Macquarie University
01whole.pdf (996.55 kB)

Mitigation of primary user emulation attacks using belief propagation

Download (996.55 kB)
posted on 2022-03-29, 01:14 authored by Sasa Maric
Cognitive Radio (CR) is a promising technology that has the potential torevolutionize spectrum utilization by enabling unlicensed users (secondary users) to seek opportunities for transmission by taking advantage of the idle periods of licensed users (primary users) [1]. However, participants in the CR network can comprise of malicious adversaries who adopt dishonest and non-cooperative strategies to attack the network. An attack called the Primary user emulation attack has been identified as the most serious threat to cognitive radio security. In primary user emulation attacks a malicious user emulates the characteristics of a primary user and transmits on available frequency spectrum channels. As a result, secondary users are tricked into believing that the channel is occupied and avoid it, which allows the malicious user to occupy the entire frequency spectrum band uncontested. This report proposes a new technique based on belief propagation to combat primary user emulation attacks in cognitive radio networks. We introduce a method that dramatically reduces the computational complexity and run time of the existing techniques, while also improving the performance.


Table of Contents

1. Introduction -- 2. Cognitive Radio technology -- Cognitive Radio security -- 4. PUEA mitigation algorithms -- 5. A new belief propagation based PUEA mitigation algorithm -- 6. Conclusion.


Bibliography: pages 71-74 Theoretical thesis.

Awarding Institution

Macquarie University

Degree Type

Thesis MRes


MRes, Macquarie University, Faculty of Science and Engineering, Department of Engineering

Department, Centre or School

Department of Engineering

Year of Award


Principal Supervisor

Sam Reisenfeld


Copyright Sasa Maric 2014. Copyright disclaimer:




1 online resource (xi, 74 pages) diagrams, graphs

Former Identifiers