SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
_______________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 591
SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE
RADIO NETWORK WITH SENSING STRATEGIES
Sandeep Thakre1
, Shruti Dixit2
1
Student, 2
Prof., EC, SIRT, Bhopal, MP, India,
Abstract
Communication world is growing day by day In wireless communication system introduces a new technology which I known as
cognitive radio network its name as CRN. In CRN Un-authorized user can used empty channel from the spectrum band of
authorized user this help to improve the spectrum efficiency as well generate a problem like some malicious or fake users can
used the channel and hamper the communication. So in this paper we discuss on security threats and technique to find them with
sensing strategies
Keywords: Cognitive radio network, Pus, SUs, Spectrum sensing, spectrum holes
---------------------------------------------------------------------------------***--------------------------------------------------------
1. INTRODUCTION
Communication is a process of transmitting information
from one place to another through the medium information
sends in the form of electromagnetic waves through the
medium air. Here we see the advances in wireless
communication. Cognitive radio network is advancement in
wireless communication cognitive means sharing, in
Cognitive radio network Un-authorized user can used empty
channel from the spectrum band of authorized user.
Cognitive Radio Networks (CRNs) is an intelligent network
that adapt to changes in their network to make a better use
of the spectrum. CRNs solve the spectrum shortage problem
by allowing unlicensed users to use spectrum band of
licensed user without interference, generally authorized or
licensed users known as primary users and un-authorized or
un-licensed users known as secondary users. When data or
information send by authorized or primary user here primary
user not used total band some of them are free these empty
channels are allowed to used by un-authorized or secondary
users .Secondary users always observe the activities of
primary user, and when secondary user detect the empty
channel and occupy the channel without disturbing the
primary user. When the primary users are sending
information or it is active, the secondary user should either
avoid using the channel. An Empty channel also known as
spectrum holes. A spectrum hole is a band of frequencies
assigned to a primary user, but at a particular time and
specific geographic location, the band is not being utilized
by that user. [2].Figure-1 shows the basic structure of
cognitive radio network. In this secondary user occupy the
space called white space of primary user band which is
under-utilized. Normally primary user has own
communication area, in which secondary user utilized the
empty channel without any interference
1.1Basic Cognitive Radio Network
Fig.1 Basic cognitive radio network
Figure-1 shows the architecture of cognitive radio cycle.
When a primary user (PU) transmits data signal from a
licensed spectrum band, it may be possible that it use only
few channels of spectrum other channels are empty. These
empty channels are sensed by secondary user (SU) which
has no license for using this spectrum. Firstly secondary
users sensed the spectrum andsend the information of
spectrum holes to the SU’s. SU analyses the spectrum that
PU ever uses these channels or not, because sometime
PU use the empty channels which they not use before
operation. After spectrum analysis SU’s decide how many
channels they required to send their data signal
1.2 Spectrum Sensing Technique
It is very important in Cognitive radio network that
secondary user properly sense the empty spectrum band. In
this paper we use energy sensing technique. But first look
into the original bit sequences of primary and secondary
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
_______________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 592
.
Fig2:Original bit sequence of primary user.
Figure23 shows bit sequence of primary user , whose data is
send in the form of bits, but there is some holes as shown in
figure as a gap in between two BPSK modulated signals.
This signal gaps is nothing but an empty channels or
spectrum holes.
Fig 3 Original bit sequence of Secondary User
In figure 3 shows bit sequence of secondary user, we use
Energy spectrum technique and find the spectrum holes or
empty channel without interfering or disturbing the licensed
user or primary user. In this Energy Spectrum Sensing
techniques, secondary user or un-licensed user analyze
the channel whether the channel have some data packets
or not, if its energy level is zero then they decided that the
spectrum is empty, and SU’s easily send their data to the
desired receiver.
2. THREATS OF COGNITIVE RADIO
NETWORK
PUEs or Primary User Emulsion Attack:
