NUST Institutional Repository

Effects of Primary User Emulation Attack on Primary User Activity

Show simple item record

dc.contributor.author Naeem, Ayesha
dc.contributor.author Supervised by Dr.Imran Rashid.
dc.date.accessioned 2020-10-26T07:25:48Z
dc.date.available 2020-10-26T07:25:48Z
dc.date.issued 2016-06
dc.identifier.other TIS-199
dc.identifier.other MSIS-12
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/4928
dc.description.abstract Cognitive radio technology helps to resolve the problem of static spectrum shortage by effectively utilizing the available spectrum. By using the technique of dynamic spectrum sensing secondary users utilize the available spectrum when the spectrum is vacant. The utilization of spectrum for primary user is not a big issue as they are licensed users but secondary users may exploit the working and the spectrum utilization by launching some attacks and thus exploiting vulnerabilities in cognitive radio networks. In this research we focus on one of attack in cognitive radio networks that is Primary user Emulation attack in which secondary user masquerade as primary and thus preventing legitimate secondary user from accessing the available licensed band. In PUE attack the aim of attacker is not to cause interference to primary users but to prevent spectrum resources used by secondary users. In this attack the goal of attacker is to maximize its own spectrum usage or to halt the Dynamic Spectrum Access process of legitimate secondary user by transmitting signals that emulate the signal properties and characteristics of primary user signals. We try to analyze how performance of primary user activity model affected by the presence of this PUE attack. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Effects of Primary User Emulation Attack on Primary User Activity en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account