Keywords

1 Introduction

With increasing use of the multimedia applications, the demand for spectrum is continuously increasing. However, the spectrum available is very limited as well as costly. Hence, there is a need to utilize the spectrum very judiciously. The presently adopted Static Spectrum Allocation (SSA) policy leads to underutilization of spectrum [1]. J. Mitola suggested the Dynamic Spectrum Allocation (DSA) method to solve this problem [2]. Later, quantification of Mitola’s work was done by Haykin [3]. Cognitive radio is a technology that is widely studied nowadays and can possibly eliminate the SSA problem in future. Spectrum sensing is a very crucial task to practically implement this technology. Various spectrum sensing methods have been discussed in [4]. Among all, energy detection has been widely adopted and accepted method for sensing of spectrum, because it does not require any prior knowledge regarding the features of the primary signal and is computationally simple to implement [5]. Most of the present work in Cognitive Radio Technology focuses on spectrum sensing and its optimization. However, for successful implementation for any technology, its security aspects need to be taken into account. A comprehensive survey on different security attacks and their detection has been presented in [6]. This paper focuses on one such Denial of Service (DoS) attack named Primary User Emulation Attack (PUEA) [7]. In such an attack, an adversary tries to imitate the characteristics of primary user so as to fool the good secondary user regarding the usage of channel. The good secondary user believing that channel is being used by the Primary User leaves the spectrum and hence making the use of DSA method trivial. The malicious users can use the channel for their own purpose. Various studies have been conducted on detection and elimination of this attack. The impact of PUEA on Cognitive Radio Networks has been studied in [8]. PUEA can be classified into two types—always on and smart [9]. Always on PUE attacks emulate the primary signal anytime without taking into account whether the primary signal is transmitting or not whereas smart PUE attackers take into account the transmission characteristics of primary signal. The impact of smart PUE attackers is more severe than always on PUE attackers. This paper focuses on always on PUEA.

This paper presents an analytical model for PUEA in which secondary users are assumed to move in a vertical direction. Effect on the probability of miss detection and false alarm has been considered for varying distances between real secondary user and primary user. The first analytical model was presented in [10], where the use of Markov inequality and Fenton’s approximation was done so as to get a lower limit for the likelihood of successful PUEA. In [11], WSPRT is used for detection of PUEA by first formulating the probability density function (pdf) for the received power at the good secondary user from the malicious users. Jin et al. [12] compares the Wald’s Sequential Probability Ratio test (WSPRT) and NPCHT for identification of PUEA using the same analytical model. It was found that WSPRT offers less likelihood of successful PUEA as compared to NPCHT because it allows two thresholds for both probability of false alarm and miss detection. This paper presents a similar model using NPCHT with the difference being that the good secondary user is allowed to move in a vertical direction that allows the study of probability of false alarm as well as miss detection with changing distance between the real secondary user and primary user. The simulated results match with the theoretical results that probability of successful PUEA increases with increasing distance between primary transmitter and the good secondary user.

The rest of the paper is structured as follows. Section 2 discusses the system model. Section 3 presents the analytical model. Section 4 describes the NPCHT approach for detecting PUEA. Results are analyzed in Sect. 5. Conclusion is provided in Sect. 6.

2 System Model

The system model in this paper has one secondary user surrounded by different randomly located malicious users in circular grid around it as given in Fig. 1 [11]. Let the radius of the circular grid be R. One primary transmitter is fixed at a distance greater than or equal to Dp from all the other users. The distance Dp ≫ R. Energy-based detection technique has been used for detection of PUEA. If the power received at the secondary user exceeds a certain threshold say \( \Lambda \), then the primary transmission is assumed else malicious transmission is assumed.

Fig. 1
figure 1

Typical cognitive radio scenario

Two hypotheses have been taken as null and alternative hypothesis given as follows:

H0::

Primary User Transmission. This includes the case when only primary user is transmitting the signal.

H1::

Malicious User Transmission. This hypothesis considers the case when malicious and good secondary users are simultaneously transmitting the signal.

Following assumptions have been made for doing analytical study of the system model:

  • Total M malicious users along with one good secondary user are present in the CRN.

  • Minimum distance of primary transmitter from all other users should be Dp.

  • The primary transmitter power is taken to be Pt.

  • Power of each malicious user is taken to be Pm where Pm ≪ Pt.

  • The adversaries are uniformly distributed in a circular region around the good secondary user and their positions are independent to each other.

  • The position of primary transmitter is fixed whereas the movement of secondary user is restricted in a vertical direction.

  • The position of primary transmitter is known to the good secondary user and the adversaries.

  • The incoming signals received from both the primary transmitter as well as malicious users undergo log-normal shadowing, path loss and Rayleigh fading.

  • The mean, \( \Delta \) of the Rayleigh random variable is assumed to be unity.

