Title: A multi-states continuous time Markov chain model for secondary spectrum access in dynamic spectrum access networks

Authors: Hui Sun; Chuang Yang; Rui Wang; Sabir Ghauri

Addresses: College of Information Engineering and Automation, Civil Aviation University of China, Tianjin 300300, China; Department of Engineering Design and Mathematics, University of the West of England, Frenchy Campus, Coldharbour Lane, Bristol, BS16 1QY, UK ' College of Information Engineering and Automation, Civil Aviation University of China, Tianjin 300300, China ' College of Information Engineering and Automation, Civil Aviation University of China, Tianjin 300300, China ' Department of Engineering Design and Mathematics, University of the West of England, Frenchy Campus, Coldharbour Lane, Bristol, BS16 1QY, UK

Abstract: Dynamic Spectrum Access (DSA) networks are vulnerable to hackers who normally pretend themselves to be the primary users and called the Primary User Emulation Attack (PUEA). Research communities have already reported a vast use of PUEA in the existing research. Other potential attackers such as greedy users should not be ignored when investigating the dynamic spectrum access networks. In this paper, we propose a multi-states Continuous Time Markov Chain (CTMC) model to describe the behaviour of DSA, analysis of the channel states and discussion on the impacts of normal, normal greedy and greedy malicious users in DSA network. The CTMC model is simulated and the simulation results have been discussed and validated by comparing with the existing models. Finally, it is proved that CTMC model is an improved method to analyse the performance of the DSA networks when PUEA occurs.

Keywords: dynamic spectrum access; continuous time Markov chain; primary user emulation attack; malicious user; greedy user.

DOI: 10.1504/IJCAT.2019.102843

International Journal of Computer Applications in Technology, 2019 Vol.61 No.3, pp.143 - 151

Received: 22 Oct 2018
Accepted: 23 Nov 2018

Published online: 08 Oct 2019 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article