Cognitive Radio Networks Security Threats and Attacks: A Review

نویسندگان

  • Suchismita Bhattacharjee
  • Roshni Rajkumari
  • Ningrinla Marchang
  • Brian Sadler
  • T. Charles Clancy
چکیده

Cognitive Radio (CR) is a technology that promises to solve the spectrum shortage problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It aims to improve the utilization of the radio spectrum. Although the operational aspects of CR are being explored widely, its security aspects have gained little attention. In this survey, we present a comprehensive list of major known security threats and

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spectrum Sharing Security and Attacks in CRNs: a Review

Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive r...

متن کامل

Simulation framework for security threats in cognitive radio networks

Along with Cognitive Radio Networks are been developed, to design optimistic security mechanisms is becoming a big challenge. This paper proposes a taxonomy of attacks on Cognitive Radio Networks. This will help researches in the area to better understand the security problems and design more optimistic countermeasures. A new simulation framework for security threats has been developed to check...

متن کامل

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

An Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks

While cognitive radio networks (CRNs) present a promising solution to solve the scarcity of the radio spectrum, they are still susceptible to security threats. Until now, only a few researchers considered the use of intrusion detection systems (IDSs) to combat these threats against CRNs. In this article, we describe a CRN based on IEEE wireless regional area network (WRAN) and describe some of ...

متن کامل

A Survey of Various Defense Techniques to Detect Primary User Emulation Attacks

With the advancement in wireless technology, there is an increasing problem of spectrum scarcity. To resolve this issue, a technology called Cognitive Radio (CR), based on Joseph Mitola’s Software Defined Radio (SDR) was introduced, in which the secondary users can sense the spectrum and utilize the licensed bands when the spectrum is not being utilized by the primary user. Because of its wirel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014