Spectrum Sharing Security and Attacks in CRNs: a Review
نویسندگان
چکیده
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges. Keywords—Dynamic Spectrum Access; Spectrum Sharing; Common Control Channel; Cognitive Radio Networks
منابع مشابه
A Survey on the Communication Protocols and Security in Cognitive Radio Networks
A cognitive radio (CR) is a radio that can change its transmission parameters based on the perceived availability of the spectrum bands in its operating environment. CRs support dynamic spectrum access and can facilitate a secondary unlicensed user to efficiently utilize the available underutilized spectrum allocated to the primary licensed users. A cognitive radio network (CRN) is composed of ...
متن کاملGreen Cooperative Web of Trust for Security in Cognitive Radio Networks
Spectrum is a scarce and very essential resource for the ever growing mobile communication applications. Radio networks (CRN) is the best evolved solution towards spectrum scarcity. Cooperative spectrum sensing is a well-known and proven mechanism in the CRNs.As compared to other traditional wireless networks, CRNs are more delicate and open to the wireless environments due to their heterogeneo...
متن کاملCognitive Radio Networks and Security: A Survey
In cognitive radio networks (CRNs), cognitive radio (CR) nodes adaptively access the spectrum aiming to maximize the utilization of the scarce resource. Crucial to the successful deployment of CRNs, security issues have begun to receive research interests recently. This article surveys the research advances in CRNs. First, the fundamentals of CRNs including the basic components (i.e., character...
متن کاملSecure Transmission of Underlay Cognitive Radio with Passive Eavesdropping
The security in cognitive radio networks (CRNs) has attracted recently a significant attention due to the open environment of the spectrum sharing networks, which make them more vulnerable to wireless attacks. In this paper, we consider the problem of physical layer security in CRNs. Our objective is to enhance the secrecy performance of the secondary user (SU) in the presence of passive eavesd...
متن کاملThe Security of Physical Layer in Cognitive Radio Networks
—Cognitive Radio (CR) is a novel technology that promises to solve the lack of spectrum by allowing secondary users to use licensed band, so that they can coexist with primary users without causing interference to their communications. With the development of CR, extending to the level of network, cognitive radio networks (CRNs) emerge as the times require. Nowadays the operational aspects of ...
متن کامل