  • The exponent for path loss is assumed to be 2 for propagation from primary transmitter and 4 from malicious users.

  • There is an excluded distance R0 from the good secondary user where there is no malicious user. Such condition is required since if there would be any malicious user present in this region, then the power received from the malicious users will be always higher than the power received from primary transmitter leading to successful PUEA every time.

3 Analytical Model

First of all, the probability density function (pdf) of the signal is analyzed. It is assumed that the good secondary user is fixed at origin (0, 0). It is also assumed that the motion of SU is restricted in a vertical direction ranging from a minimum angle of –π/4 to maximum angle of π/4 from primary transmitter. Since Dp ≫ R, coordinates of primary transmitter can be assumed to be same for all the malicious SUs.

Let the coordinates of the M malicious users be (rj, Ɵj), where 1 ≤ j  ≤ M. The pdf of rj is taken as

$$ p\left( {r_{j} } \right) = \left\{ {\begin{array}{*{20}c} {\frac{{2r_{j} }}{{R^{2} - R_{0}^{2} }},} & {{\text{R}}_{0} \le r_{j} \le R} \\ {0,} & {\text{otherwise}} \\ \end{array} } \right. $$
(1)

Ɵj is taken as uniformly distributed in the range (-π, π).

The power transmitted from primary transmitter to the SU can be taken as

$$ P_{r}^{(p)} = P_{t} G_{p}^{2} \left( {\frac{{d_{p} }}{\cos \left( \theta \right)}} \right)^{ - 2} $$
(2)

where \( G_{p}^{2} = 10^{{\frac{{\xi_{p} }}{10}}} \) and \( \xi_{p} \, \sim \,{\rm N}(0,\,\sigma_{p}^{2} ) \). The corresponding pdf \( p^{{\left( {P_{r} } \right)}} \left( \gamma \right) \) can be defined as log normal distribution which can be written as follows:

$$ p^{{\left( {P_{r} } \right)}} \left( \gamma \right) = \frac{1}{{A\sqrt {2\pi } \sigma_{p} \gamma }}\,\exp \left\{ {\frac{{ - \left( {10\,\log_{10} \gamma - \mu_{p} } \right)^{2} }}{{2\sigma_{p}^{2} }}} \right\} $$
(3)

where \( A = \frac{\ln \,10}{10} \) and

$$ \mu_{p} = 10\,\log_{10} \,P_{t} - 20\,\log_{10} \left( {\frac{{d_{p} }}{\cos \left( \theta \right)}} \right) $$
(4)

Since different malicious users are not dependent on each other, their power can be added which can be taken as

$$ P_{r}^{(m)} = \sum\limits_{j = 1}^{M} {P_{m} \left( {d_{j} } \right)}^{ - 4} G_{j}^{2} $$
(5)

where \( G_{j}^{2} \) is the shadowing between the SUs and jth MU. \( G_{j}^{2} = 10^{{\frac{{\xi_{j} }}{10}}} \) and \( \xi_{j} \, \sim \,{\rm N}\left( {0,\,\sigma_{m}^{2} } \right) \). All the variables in above equation are log-normally distributed of the form \( 10^{{\frac{{\omega_{j} }}{10}}} \) and \( \omega_{j} \, \sim \,{\rm N}\left( {\mu_{j} ,\,\sigma_{m}^{2} } \right) \). Here

$$ \mu_{j} = 10\,\log_{10} P_{m} - 40\,\log_{10} \left( {d_{j} } \right) $$
(6)

By approximating the pdf from different malicious users using Fenton’s approximation, pdf \( p^{\left( m \right)} \left( \chi \right) \) can be given as

$$ p^{\left( m \right)} \left( \chi \right) = \frac{1}{{A\sqrt {2\pi } \sigma_{\chi } \chi }}\,\exp \left\{ {\frac{{ - \left( {10\,\log_{10} \chi - \mu_{\chi } } \right)}}{{2\sigma_{\chi }^{2} }}^{2} } \right\} $$
(7)

The received power \( P_{r}^{(m)} \) is assumed to be log-normally distributed random given by above equation. Here, \( \mu_{\chi } \) and \( \sigma_{\chi }^{2} \) can be taken as

$$ \mu_{\chi } = \frac{1}{A}\,\ln \left[ {\frac{{E^{2} \left[ {P_{r}^{(m)} } \right]}}{{\left( {\text{var} \left( {P_{r}^{(m)} } \right) + E^{2} \left[ {P_{r}^{\left( m \right)} } \right]} \right)^{2} }}} \right] $$
(8)
$$ \sigma_{\chi }^{2} = \frac{1}{{A^{2} }}\,\ln \left[ {\frac{{\text{var} \left( {P_{r}^{(m)} } \right) + E^{2} \left[ {P_{r}^{(m)} } \right]}}{{E^{2} \left[ {P_{r}^{(m)} } \right]}}} \right] $$
(9)

The values of \( \mu_{\chi } \) and \( \sigma_{\chi }^{2} \) can be substituted in Eq. (7) to get the pdf for the malicious users. Further, the error probabilities, i.e., the probability of miss detection and false alarm can be analyzed by applying Neyman–Pearson criterion as defined in the following section.

