Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems-Part II: Unknown Channel Statistics
The defense against the Primary User Emulation Attack (PUE) is studied in the scenario of unknown channel statistics (coined blind dogfight in spectrum). The algorithm of the adversarial bandit problem is adapted to the context of blind dogfight. Both cases of complete and partial information about...
Saved in:
Published in | IEEE transactions on wireless communications Vol. 10; no. 1; pp. 274 - 283 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York, NY
IEEE
01.01.2011
Institute of Electrical and Electronics Engineers |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The defense against the Primary User Emulation Attack (PUE) is studied in the scenario of unknown channel statistics (coined blind dogfight in spectrum). The algorithm of the adversarial bandit problem is adapted to the context of blind dogfight. Both cases of complete and partial information about the rewards of different channels are analyzed. Performance bounds are obtained subject to arbitrary channel statistics and attack policy. Several attack strategies, namely uniformly random, selectively random and maximal interception attacks, are discussed. The validity of the defense strategy is then demonstrated by numerical simulation results. |
---|---|
AbstractList | The defense against the Primary User Emulation Attack (PUE) is studied in the scenario of unknown channel statistics (coined blind dogfight in spectrum). The algorithm of the adversarial bandit problem is adapted to the context of blind dogfight. Both cases of complete and partial information about the rewards of different channels are analyzed. Performance bounds are obtained subject to arbitrary channel statistics and attack policy. Several attack strategies, namely uniformly random, selectively random and maximal interception attacks, are discussed. The validity of the defense strategy is then demonstrated by numerical simulation results. |
Author | Husheng Li Zhu Han |
Author_xml | – sequence: 1 givenname: Husheng surname: Li fullname: Li, Husheng – sequence: 2 givenname: Zhu surname: Han fullname: Han, Zhu |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=23763853$$DView record in Pascal Francis |
BookMark | eNqFkLFOwzAURT0UiVL4AiTkhTFgx7GTIhYUClSqREVbMVovjlMMiVPZLoiBfyclwMDC9OSne671zgEa2NZqhE4oOaOUjM-Xj_lZTL5eMdsNQgQjAzSknImIxqnYRwfePxNCU8H5EH1ct-vKrJ8CNhYvNloFt20ucN42BQRj13juTAPuHa-8dnjSbOtu3Vp8FQKoF7-j8nZtTTCvGj9AaVq8ePdBNz6agwt4Or3AK_ti27cu-ATW6hovQtfhg1H-EO1VUHt99D1HaHUzWeZ30ez-dppfzSLFCA_ROAYBKeeq0kCSWBRjCizjRVVATBUvyjJhUGaqAD4uhVK6TLIq6baZFrEoKzZCp33vBryCunJglfFy098mY5aKro91ucs-p1zrvdOVVCZ8HRwcmFpSIneaZadZ7jTLXrPsNXe4-IP__PAveNyDRmv9C3GRZGmask8o_5CH |
CODEN | ITWCAX |
CitedBy_id | crossref_primary_10_1109_TCOMM_2020_3005708 crossref_primary_10_1109_JIOT_2021_3059880 crossref_primary_10_4018_IJWNBT_2017070101 crossref_primary_10_1049_cmu2_12131 crossref_primary_10_32604_iasc_2023_026832 crossref_primary_10_1109_TCOMM_2016_2535257 crossref_primary_10_1109_ACCESS_2023_3304244 crossref_primary_10_1109_TWC_2013_071913121570 crossref_primary_10_1016_j_compeleceng_2020_106849 crossref_primary_10_32604_csse_2022_021433 crossref_primary_10_1049_iet_com_2013_0568 crossref_primary_10_1109_JIOT_2022_3170382 crossref_primary_10_1002_wcm_2443 crossref_primary_10_1109_COMST_2017_2718618 crossref_primary_10_1109_TCOMM_2012_071812_100729 crossref_primary_10_1109_TVT_2017_2722409 crossref_primary_10_32604_iasc_2022_024839 crossref_primary_10_1109_TCOMM_2014_2331964 crossref_primary_10_1109_TWC_2022_3185222 