Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example

In cognitive radio networks, an adversary transmits signals with characteristics that emulate those of primary users to prevent secondary users from transmitting. Such an attack is called a primary user emulation (PUE) attack. In this paper, a game theoretical framework is proposed to study the prim...

Full description

Bibliographic Details
Main Authors: Ioanna Kakalou, Kostas E. Psannis
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8252692/
id doaj-b381202a9ac94cbf83f56c4b82c1b01c
record_format Article
spelling doaj-b381202a9ac94cbf83f56c4b82c1b01c2021-03-29T20:29:20ZengIEEEIEEE Access2169-35362018-01-0165402541410.1109/ACCESS.2018.27915198252692Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack ExampleIoanna Kakalou0https://orcid.org/0000-0002-9807-8759Kostas E. Psannis1https://orcid.org/0000-0003-0020-6394Department of Applied Informatics, University of Macedonia, Thessaloniki, GreeceDepartment of Applied Informatics, University of Macedonia, Thessaloniki, GreeceIn cognitive radio networks, an adversary transmits signals with characteristics that emulate those of primary users to prevent secondary users from transmitting. Such an attack is called a primary user emulation (PUE) attack. In this paper, a game theoretical framework is proposed to study the primary user emulation attack (PUEA) on cognitive radio nodes as a game of imperfect information between the secondary users (SUs), who do not exchange game information between them against the adversaries generating the PUEA and to define optimal strategies with minor computational demands. When the SU challenges the PU emulator successfully, updating the information on a cloud-based database enables the rest of the network to know the identity of PUE. As the game evolves, the grand coalition of the secondary users acts as the one without collaboration against the PU emulator playing a winning strategy. The performance of the game for optimal strategies is equal to the performance of the collaborative methods for PUEA detection.https://ieeexplore.ieee.org/document/8252692/PUE attackimperfect gamecognitive radiocloud computing
collection DOAJ
language English
format Article
sources DOAJ
author Ioanna Kakalou
Kostas E. Psannis
spellingShingle Ioanna Kakalou
Kostas E. Psannis
Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example
IEEE Access
PUE attack
imperfect game
cognitive radio
cloud computing
author_facet Ioanna Kakalou
Kostas E. Psannis
author_sort Ioanna Kakalou
title Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example
title_short Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example
title_full Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example
title_fullStr Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example
title_full_unstemmed Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example
title_sort coordination without collaboration in imperfect games: the primary user emulation attack example
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description In cognitive radio networks, an adversary transmits signals with characteristics that emulate those of primary users to prevent secondary users from transmitting. Such an attack is called a primary user emulation (PUE) attack. In this paper, a game theoretical framework is proposed to study the primary user emulation attack (PUEA) on cognitive radio nodes as a game of imperfect information between the secondary users (SUs), who do not exchange game information between them against the adversaries generating the PUEA and to define optimal strategies with minor computational demands. When the SU challenges the PU emulator successfully, updating the information on a cloud-based database enables the rest of the network to know the identity of PUE. As the game evolves, the grand coalition of the secondary users acts as the one without collaboration against the PU emulator playing a winning strategy. The performance of the game for optimal strategies is equal to the performance of the collaborative methods for PUEA detection.
topic PUE attack
imperfect game
cognitive radio
cloud computing
url https://ieeexplore.ieee.org/document/8252692/
work_keys_str_mv AT ioannakakalou coordinationwithoutcollaborationinimperfectgamestheprimaryuseremulationattackexample
AT kostasepsannis coordinationwithoutcollaborationinimperfectgamestheprimaryuseremulationattackexample
_version_ 1724194744327733248