A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions

被引:208
作者
Attar, Alireza [1 ]
Tang, Helen [2 ,3 ]
Vasilakos, Athanasios V. [4 ,5 ]
Yu, F. Richard [2 ]
Leung, Victor C. M. [1 ]
机构
[1] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
[2] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[3] Def R&D Canada, Secure Mobile Networking Grp, Ottawa, ON, Canada
[4] Univ Western Macedonia, Dept Comp & Telecommun Engn, GR-50100 Kozani, Greece
[5] Natl Tech Univ Athens NTUA, Dept Elect & Comp Engn, Athens 15780, Greece
关键词
Cognitive radio (CR); denial of service (DoS); incumbent emulation; security; spectrum sensing data falsification (SSDF); AD HOC NETWORKS; CAPACITY; SYSTEMS;
D O I
10.1109/JPROC.2012.2208211
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this survey, we present a comprehensive list of major known security threats within a cognitive radio network (CRN) framework. We classify attack techniques based on the type of attacker, namely exogenous (external) attackers, intruding malicious nodes and greedy cognitive radios (CRs). We further discuss threats related to infrastructure-based CRNs as well as infrastructure-less networks. Besides the short-term effects of attacks over CRN performance, we also discuss the often ignored longer term behavioral changes that are enforced by such attacks via the learning capability of CRN. After elaborating on various attack strategies, we discuss potential solutions to combat those attacks. An overview of robust CR communications is also presented. We finally elaborate on future research directions pertinent to CRN security. We hope this survey paper can provide the insight and the roadmap for future research efforts in the emerging field of CRN security.
引用
收藏
页码:3172 / 3186
页数:15
相关论文
共 79 条
[1]   Optimality of Myopic Sensing in Multichannel Opportunistic Access [J].
Ahmad, Sahand Haji Ali ;
Liu, Mingyan ;
Javidi, Tara ;
Zhao, Qing ;
Krishnamachari, Bhaskar .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (09) :4040-4050
[2]   Jamming in Wireless Networks Under Uncertainty [J].
Altman, Eitan ;
Avrachenkov, Konstantin ;
Garnaev, Andrey .
MOBILE NETWORKS & APPLICATIONS, 2011, 16 (02) :246-254
[3]  
[Anonymous], 2009, P IEEE MILCOM 2009
[4]  
[Anonymous], 2005, P 6 ACM INT S MOB AD, DOI DOI 10.1145/1062689.1062697
[5]  
[Anonymous], SCC41P19006 IEEE
[6]  
[Anonymous], 2008, 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications. CrownCom 2008
[7]   BIOlogically-inspired Spectrum Sharing in cognitive radio networks [J].
Atakan, Baris ;
Akan, Oezguer B. .
2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, :43-48
[8]   Cognitive Radio Game for Secondary Spectrum Access Problem [J].
Attar, Alireza ;
Nakhai, Mohammad Reza ;
Aghvami, A. Hamid .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (04) :2121-2131
[9]  
Attar AR, 2004, LECT NOTES COMPUT SC, V3124, P106
[10]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+