crossref_primary_10_1109_TWC_2021_3091588 crossref_primary_10_1109_JSAC_2012_121102 crossref_primary_10_1109_TIFS_2017_2774770 crossref_primary_10_1109_JPROC_2012_2208211 crossref_primary_10_1186_1687_1499_2012_28 crossref_primary_10_1186_s13638_017_0857_8 crossref_primary_10_18510_ijsrtm_2015_362 crossref_primary_10_1109_TIFS_2019_2901821 crossref_primary_10_1109_TWC_2012_120312_111706 crossref_primary_10_1109_COMST_2018_2794358 crossref_primary_10_1016_j_phycom_2020_101001 crossref_primary_10_1109_TVT_2015_2511071 crossref_primary_10_1109_TMC_2013_121 crossref_primary_10_1109_TVT_2014_2316831 crossref_primary_10_1007_s11276_020_02519_5 crossref_primary_10_1109_MWC_2013_6549292 crossref_primary_10_1142_S0218126616500973 crossref_primary_10_1049_iet_com_2019_0637 crossref_primary_10_1109_COMST_2017_2661861 crossref_primary_10_1109_JIOT_2021_3066384 crossref_primary_10_1109_TCCN_2015_2488620 crossref_primary_10_1109_TNET_2018_2868166 crossref_primary_10_1109_JSAC_2012_120102 |
Cites_doi | 10.1109/JSAC.2008.080104 10.1109/TWC.2010.091510.100629 10.1109/DYSPAN.2008.16 10.1137/S0097539701398375 10.4108/ICST.WICON2008.4976 10.1155/2010/876216 10.1109/INFOCOM.2008.251 10.1109/ICSMC.2009.5346172 10.1109/ACSSC.2008.5074370 10.1109/ICC.2009.5198911 10.1109/TNN.1998.712192 10.1109/SFCS.1995.492488 |
ContentType | Journal Article |
Copyright | 2015 INIST-CNRS |
Copyright_xml | – notice: 2015 INIST-CNRS |
DBID | 97E RIA RIE AAYXX CITATION IQODW |
DOI | 10.1109/TWC.2010.112310.100630 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Pascal-Francis |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Applied Sciences |
EndPage | 283 |
ExternalDocumentID | 23763853 10_1109_TWC_2010_112310_100630 5648777 |
Genre | orig-research |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS AAYXX CITATION RIG IQODW |
ID | FETCH-LOGICAL-c305t-92a6a755cfea0426b91a385bfba21c5bdd43ad8cba59d6cced48f4dd48e626df3 |
IEDL.DBID | RIE |
ISSN | 1536-1276 |
IngestDate | Mon Jul 21 09:15:36 EDT 2025 Tue Jul 01 01:38:17 EDT 2025 Thu Apr 24 22:51:57 EDT 2025 Wed Aug 27 02:52:42 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Performance evaluation Numerical simulation primary user emulation attack Interception adversarial bandit algorithm Cognitive radio Algorithm Cognitive system Software radio |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html CC BY 4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c305t-92a6a755cfea0426b91a385bfba21c5bdd43ad8cba59d6cced48f4dd48e626df3 |
PageCount | 10 |
ParticipantIDs | crossref_citationtrail_10_1109_TWC_2010_112310_100630 crossref_primary_10_1109_TWC_2010_112310_100630 pascalfrancis_primary_23763853 ieee_primary_5648777 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2011-January 2011-01-00 2011 |
PublicationDateYYYYMMDD | 2011-01-01 |
PublicationDate_xml | – month: 01 year: 2011 text: 2011-January |
PublicationDecade | 2010 |
PublicationPlace | New York, NY |
PublicationPlace_xml | – name: New York, NY |
PublicationTitle | IEEE transactions on wireless communications |
PublicationTitleAbbrev | TWC |
PublicationYear | 2011 |
Publisher | IEEE Institute of Electrical and Electronics Engineers |
Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers |
References | ref13 ref12 freund (ref7) 1995 ref15 ref14 jin (ref8) 0 ref11 ref2 ref1 ref9 ref4 ref3 ref6 ref5 kushner (ref10) 2003 |
