I. Introduction
Cognitive radio enabled dynamic spectrum access (DSA) networks [1]–[3] allow unlicensed “secondary users” to access the spectrum bands unused by licensed “primary users” to improve spectrum utilization. The secondary users evacuate the spectrum bands upon the return of the primary users. This spectrum etiquette could be exploited by malicious users to mount a DSA specific attack called primary user emulation attack (PUEA) [4]. In such an attack, a set of malicious secondary users transmit signals whose characteristics resemble that of the primary transmitter, misleading the good secondary users to believe that the primary user is active and evacuate the spectrum unnecessarily.