Primary user emulsion attack means when primary user send
data secondary user continuously monitor the channel.
When primary sends data it means channel busy, secondary
knows this by using energy spectrum sensing technique but
primary not send continuously When it is ideal or not
busystate secondary sense channel and send data but when
primary requires channel then sold the control. But if
somewhere else malicious or fake secondary user work as
primary and wants control of channel and secondary send
data at same time malicious user behaves as primary so
secondary sold control and not send data such attack
referred as primary user emulsion attack.Additional fake or
malicious secondary users, may use a primary user
emulation attacks to take advantage of the secondary user's
ability to avoid primary users and cause excessive and
unexpected disruptions to communications.[10] A
fundamental characteristic of a CR is its ability for spectrum
sensing, as it shall use the spectrum in an opportunistic
manner. This means that the CR has to vacate a
currently used spectrum band if an incumbent signal is
detected. In this case, CR’s perform spectrum hand-off
seeking for different spectrum holes for transmissions.
Performing spectrum hand-off very often results in
degradation of the CR performance since more time for
sensing of the spectrum is required, and this decreases
the available time for accessing the spectrum.[3]
Fig4
Fig5
Figure 4&5 shows Primary User Signals and Secondary
User Signals for Primary User Emulsion Attack in Cognitive
Radio Network. This figure shows 18000 samples for the
simulation with 2 BPSK.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
_______________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 593
5
N
R
1 4 7 10 13 16 19
B
E
R
0.18
77
0.19
07
0.18
81
0.181
7
0.16
97
0.16
24
0.1
57
6
This figure 6 shows the Bit error rate reduced continuously
when Primary User Emulsion Attack occurred in network.
3. CONCLUSION
Through this paper, we practically find the threats from
the wireless communication environment and sense the
empty spectrum band through Energy sensing technique.
Because of the practical approach of a secondary user
which sense an empty channel and send their data
packets without disturbing the authorized user. In this we
work on two types of threats like primary user emulation
attack and jamming attack .These two are the major threats
of cognitive radio network wireless communication
environment. Jamming is the common attack of wireless
communication. It is similar to Denial of Service (DoS)
attack. In future we willimprove the work on cognitive radio
network and try to practically work on the security of
threats.
REFERENCES
[1]F. Akyildiz, W. Lee, M. C. Vuran, S. Mohanty, “A
survey on spectrum Management in Cognitive Radio
Networks,” IEEE Communications Magazine, April 2008.
[2] Chetan N. Mathur, K.P. Subhalakshami, “Security issues
in cognitive radio netwroks,” Cognitive network: Towards
Self-Aware Networks, 2007.
[3] X. Zhang, C. Li, “Constructing secure cognitive wireless
networks experiences and challenges,” Wireless
Communications and Mobile Computing, vol. 10, pp. 55-69.
2009.
[4]R. Chen and J. Park “Ensuring Trustworthy Spectrum
Sensing in Cognitive Radio Networks,” Proc., IEEE
workshop on Networking Technol. For Software Defined
Radio Networks (SDR) 2006, pp. 110-119, Sep. 2006.
[5] S. Haykin, Cognitive radio: Brain-empowered wireless
communications," IEEEJ. Selected. Areas of
Communications, vol.23, no.2, pp. 201-220, Feb 2005.
[6] S. Anand, Z. Jin, K. P. Subbalakshmi, “An analytical
model for primary user emulation attacksin cognitive radio
networks,” To appear in Proc., IEEE symposium of New
Frontiers in Dynamic Spectrum Access Networks
(DySPAN) , Oct.2008.
[7] Author-Alexandros G. Fragkiadakis, Elias Z. Tragos,
Ioannis G. Askoxylakis “A Survey on Security Threats and
Detection Techniques in Cognitive Radio Networks” IEEE
Communications Surveys & Tutorials, Accepted For
Publication July-2012
[8]T. Aysal, S. Kandeepan, and R. Piesewicz, “Cooperative
Spectrum Sensing with Noisy Hard Decision
Transmissions,” in Proc. ICC, 2009, pp. 1–5.
[9] Y. Chen, “Collaborative spectrum sensing in the
presence of secondary user interferences for lognormal
shadowing,” Wireless Communications and Mobile
Computing, 2010.
[10] Z. Jin, S. Anand, K. P. Subbalakshmi, “Mitigating
Primary User Emulation Attacks in Dynamic Spectrum
Access Networks using Hypothesis Testing,” Mobile
Computing and Communications Review, vol. 13, no. 2, 200
Sandeep Bhaurao Thakre have completed
diploma from Nagpur poly. Nagpur in
Electronics & Communication at 2004, BE
from Government college Nanded i.e. Shri
Guru GobindSinghaji College of Engineering
& Technology Nanded in Electronics &
Telecommunication at 2007, now persuingM.Tech from
Sagar Institute of Research & Technology Bhopal

More Related Content

PDF
Smart phone as a cloud server machine computing framework
PDF
50120140502006
PDF
A survey on hiding user privacy in location based services through clustering
PDF
Ivrs based news extracting system
PDF
Ivrs based news extracting system
PDF
Thesis
PDF
Comparative review study of security of aran and aodv routing protocols in ma...
PDF
SURVEY ON MOBILE AD HOC NETWORK
Smart phone as a cloud server machine computing framework
50120140502006
A survey on hiding user privacy in location based services through clustering
Ivrs based news extracting system
Ivrs based news extracting system
Thesis
Comparative review study of security of aran and aodv routing protocols in ma...
SURVEY ON MOBILE AD HOC NETWORK

What's hot (16)

PDF
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
PDF
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
PDF
Secure Data Sharing with ABE in Wireless Sensor Networks
PDF
Secure signature based cedar routing in mobile adhoc networks
PDF
Bi33349355
PDF
Secure and efficient handover authentication and detection of spoofing attack
PDF
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
PDF
Wireless sensor networks architecture security requirements security threats...
PDF
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
PDF
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
PDF
The proposed System for Indoor Location Tracking
PDF
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
PDF
Introduction to Mobile adhoc-network
PDF
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
PDF
Wireless Micro-Sensor Network Models
PDF
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
Secure Data Sharing with ABE in Wireless Sensor Networks
Secure signature based cedar routing in mobile adhoc networks
Bi33349355
Secure and efficient handover authentication and detection of spoofing attack
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
Wireless sensor networks architecture security requirements security threats...
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
The proposed System for Indoor Location Tracking
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
Introduction to Mobile adhoc-network
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Wireless Micro-Sensor Network Models
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Ad

Viewers also liked (19)

PDF
Usage of regular expressions in nlp
PDF
Performance evaluation of tcp sack1 in wimax network asymmetry
PDF
Numerical parametric study on interval shift variation in simo sstd technique...
PDF
Statistical analysis to identify the main parameters to effecting wwqi of sew...
PDF
A clonal based algorithm for the reconstruction of genetic network using s sy...
PDF
Software as a service for efficient cloud computing
PDF
Assessment of composting, energy and gas generation potential for msw at alla...
PDF
Reliability assessment for a four cylinder diesel engine by employing algebra...
PDF
Survey on securing outsourced storages in cloud
PDF
Assessment of electromagnetic radiations from communication transmission towe...
PDF
Design and manufacturing of drive center mandrel
PDF
A combined approach using triple des and blowfish research area
PDF
An experimental study on mud concrete using soil as a fine aggrgate and ld sl...
PDF
Comparative analysis of dynamic programming algorithms to find similarity in ...
PDF
Design and analysis of bodyworks of a formula style racecar
PDF
History of gasoline direct compression ignition (gdci) engine a review
PDF
The automatic license plate recognition(alpr)
PDF
Eatrhquake response of reinforced cocrete multi storey building with base iso...
PDF
Discrete wavelet transform based analysis of transformer differential current
Usage of regular expressions in nlp
Performance evaluation of tcp sack1 in wimax network asymmetry
Numerical parametric study on interval shift variation in simo sstd technique...
Statistical analysis to identify the main parameters to effecting wwqi of sew...
A clonal based algorithm for the reconstruction of genetic network using s sy...
Software as a service for efficient cloud computing
Assessment of composting, energy and gas generation potential for msw at alla...
Reliability assessment for a four cylinder diesel engine by employing algebra...
Survey on securing outsourced storages in cloud
Assessment of electromagnetic radiations from communication transmission towe...
Design and manufacturing of drive center mandrel
A combined approach using triple des and blowfish research area
An experimental study on mud concrete using soil as a fine aggrgate and ld sl...
Comparative analysis of dynamic programming algorithms to find similarity in ...
Design and analysis of bodyworks of a formula style racecar
History of gasoline direct compression ignition (gdci) engine a review
The automatic license plate recognition(alpr)
Eatrhquake response of reinforced cocrete multi storey building with base iso...
Discrete wavelet transform based analysis of transformer differential current
Ad

Similar to Security threats and detection technique in cognitive radio network with sensing strategies (20)

PDF
Security threats and detection technique in cognitive radio network with sens...
PDF
Security threats and detection technique in cognitive
PDF
Security threats and detection technique in cognitive
PDF
A framework for data traffic in cognitive radio net works using trusted token...
PDF
A framework for data traffic in cognitive radio net works using trusted token...
PDF
Credit risk value based detection of multiple selfish node attacks in cogniti...
PDF
IRJET- Simulating Spectrum Sensing in Cognitive Radio Network using Cyclostat...
PDF
Simulation and analysis of cognitive radio
PDF
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
PDF
Cognitive Radio Networks: a comprehensive study on scope and applications
PDF
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
PDF
Spectral threat in tcp over optical burst switched networks
PDF
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
PDF
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
PDF
E010312832
PDF
Intelligent travelling and home automation aid, for visually impaired
PDF
Design and development of intelligent electronics travelling aid for visually...
PDF
Improvement of quality of service parameters using
PDF
Improvement of quality of service parameters using reinvented fsmac protocol ...
PDF
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive
Security threats and detection technique in cognitive
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
Credit risk value based detection of multiple selfish node attacks in cogniti...
IRJET- Simulating Spectrum Sensing in Cognitive Radio Network using Cyclostat...
Simulation and analysis of cognitive radio
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Cognitive Radio Networks: a comprehensive study on scope and applications
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
Spectral threat in tcp over optical burst switched networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
E010312832
Intelligent travelling and home automation aid, for visually impaired
Design and development of intelligent electronics travelling aid for visually...
Improvement of quality of service parameters using
Improvement of quality of service parameters using reinvented fsmac protocol ...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...

More from eSAT Journals (20)

PDF
Mechanical properties of hybrid fiber reinforced concrete for pavements
PDF
Material management in construction – a case study
PDF
Managing drought short term strategies in semi arid regions a case study
PDF
Life cycle cost analysis of overlay for an urban road in bangalore
PDF
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
PDF
Laboratory investigation of expansive soil stabilized with natural inorganic ...
PDF
Influence of reinforcement on the behavior of hollow concrete block masonry p...
PDF
Influence of compaction energy on soil stabilized with chemical stabilizer
PDF
Geographical information system (gis) for water resources management
PDF
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
PDF
Factors influencing compressive strength of geopolymer concrete
PDF
Experimental investigation on circular hollow steel columns in filled with li...
PDF
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
PDF
Evaluation of punching shear in flat slabs
PDF
Evaluation of performance of intake tower dam for recent earthquake in india
PDF
Evaluation of operational efficiency of urban road network using travel time ...
PDF
Estimation of surface runoff in nallur amanikere watershed using scs cn method
PDF
Estimation of morphometric parameters and runoff using rs & gis techniques
PDF
Effect of variation of plastic hinge length on the results of non linear anal...
PDF
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Mechanical properties of hybrid fiber reinforced concrete for pavements
Material management in construction – a case study
Managing drought short term strategies in semi arid regions a case study
Life cycle cost analysis of overlay for an urban road in bangalore
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of compaction energy on soil stabilized with chemical stabilizer
Geographical information system (gis) for water resources management
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Factors influencing compressive strength of geopolymer concrete
Experimental investigation on circular hollow steel columns in filled with li...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Evaluation of punching shear in flat slabs
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of operational efficiency of urban road network using travel time ...
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of morphometric parameters and runoff using rs & gis techniques
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of use of recycled materials on indirect tensile strength of asphalt c...

