This paper presents the results of the characterization of the attack known as the "primary user emulation" in mobile cognitive radio networks performing the implementation and testing. The tools and their configuration to carry out the attack are presented and their effects on the network are analyzed. The results show how to generate the attack with a software-defined radio equipment (SDR) using GNU-Radio and OpenBTS. The effects of the possible configurations of the attack on the network are shown, the malicious type generates constant interference on the primary or cognitive network, the selfish type allows to imitate a licensed or primary user generating interference to the primary network and inability to access the Cognitive Network ...
Cognitive radio as a solution of spectrum scarcity, proposes a dynamic spectrum access which imposes...
Theoretical thesis.Bibliography: pages 45-50.1. Introduction -- 2. Background -- 3. Literature revie...
ABSTRACT Primary User Emulation Attack (PUEA) is one of the major threats to the spectrum sensing i...
This paper presents the results of the characterization of the attack known as the "primary user emu...
Primary user emulation attacks are a potential security threat to cognitive radio networks. In this ...
Abstract — In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognit...
Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to...
Cognitive Radio Network is an effective technology and a hot research direction which can solve the ...
Cognitive Radio Networks (CR) is an advanced growing technique and a promising technology for the up...
Cognitive Radio Networks (CR) is an advanced growing technique and a promising technology for the up...
Abstract — In cognitive radio networks, an adversary transmits signals whose characteristics emulate...
Theoretical thesis.Bibliography: pages 71-74.1. Introduction -- 2. Cognitive Radio technology -- Cog...
Cognitive radio (CR), which provides dynamic spectrum access to combat spectrum scarcity, imposes so...
Abstract—Cognitive radio (CR) can improve the utilization of the spectrum by making use of licensed ...
In this paper, we introduce a belief propagation based technique to combat the effects of primary us...
Cognitive radio as a solution of spectrum scarcity, proposes a dynamic spectrum access which imposes...
Theoretical thesis.Bibliography: pages 45-50.1. Introduction -- 2. Background -- 3. Literature revie...
ABSTRACT Primary User Emulation Attack (PUEA) is one of the major threats to the spectrum sensing i...
This paper presents the results of the characterization of the attack known as the "primary user emu...
Primary user emulation attacks are a potential security threat to cognitive radio networks. In this ...
Abstract — In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognit...
Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to...
Cognitive Radio Network is an effective technology and a hot research direction which can solve the ...
Cognitive Radio Networks (CR) is an advanced growing technique and a promising technology for the up...
Cognitive Radio Networks (CR) is an advanced growing technique and a promising technology for the up...
Abstract — In cognitive radio networks, an adversary transmits signals whose characteristics emulate...
Theoretical thesis.Bibliography: pages 71-74.1. Introduction -- 2. Cognitive Radio technology -- Cog...
Cognitive radio (CR), which provides dynamic spectrum access to combat spectrum scarcity, imposes so...
Abstract—Cognitive radio (CR) can improve the utilization of the spectrum by making use of licensed ...
In this paper, we introduce a belief propagation based technique to combat the effects of primary us...
Cognitive radio as a solution of spectrum scarcity, proposes a dynamic spectrum access which imposes...
Theoretical thesis.Bibliography: pages 45-50.1. Introduction -- 2. Background -- 3. Literature revie...
ABSTRACT Primary User Emulation Attack (PUEA) is one of the major threats to the spectrum sensing i...