On Physical Layer Security for Cognitive Radio Networks

被引:140
作者
Shu, Zhihui [1 ]
Qian, Yi [2 ]
Ci, Song [1 ]
机构
[1] Univ Nebraska Lincoln, Lincoln, NE USA
[2] Univ Nebraska Lincoln, Dept Comp & Elect Engn, Lincoln, NE USA
来源
IEEE NETWORK | 2013年 / 27卷 / 03期
基金
美国国家科学基金会;
关键词
ATTACKS;
D O I
10.1109/MNET.2013.6523805
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article we explore the security issues on physical layer for cognitive radio networks. First we give an overview on several existing security attacks to the physical layer in cognitive radio networks. We then discuss the related countermeasures on how to defend against these attacks. We further investigate one of the most important physical layer security parameters, the secrecy capacity of a cognitive radio network, and study the outage probability of secrecy capacity of a primary user from a theoretical point of view. Furthermore, we present performance results for secrecy capacity and outage probability between a node and its neighbors. Our work summarizes the current advances of the physical layer security and brings insights on physical layer security analysis in cognitive radio networks.
引用
收藏
页码:28 / 33
页数:6
相关论文
共 15 条
[1]   NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey [J].
Akyildiz, Ian F. ;
Lee, Won-Yeol ;
Vuran, Mehmet C. ;
Mohanty, Shantidev .
COMPUTER NETWORKS, 2006, 50 (13) :2127-2159
[2]  
[Anonymous], 2005, Wireless Communications
[3]  
[Anonymous], 2008, 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications. CrownCom 2008
[4]   Toward secure distributed spectrum sensing in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min ;
Hou, Y. Thomas ;
Reed, Jeffrey H. .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) :50-55
[5]   Defense against primary user emulation attacks in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min ;
Reed, Jeffrey H. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) :25-37
[6]  
El-Hajj W., 2011, J INTERNET TECHNOL, V12, P25
[7]   Link adaptation for physical layer security over wireless fading channels [J].
Khodakarami, H. ;
Lahouti, F. .
IET COMMUNICATIONS, 2012, 6 (03) :353-362
[8]  
Kingman J. F. C., 1993, Poisson processes
[9]  
Konings Bastian, PHY MAC LAYER SECURI
[10]   Securing cognitive radio networks [J].
Leon, O. ;
Hernandez-Serrano, J. ;
Soriano, M. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2010, 23 (05) :633-652