Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/15748
Title: | A Survey of Range-Based Techniques for Localizing Primary User Emulators in Cognitive Radio Network |
Authors: | Adebo, Samuel A. Onwuka, Elizabeth N. Onumanyi, Adeiza J. USMAN, Abraham Usman |
Keywords: | Cognitive Radio, Primary User, Localization, Angle of Arrival, Range |
Issue Date: | 2016 |
Publisher: | Proceedings on Big Data Analytics and Innovation (Peer Reviewed) |
Abstract: | A problem currently facing the wireless communication industry is spectrum underutilization, wherein licensed Primary Users (PUs) only marginally use their bands in time and space. Consequently, Opportunistic Spectrum Sharing (OSS) has been proposed as a solution to this problem with Cognitive Radio (CR) being the enabling technology. CR describes the capability of a radio to dynamically and opportunistically access licensed spectrum without causing interference to the PU. While CR is being developed, one main security problem it faces is Primary User Emulation (PUE) attack. A PUE attack occurs when mischievous Secondary Users (SU), that is CRs, begin to emulate PU signals either to deny other SUs from gaining access to free bands or to simply acquire bandwidth for selfish purposes. In this regard, localization is considered as a solution, wherein the location of the PUE attacker is determined and compared to the location of the true PU transmitter and any significant deviation in their positions is indicative of a PUE attacker. Thus, this paper is a short note describing the different state-of-the-art localization techniques, elucidating their advantages and disadvantages. The approach adopted included identification of the various localization techniques for PUE identification, with subsequent analysis under the following metrics: accuracy, precision, computational complexity, cost, energy efficiency, and size of hardware. It was concluded that the Angle of Arrival and Received Signal Strength Indicator techniques do not require the cooperation of PUE for its detection, hence making these techniques most suitable for use. It is believed that this mini-review will be beneficial particularly for budding researchers seeking enlightenment in this research area. |
URI: | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/15748 |
Appears in Collections: | Telecommunication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Proceedings of Big Data.pdf | 2.94 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.