4 Neyman–Pearson Criterion for Detection of Puea

In Neyman–Pearson criterion, to take any decision, two hypothesis are assumed which can be defined as follows:

H0: Primary User transmission (Null hypothesis).

H1: Malicious User transmission (Alternative hypothesis).

Any secondary user can undergo two types of errors during sensing of the channel, namely:

  • Miss detection: This case corresponds to when the PU is actually transmitting the signal but the SU believes that it to be sent by the malicious user. The probability of detection, Pd is defined as (1-Pm), where Pm is the likelihood of miss detection.

  • False alarm: This error corresponds to case when the signal is transmitted by the MU but the good SU assumes the signal to be transmitted by the PU. This leads to interference to the PU and thus PU may impose a penalty to the good SU for further usage of the channel.

The Neyman–Pearson criterion aims at reducing the possibility of successful PUEA assuming a fixed false alarm probability say, α. The condition of fixed false alarm probability has to be imposed because both the error probabilities, i.e., miss detection and false alarm cannot be reduced simultaneously [13]. The ratio of two pdfs is taken and compared with a certain threshold, say \( \Lambda \), which is taken as

$$ \Lambda = \frac{{p^{\left( m \right)} (x)}}{{p^{{(P_{r} )}} (x)}} $$
(10)

where \( x \) can be taken as the measured power of the signal at SU. The final decision is based on criterion given as follows:

$$ \Lambda \left\{ {\begin{array}{*{20}l} { \le \lambda \quad {\text{D1:}}\,{\text{Primary}}\,{\text{Transmission}}} \hfill \\ { \ge \lambda \quad {\text{D2:}}\,{\text{Malicious}}\,{\text{User}}\,{\text{Transmission}}} \hfill \\ \end{array} } \right. $$
(11)

where \( \lambda \) can be obtained by a constraint on probability of miss detection \( \Pr \left\{ {\frac{D2}{H0}} \right\} \) which is fixed at a certain value α given by the following expression:

$$ \Pr \left\{ {\frac{D2}{H0}} \right\} = \int_{{\Lambda \ge \lambda }} {p^{{\left( {P_{r} } \right)}} \left( x \right)dx = \alpha } $$
(12)

Hence, Neyman–Pearson criterion aims at reducing the error probabilities while keeping a constraint as shown in the above equation.

5 Results and Discussion

The proposed work in this paper is simulated by assuming the following system parameters (Table 1).

Table 1 System parameters used for simulation

The simulation is performed for 10,000 times. The performance of the model is illustrated by plotting probability of miss detection verses that of false alarm in Fig. 2. Plot of probability of detection versus that of false alarm, also called ROC is shown in Fig. 3. Finally, variation of probability of false alarm as well as miss detection verses Ɵ can be analyzed in Fig. 4. The results in Fig. 2 are concordant with the theoretical results that both the errors probabilities cannot be reduced simultaneously and the mean probability of both false alarm as well as miss detection is found to be nearly varying from 0.01 to 0.05.

Fig. 2
figure 2

Probability of miss detection versus false alarm

Fig. 3
figure 3

Probability of detection versus false alarm

Fig. 4
figure 4

Probability of false alarm versus angle, Ɵ

Similarly, the plot for Receiver Operating Characteristics (ROC) [13], which is generally used as another way for detection of a detector is shown in Fig. 3 and the mean Pd is found to be varying around 0.95–0.99.

Figures 4 and 5 demonstrate how the probability of false alarm and miss detection, respectively, varies with varying angles of the secondary user with the primary transmitter. Change in angles leads to change in distances between primary transmitter and real secondary user and thus, the error probabilities are minimum for Ɵ = \( 0^{ \circ } \) and maximum for Ɵ = \( - 45^{ \circ } \) and \( + 45^{ \circ } \). Hence, as the distance between primary transmitter and secondary user increases, the likelihood of false alarm increases and vice versa.

Fig. 5
figure 5

Probability of miss detection versus angle, Ɵ

6 Conclusion

An analytical model for the practical Cognitive Radio Network has been proposed based on Neyman–Pearson criterion and effects on probability of false alarm as well as miss detection has been studied with varying distances between primary transmitter and good secondary user. Movement of secondary user is assumed in a vertical direction ranging from an angle of –π/4 to π/4 with the primary transmitter. The simulated results show that error probabilities increments with the increasing distances between primary transmitter and the secondary user. Future work can be based on variable malicious users’ power. Other analytical models can be developed that deals with other distributions apart from uniform distributions. Also, different techniques need to be developed that focuses on smart PUE attackers.