References_xml | – ident: ref6 doi: 10.1109/JSAC.2008.080104 – ident: ref14 doi: 10.1109/TWC.2010.091510.100629 – year: 0 ident: ref8 article-title: Mitigting primary user emulation attacks in dynamic spectrum access networks using hypothesis testing publication-title: ACM Mobile Computing and Commun Rev – ident: ref1 doi: 10.1109/DYSPAN.2008.16 – year: 2003 ident: ref10 article-title: Stochastic Approximation and Recursive Algorithms and Applications – ident: ref3 doi: 10.1137/S0097539701398375 – ident: ref4 doi: 10.4108/ICST.WICON2008.4976 – ident: ref13 doi: 10.1155/2010/876216 – ident: ref5 doi: 10.1109/INFOCOM.2008.251 – ident: ref12 doi: 10.1109/ICSMC.2009.5346172 – ident: ref11 doi: 10.1109/ACSSC.2008.5074370 – ident: ref9 doi: 10.1109/ICC.2009.5198911 – ident: ref15 doi: 10.1109/TNN.1998.712192 – year: 1995 ident: ref7 article-title: A decision-theoretic generalization of online learning and an application to boosting publication-title: Proc Second European Conference on Computational Learning Theory EuroCOLT – ident: ref2 doi: 10.1109/SFCS.1995.492488 |
SSID | ssj0017655 |
Score | 2.287068 |
Snippet | The defense against the Primary User Emulation Attack (PUE) is studied in the scenario of unknown channel statistics (coined blind dogfight in spectrum). The... |
SourceID | pascalfrancis crossref ieee |
SourceType | Index Database Enrichment Source Publisher |
StartPage | 274 |
SubjectTerms | adversarial bandit algorithm Applied sciences Availability Cognitive radio Data communication Emulation Exact sciences and technology Jamming Numerical simulation primary user emulation attack Radiocommunication specific techniques Radiocommunications Sensors Telecommunications Telecommunications and information theory |
Title | Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems-Part II: Unknown Channel Statistics |
URI | https://ieeexplore.ieee.org/document/5648777 |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9tAEB4Bp3IotFA1vLSHHuvEzu76kVsUQFCJClVE5Wbts40AB4FzQeK_M-N1rFBVAskHy96xvDvj8czsNzMA32LpHE9SH9mcQjeoASOtch_FWmfcJiIxnLKRL36mZ1Px41per8H3LhfGOdeAz1yfTpu9fDs3CwqVDWQqqHzdOqyj4xZytbodgyxtOpziB0x9ZbK0zQZO4mJw9XsSMFxoW_AADEgJ9bzyI2o6qxAuUj3i0vjQ02LlR3O6BRfLVwz4kpv-otZ98_RP9cb3zmEbPrYWJxsHEfkEa676DJsrdQh34Pl4_seTl85mFaOO9PXD4m7EUFdoRbBodhlqUrApCiw7uWtbfrFxXVOKPlFNljAk9kvZ2Zy1ldCjSxRNdn4-YtOKwnc48K8iaA0jKzcUid6F6enJ1eQsavsyRAa1Qx0VQ5WqTErjnSIXTBeJ4rnUXqthYqS2VnBlc6OVLGxqjLMi9wKv5g7dJ-v5F9io5pX7CizJEs1jK4bax8LxXPkMtQQvDD2KC90DuWRSadqi5dQ747ZsnJe4KJG5JTG3DMwtA3N7MOjo7sMSvUmxQ8zqRrd86sHRK5no7hOaCCfN9_5Ptw8fQvSZjgPYQL65QzRfan3UyO0Lqi_rzw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9NAEB6VcgAO5VEQKVD2wBEn3uyuH71VoVUCTVWhRPRm7RMqqIPAuVTqf2fG61gBIYHkg2V7LO_OeHZm9psZgDep8l7wLCSuoNANasDE6CIkqTG5cFxyKygbeX6eTZfy_aW63IG3fS6M974Fn_khnbZ7-W5l1xQqG6lMUvm6O3AX133FY7ZWv2eQZ22PU_yFqbNMnnX5wDwtR4tPk4jiQutCRGhARrjnraWo7a1CyEj9EycnxK4WW0vN6UOYbz4yIky-DteNGdqbP-o3_u8oHsFeZ3Oy4ygkj2HH10_gwVYlwn24fbf6HMhPZ1c1o570zY_19RFDbWE0AaPZRaxKwZYosuzkumv6xY6bhpL0iWqyASKxj9pdrVhXCz25QOFks9kRW9YUwMMHv2gC1zCyc2OZ6KewPD1ZTKZJ15khsagfmqQc60znStngNTlhpuRaFMoEo8fcKuOcFNoV1mhVusxa72QRJF4tPDpQLohnsFuvav8cGM-5EamTYxNS6UWhQ456QpSWXiWkGYDaMKmyXdly6p7xrWrdl7SskLkVMbeKzK0icwcw6um-xyn6J8U-Mat_uuPTAA5_k4n-PuGJcNDi4O90r-HedDE_q85m5x9ewP0Yi6bjJewiD_0rNGYac9jK8C8cqO8Y |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Dogfight+in+Spectrum%3A+Combating+Primary+User+Emulation+Attacks+in+Cognitive+Radio+Systems-Part+II%3A+Unknown+Channel+Statistics&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=HUSHENG+LI&rft.au=ZHU+HAN&rft.date=2011&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=1536-1276&rft.volume=10&rft.issue=1&rft.spage=274&rft.epage=283&rft_id=info:doi/10.1109%2FTWC.2010.112310.100630&rft.externalDBID=n%2Fa&rft.externalDocID=23763853 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon |