Masters Theses
Date of Award
8-2011
Degree Type
Thesis
Degree Name
Master of Science
Major
Electrical Engineering
Major Professor
Husheng Li
Committee Members
Paul Crilly, Aly Fathy
Abstract
Cognitive radio networks rely on the ability to avoid primary users, owners of the frequency, and prevent collisions for effective communication to take place. Additional malicious secondary users, jammers, may use a primary user emulation attacks to take advantage of the secondary user's ability to avoid primary users and cause excessive and unexpected disruptions to communications. Two jamming/anti-jamming methods are investigated on Ettus Labs USRP 2 radios. First, pseudo-random channel hopping schemes are implemented for jammers to seek-and-disrupt secondary users while secondary users apply similar schemes to avoid all primary user signatures. In the second method the jammer uses adversarial bandit algorithms to avoid channels already heavily disrupted from primary user communications and concentrate efforts on channels heavily populated by secondary user communications. In addition the secondary users apply similar methods to avoid channels heavily occupied by jammers and primary users. The performance of these users is compared with and without the algorithm through channel delay, impact of algorithm on probability density functions, and user collision rate. Conclusions on made on the effectiveness of each technique.
Recommended Citation
Ealey, Benjamin James, "Primary User Emulation Attacks in Cognitive Radio - An Experimental Demonstration and Analysis. " Master's Thesis, University of Tennessee, 2011.
https://trace.tennessee.edu/utk_gradthes/967