Recently uploaded (20)

PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
PPT on Performance Review to get promotions
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
composite construction of structures.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Well-logging-methods_new................
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Welding lecture in detail for understanding
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
UNIT 4 Total Quality Management .pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT on Performance Review to get promotions
Automation-in-Manufacturing-Chapter-Introduction.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
composite construction of structures.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Well-logging-methods_new................
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Internet of Things (IOT) - A guide to understanding
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Welding lecture in detail for understanding
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
UNIT 4 Total Quality Management .pptx

Security threats and detection technique in cognitive radio network with sensing strategies

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ _______________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 591 SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE RADIO NETWORK WITH SENSING STRATEGIES Sandeep Thakre1 , Shruti Dixit2 1 Student, 2 Prof., EC, SIRT, Bhopal, MP, India, Abstract Communication world is growing day by day In wireless communication system introduces a new technology which I known as cognitive radio network its name as CRN. In CRN Un-authorized user can used empty channel from the spectrum band of authorized user this help to improve the spectrum efficiency as well generate a problem like some malicious or fake users can used the channel and hamper the communication. So in this paper we discuss on security threats and technique to find them with sensing strategies Keywords: Cognitive radio network, Pus, SUs, Spectrum sensing, spectrum holes ---------------------------------------------------------------------------------***-------------------------------------------------------- 1. INTRODUCTION Communication is a process of transmitting information from one place to another through the medium information sends in the form of electromagnetic waves through the medium air. Here we see the advances in wireless communication. Cognitive radio network is advancement in wireless communication cognitive means sharing, in Cognitive radio network Un-authorized user can used empty channel from the spectrum band of authorized user. Cognitive Radio Networks (CRNs) is an intelligent network that adapt to changes in their network to make a better use of the spectrum. CRNs solve the spectrum shortage problem by allowing unlicensed users to use spectrum band of licensed user without interference, generally authorized or licensed users known as primary users and un-authorized or un-licensed users known as secondary users. When data or information send by authorized or primary user here primary user not used total band some of them are free these empty channels are allowed to used by un-authorized or secondary users .Secondary users always observe the activities of primary user, and when secondary user detect the empty channel and occupy the channel without disturbing the primary user. When the primary users are sending information or it is active, the secondary user should either avoid using the channel. An Empty channel also known as spectrum holes. A spectrum hole is a band of frequencies assigned to a primary user, but at a particular time and specific geographic location, the band is not being utilized by that user. [2].Figure-1 shows the basic structure of cognitive radio network. In this secondary user occupy the space called white space of primary user band which is under-utilized. Normally primary user has own communication area, in which secondary user utilized the empty channel without any interference 1.1Basic Cognitive Radio Network Fig.1 Basic cognitive radio network Figure-1 shows the architecture of cognitive radio cycle. When a primary user (PU) transmits data signal from a licensed spectrum band, it may be possible that it use only few channels of spectrum other channels are empty. These empty channels are sensed by secondary user (SU) which has no license for using this spectrum. Firstly secondary users sensed the spectrum andsend the information of spectrum holes to the SU’s. SU analyses the spectrum that PU ever uses these channels or not, because sometime PU use the empty channels which they not use before operation. After spectrum analysis SU’s decide how many channels they required to send their data signal 1.2 Spectrum Sensing Technique It is very important in Cognitive radio network that secondary user properly sense the empty spectrum band. In this paper we use energy sensing technique. But first look into the original bit sequences of primary and secondary
