Cognitive Radio Network: Security Enhancements
نویسندگان
چکیده
Reference to the latest developments the spectrum shortage problems are because of the wireless communication. For the future networks the most practical, scientific and systematic challenges is the use of licensed or unlicensed wireless networks with opportunistic use of the spectrum with, without and limited rules. Since different wireless networks are using different frequency bands. So there is a need to use lessening bands when there is no activity on them. Cognitive radio is a new technology which leads to solve these problems through dynamically utilization of rules and spectrum. Several spectrum sharing schemes have been proposed. Now a day’s security in cognitive radio network becomes a major and challenging issue, and chances are prearranged to the attackers in cognitive radio technology as compared to the wireless networks in a general form. In cognitive radio, mobile station equipment may switch to any available frequency band, as it makes a list of available free channel and make handoff decision accordingly. So whenever handoff is made whether soft or hard there will be a chance that malicious attacker may hack ongoing traffic or he may even interrupt established traffic by imitating any kind of passive or active attack like interception, spoofing denial of service etc. This paper explore the key challenges to provide security in cognitive radio networks, and discusses the current security carriage of emerging IEEE 802.22 cognitive radio typical and recognizes security threats and vulnerabilities along with the countermeasures and solutions.
منابع مشابه
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect the mobile users, the radio access network, the fixed part of the network, and the related data of GPRS are presented and analyzed in details. This analysis reveals the security weaknesses of the applied measures that ma...
متن کاملResearch and Analysis on Cognitive Radio Network Security
This paper firstly gives a detail analysis on the security problems faced in cognitive radio network, and introduces the basic issues about cognitive radio network. Then, according to the differences between cognitive radio network and existing wireless network, it analyses and discusses the dynamic spectrum access security and artificial intelligence. Finally, it draws a conclusion to security...
متن کاملAn Advanced Security Enhancements for Cognitive Radio Networks with Trust Management
The distinctive features of Cognitive radios (CR) , including dynamic topology and open wireless medium, may lead CR suffering from many security vulnerabilities. In the proposed trust management scheme, the trust model has two components: trust from direct observation and trust from indirect observation. With direct observation from an observer node, the trust value is derived using Bayesian i...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کامل