi: 10.1109/DYSPAN.2008.16
– year: 2003
  ident: ref10
  article-title: Stochastic Approximation and Recursive Algorithms and Applications
– ident: ref3
  doi: 10.1137/S0097539701398375
– ident: ref4
  doi: 10.4108/ICST.WICON2008.4976
– ident: ref13
  doi: 10.1155/2010/876216
– ident: ref5
  doi: 10.1109/INFOCOM.2008.251
– ident: ref12
  doi: 10.1109/ICSMC.2009.5346172
– ident: ref11
  doi: 10.1109/ACSSC.2008.5074370
– ident: ref9
  doi: 10.1109/ICC.2009.5198911
– ident: ref15
  doi: 10.1109/TNN.1998.712192
– year: 1995
  ident: ref7
  article-title: A decision-theoretic generalization of online learning and an application to boosting
  publication-title: Proc Second European Conference on Computational Learning Theory EuroCOLT
– ident: ref2
  doi: 10.1109/SFCS.1995.492488
SSID ssj0017655
Score 2.287068
Snippet The defense against the Primary User Emulation Attack (PUE) is studied in the scenario of unknown channel statistics (coined blind dogfight in spectrum). The...
SourceID pascalfrancis
crossref
ieee
SourceType Index Database
Enrichment Source
Publisher
StartPage 274
SubjectTerms adversarial bandit algorithm
Applied sciences
Availability
Cognitive radio
Data communication
Emulation
Exact sciences and technology
Jamming
Numerical simulation
primary user emulation attack
Radiocommunication specific techniques
Radiocommunications
Sensors
Telecommunications
Telecommunications and information theory
Title Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems-Part II: Unknown Channel Statistics
URI https://ieeexplore.ieee.org/document/5648777
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9tAEB4Bp3IotFA1vLSHHuvEzu76kVsUQFCJClVE5Wbts40AB4FzQeK_M-N1rFBVAskHy96xvDvj8czsNzMA32LpHE9SH9mcQjeoASOtch_FWmfcJiIxnLKRL36mZ1Px41per8H3LhfGOdeAz1yfTpu9fDs3CwqVDWQqqHzdOqyj4xZytbodgyxtOpziB0x9ZbK0zQZO4mJw9XsSMFxoW_AADEgJ9bzyI2o6qxAuUj3i0vjQ02LlR3O6BRfLVwz4kpv-otZ98_RP9cb3zmEbPrYWJxsHEfkEa676DJsrdQh34Pl4_seTl85mFaOO9PXD4m7EUFdoRbBodhlqUrApCiw7uWtbfrFxXVOKPlFNljAk9kvZ2Zy1ldCjSxRNdn4-YtOKwnc48K8iaA0jKzcUid6F6enJ1eQsavsyRAa1Qx0VQ5WqTErjnSIXTBeJ4rnUXqthYqS2VnBlc6OVLGxqjLMi9wKv5g7dJ-v5F9io5pX7CizJEs1jK4bax8LxXPkMtQQvDD2KC90DuWRSadqi5dQ747ZsnJe4KJG5JTG3DMwtA3N7MOjo7sMSvUmxQ8zqRrd86sHRK5no7hOaCCfN9_5Ptw8fQvSZjgPYQL65QzRfan3UyO0Lqi_rzw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9NAEB6VcgAO5VEQKVD2wBEn3uyuH71VoVUCTVWhRPRm7RMqqIPAuVTqf2fG61gBIYHkg2V7LO_OeHZm9psZgDep8l7wLCSuoNANasDE6CIkqTG5cFxyKygbeX6eTZfy_aW63IG3fS6M974Fn_khnbZ7-W5l1xQqG6lMUvm6O3AX133FY7ZWv2eQZ22PU_yFqbNMnnX5wDwtR4tPk4jiQutCRGhARrjnraWo7a1CyEj9EycnxK4WW0vN6UOYbz4yIky-DteNGdqbP-o3_u8oHsFeZ3Oy4ygkj2HH10_gwVYlwn24fbf6HMhPZ1c1o570zY_19RFDbWE0AaPZRaxKwZYosuzkumv6xY6bhpL0iWqyASKxj9pdrVhXCz25QOFks9kRW9YUwMMHv2gC1zCyc2OZ6KewPD1ZTKZJ15khsagfmqQc60znStngNTlhpuRaFMoEo8fcKuOcFNoV1mhVusxa72QRJF4tPDpQLohnsFuvav8cGM-5EamTYxNS6UWhQ456QpSWXiWkGYDaMKmyXdly6p7xrWrdl7SskLkVMbeKzK0icwcw6um-xyn6J8U-Mat_uuPTAA5_k4n-PuGJcNDi4O90r-HedDE_q85m5x9ewP0Yi6bjJewiD_0rNGYac9jK8C8cqO8Y
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Dogfight+in+Spectrum%3A+Combating+Primary+User+Emulation+Attacks+in+Cognitive+Radio+Systems-Part+II%3A+Unknown+Channel+Statistics&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=HUSHENG+LI&rft.au=ZHU+HAN&rft.date=2011&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=1536-1276&rft.volume=10&rft.issue=1&rft.spage=274&rft.epage=283&rft_id=info:doi/10.1109%2FTWC.2010.112310.100630&rft.externalDBID=n%2Fa&rft.externalDocID=23763853
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon