Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Entire DC Network
Primary User Emulation Attacks In Cognitive Radio - An Experimental Demonstration And Analysis, Benjamin James Ealey
Primary User Emulation Attacks In Cognitive Radio - An Experimental Demonstration And Analysis, Benjamin James Ealey
Masters Theses
Cognitive radio networks rely on the ability to avoid primary users, owners of the frequency, and prevent collisions for effective communication to take place. Additional malicious secondary users, jammers, may use a primary user emulation attacks to take advantage of the secondary user's ability to avoid primary users and cause excessive and unexpected disruptions to communications. Two jamming/anti-jamming methods are investigated on Ettus Labs USRP 2 radios. First, pseudo-random channel hopping schemes are implemented for jammers to seek-and-disrupt secondary users while secondary users apply similar schemes to avoid all primary user signatures. In the second method the jammer uses adversarial …