Countermeasures to Security Threats/Attacks on Different Protocol Layers in Cognitive Radio Networks: An Overview

被引:0
作者
Raj, Shekhar [1 ]
Sahu, O. P. [1 ]
机构
[1] Natl Inst Technol, Dept Elect & Commun, Kurukshetra, Haryana, India
来源
PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON) | 2017年
关键词
cognitive radios; cognitive radio networks; primary user; secondary user; security threats/attacks; protocol layers; malicious user; ATTACK;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cognitive Radio (CR) is a revolutionary technology which allows the unlicensed user to co-exist along with licensed user. It complements the wireless device by helping in improving its efficiency, reliability, and speed. New security threats have being lifted along with the understanding of cognitive radio, which thereby degrades the performance of cognitive radio. There has been a remarkable growth in security threats prevailing in CR Network (CRN) and also there countermeasure in the past decade. The main objective of this work is to protect CRN from both malicious user and licensed user. Specifically, we present various countermeasures against all possible attacks and threats in different protocol layers in CRN. The various security approaches on different protocol layers can be summarized as using error correcting codes, spread spectrum techniques, cryptographic algorithms and MAC layer admission control mechanism. With this paper, reader can have a clear idea about various countermeasures against attacks on different protocol layer and also about the research trends in this area.
引用
收藏
页码:1076 / 1082
页数:7
相关论文
共 50 条
  • [21] Unified layered Security Architecture for Cognitive Radio Networks
    Zhu, Li
    Mao, Huaqing
    2011 ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2011,
  • [22] Fault Tolerant Routing Protocol in Cognitive Radio Networks
    Santosh Kumar
    Awadhesh Kumar Singh
    Wireless Personal Communications, 2019, 107 : 679 - 694
  • [23] Fault Tolerant Routing Protocol in Cognitive Radio Networks
    Kumar, Santosh
    Singh, Awadhesh Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (01) : 679 - 694
  • [24] An Effective Secure MAC Protocol for Cognitive Radio Networks
    Al-Amri, Bayan
    Sami, Gofran
    Alhakami, Wajdi
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 42 (01): : 133 - 148
  • [25] An Enhanced Synchronized MAC Protocol for Cognitive Radio Networks
    Joshi, Gyanendra Prasad
    Kim, Sung Won
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [26] Improving physical-layer security for primary users in cognitive radio networks
    Xu, Ding
    Li, Qun
    IET COMMUNICATIONS, 2017, 11 (15) : 2303 - 2310
  • [27] An Overview of Primary User Emulation Attack in Cognitive Radio Networks
    Gupta, Ishu
    Sahu, O. P.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 27 - 31
  • [28] Application of reinforcement learning for security enhancement in cognitive radio networks
    Ling, Mee Hong
    Yau, Kok-Lim Alvin
    Qadir, Junaid
    Poh, Geong Sen
    Ni, Qiang
    APPLIED SOFT COMPUTING, 2015, 37 : 809 - 829
  • [29] CORPL: A Routing Protocol for Cognitive Radio Enabled AMI Networks
    Aijaz, Adnan
    Su, Hongjia
    Aghvami, Abdol-Hamid
    IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (01) : 477 - 485
  • [30] A novel routing protocol for cognitive radio networks with cooperation process
    Kim, Sunwoo
    Pyeon, Dohoo
    Jang, Ingook
    Yoon, Hyunsoo
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 3860 - 3875