A Survey on Security in Cognitive Radio Networks

被引:0
作者
Khasawneh, Mahmoud [1 ]
Agarwal, Anjali [1 ]
机构
[1] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
来源
2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT) | 2014年
关键词
Cognitive radio; Security; Attack; Primary User (PU); Secondaty User (SU);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access the frequency bands when licensed users which are referred to as primary users (PUs) are inactive. One important technical area that has received little attention to date in the cognitive radio system is wireless security. New classes of security threats and challenges have been introduced in the cognitive radio systems, and providing strong security may prove to be the most difficult aspect of making cognitive radio a longterm commercially-viable concept. This paper addresses the main challenges, security attacks and their mitigation techniques in cognitive radio networks. The attacks showed are organized based on the protocol layer that an attack is operating on.
引用
收藏
页码:64 / 70
页数:7
相关论文
共 22 条
[1]   Distributed Approach for Power and Rate Allocation to Secondary Users in Cognitive Radio Networks [J].
Akter, Lutfa ;
Natarajan, Balasubramaniam .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (04) :1526-1538
[2]  
Akyildiz I., 2006, OFDM BASED COGNITIVE
[3]  
Alrabaee S., 2012, GC 12 WORKSH MENS 20
[4]  
[Anonymous], 1999, 1999 IEEE INT WORKSH
[5]  
[Anonymous], J INTERNET TECHNOLOG
[6]  
[Anonymous], 2009, P IEEE INT C COMM IC
[7]  
[Anonymous], COGNITIVE NETWORKS S
[8]   Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack [J].
Chen, Chao ;
Cheng, Hongbing ;
Yao, Yu-Dong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (07) :2135-2141
[9]   Is allowing trading enough? Making secondary markets in spectrum work [J].
Crocioni, Pietro .
TELECOMMUNICATIONS POLICY, 2009, 33 (08) :451-468
[10]  
Feng Lin, 2011, NAECON 2011 - IEEE National Aerospace and Electronics Conference, P324, DOI 10.1109/NAECON.2011.6183125