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ _______________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 592 . Fig2:Original bit sequence of primary user. Figure23 shows bit sequence of primary user , whose data is send in the form of bits, but there is some holes as shown in figure as a gap in between two BPSK modulated signals. This signal gaps is nothing but an empty channels or spectrum holes. Fig 3 Original bit sequence of Secondary User In figure 3 shows bit sequence of secondary user, we use Energy spectrum technique and find the spectrum holes or empty channel without interfering or disturbing the licensed user or primary user. In this Energy Spectrum Sensing techniques, secondary user or un-licensed user analyze the channel whether the channel have some data packets or not, if its energy level is zero then they decided that the spectrum is empty, and SU’s easily send their data to the desired receiver. 2. THREATS OF COGNITIVE RADIO NETWORK PUEs or Primary User Emulsion Attack: Primary user emulsion attack means when primary user send data secondary user continuously monitor the channel. When primary sends data it means channel busy, secondary knows this by using energy spectrum sensing technique but primary not send continuously When it is ideal or not busystate secondary sense channel and send data but when primary requires channel then sold the control. But if somewhere else malicious or fake secondary user work as primary and wants control of channel and secondary send data at same time malicious user behaves as primary so secondary sold control and not send data such attack referred as primary user emulsion attack.Additional fake or malicious secondary users, may use a primary user emulation attacks to take advantage of the secondary user's ability to avoid primary users and cause excessive and unexpected disruptions to communications.[10] A fundamental characteristic of a CR is its ability for spectrum sensing, as it shall use the spectrum in an opportunistic manner. This means that the CR has to vacate a currently used spectrum band if an incumbent signal is detected. In this case, CR’s perform spectrum hand-off seeking for different spectrum holes for transmissions. Performing spectrum hand-off very often results in degradation of the CR performance since more time for sensing of the spectrum is required, and this decreases the available time for accessing the spectrum.[3] Fig4 Fig5 Figure 4&5 shows Primary User Signals and Secondary User Signals for Primary User Emulsion Attack in Cognitive Radio Network. This figure shows 18000 samples for the simulation with 2 BPSK.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ _______________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 593 5 N R 1 4 7 10 13 16 19 B E R 0.18 77 0.19 07 0.18 81 0.181 7 0.16 97 0.16 24 0.1 57 6 This figure 6 shows the Bit error rate reduced continuously when Primary User Emulsion Attack occurred in network. 3. CONCLUSION Through this paper, we practically find the threats from the wireless communication environment and sense the empty spectrum band through Energy sensing technique. Because of the practical approach of a secondary user which sense an empty channel and send their data packets without disturbing the authorized user. In this we work on two types of threats like primary user emulation attack and jamming attack .These two are the major threats of cognitive radio network wireless communication environment. Jamming is the common attack of wireless communication. It is similar to Denial of Service (DoS) attack. In future we willimprove the work on cognitive radio network and try to practically work on the security of threats. REFERENCES [1]F. Akyildiz, W. Lee, M. C. Vuran, S. Mohanty, “A survey on spectrum Management in Cognitive Radio Networks,” IEEE Communications Magazine, April 2008. [2] Chetan N. Mathur, K.P. Subhalakshami, “Security issues in cognitive radio netwroks,” Cognitive network: Towards Self-Aware Networks, 2007. [3] X. Zhang, C. Li, “Constructing secure cognitive wireless networks experiences and challenges,” Wireless Communications and Mobile Computing, vol. 10, pp. 55-69. 2009. [4]R. Chen and J. Park “Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks,” Proc., IEEE workshop on Networking Technol. For Software Defined Radio Networks (SDR) 2006, pp. 110-119, Sep. 2006. [5] S. Haykin, Cognitive radio: Brain-empowered wireless communications," IEEEJ. Selected. Areas of Communications, vol.23, no.2, pp. 201-220, Feb 2005. [6] S. Anand, Z. Jin, K. P. Subbalakshmi, “An analytical model for primary user emulation attacksin cognitive radio networks,” To appear in Proc., IEEE symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN) , Oct.2008. [7] Author-Alexandros G. Fragkiadakis, Elias Z. Tragos, Ioannis G. Askoxylakis “A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks” IEEE Communications Surveys & Tutorials, Accepted For Publication July-2012 [8]T. Aysal, S. Kandeepan, and R. Piesewicz, “Cooperative Spectrum Sensing with Noisy Hard Decision Transmissions,” in Proc. ICC, 2009, pp. 1–5. [9] Y. Chen, “Collaborative spectrum sensing in the presence of secondary user interferences for lognormal shadowing,” Wireless Communications and Mobile Computing, 2010. [10] Z. Jin, S. Anand, K. P. Subbalakshmi, “Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing,” Mobile Computing and Communications Review, vol. 13, no. 2, 200 Sandeep Bhaurao Thakre have completed diploma from Nagpur poly. Nagpur in Electronics & Communication at 2004, BE from Government college Nanded i.e. Shri Guru GobindSinghaji College of Engineering & Technology Nanded in Electronics & Telecommunication at 2007, now persuingM.Tech from Sagar Institute of Research & Technology Bhopal