Impact of Primary User Emulation Attacks on Cognitive Radio Networks

(*) Corresponding author

Authors' affiliations

DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)


In this paper, we study the effects of Primary user emulation attacks (PUEA) in a cognitive radio network consisting of a single primary transmitter and a set of co-operating secondary or cognitive users. The primary transmitter communicates with primary receivers within an area called the primary exclusive region (PER). Inside the PER, no cognitive users may transmit so as to guarantee a certain performance for the primary receivers in the region. Outside the PER, cognitive users are uniformly distributed and allowed to transmit provided they are at a distance from the primary receiver.  We present an analysis to calculate the powers and probability density function (PDF) of both malicious users and good secondary users and compare it with the simulated results. The PDF is used in Neyman-Pearsons composite hypothesis test to study the impact of PUEA in the network. Results show that the number of malicious users in the system can significantly increase the probability of false alarm in the network
Copyright © 2014 Praise Worthy Prize - All rights reserved.


Cognitive Radio; Cognitive Radio Network; Primary User Emulation Attack (PUEA); Primary Exclusive Region; Probability Density Function (PDF)

Full Text:



J. Mitola, and G. Q. Maguire,Cognitive radio: Making software radios more personal,IEEE Communication Magazine, vol. 6, no. 4, Aug. 1999.Pages. 13–18,

Z. Jin, S. Anand, and K. P. Subbalakshmi, “Detecting primary user emulation attacks in dynamic spectrum access networks,” In Proceedings of the IEEE International Conference on Communications, Dresden, Germany, Jun 2009.

I. F. Akyildiz, W. Y. Lee, M. C. Vuran, and S. Mohanty, “NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey,” (Elsevier Journal), on computer Networks, Vol. 50, no. 13,Sept 2006.pp. 2127-2159,

R. Chen, and M. J. Park,Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks,Proc., IEEE workshop on Networking Technol. For Software Defined Radio Networks (SDR) 2006, Sep. 2006, pp. 110-119.

R. Chen, M. J. Park, and J. H. Reed,Defense against Primary User Emulation Attacks in Cognitive Radio Networks, IEEE Journal on Selected Areas in Communications, Vol.26,No.1, 2008, pp.25-37.

T. Clancy, and N. Goergen,Security in Cognitive Radio Networks: Threats and Mitigation,International Conference on Cognitive Radio Oriented Wireless Networks and communications, CrownCom 2008.

Y. Liu, P. Ning, H. Dai,Authenticating Primary Users Signals in Cognitive Radio 1209 networks via integrated cryptographic and wireless link signatures,in: Proc. Of 1210 IEEE Symposium on Security and Privacy, 2010, pp. 286–301.

Z. Chen, T. Cooklev, C. Chen, and C. Pomalaza-Raez, “Modeling primary user emulation attacks and defenses in cognitive radio networks,” Proceedings, IEEE International Performance Computing and Communications Conference (IPCCC’2009), Dec.2009, pp. 208–215,

R. W. Thomas, R. S. Komali, B. J. Borghetti, and P. Mahonen A Bayesian game analysis of emulation attacks in dynamic spectrum access networks,Proceedings, IEEE International Symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN2010), Apr. 2010.

S. Anand, Z. Jin, and K. P. Subbalakshmi,An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks, Proceedings, IEEE Symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN) 2008.

M. Vu, N. Devroye, and V. Tarokh,The Primary Exclusive Region of Cognitive Networks, Proceedings, IEEE transactions on wireless communications, Vol. 8, No 7, July 2009.

M. J. Marcus,Unlicensed cognitive sharing of TV spectrum: The controversy at the federal communications commission, IEEE Comm. Magazine, May 2005, pp. 24–25.

L. Fenton,The sum of log-normal probability distributions in scatter transmission systems,IRE Trans. on comm. Systems, vol. 8, No 1., Mar 1960, pp. 57-67.

M. Henggi,On routing in random Rayleigh fading Networks,IEEE Trans. Wireless Commun., Vol4, July 2005. pp. 1553-1562,

T. S. Rappaport, Wireless Communications: Principle and Practice. (Prentice Hall Inc., New Jersey, 1996).

Z. Jin, S. Anand, and K. P. Subbalakshmi,Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis TestingMobile Computing and communication IEEE transactions on communications, vol. 60, No.4Sept 2012.

M. Vu, N. Devroye, M. Sharif, and V. Tarokh,Scaling laws of cognitive networks, Proceedings, IEEE Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM’2007), Aug. 2007pp. 2–8.

S. Anand, and R. Chandramouli,On the secrecy capacity of fading cognitive wireless networks, Proceedings, IEEE Cognitive Radio Oriented Wireless Networks and Communications. CROWNCOM’2008.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2024 Praise Worthy Prize