Securing cognitive radio networks

被引:71
作者
Leon, O. [2 ]
Hernandez-Serrano, J. [2 ]
Soriano, M. [1 ,2 ]
机构
[1] CTTC, Barcelona, Spain
[2] Univ Politecn Cataluna, Dept Telemat, Barcelona, Spain
关键词
cognitive radio; cognitive radio network; security; INTRUSION DETECTION; WIRELESS;
D O I
10.1002/dac.1102
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio device uses general purpose computer processors that run radio applications software to perform signal processing. The use of this software enables the device to sense and understand its environment and actively change its mode of operation based on its observations. Unfortunately, this solution entails new security challenges. Our objective in this paper is to analyze the security issues of the main recent developments and architectures of cognitive radio networks. We present vulnerabilities inherent to those systems, identify novel types of abuse, classify attacks, and analyze their impact on the operation of cognitive radio-based systems. Moreover, we discuss and propose security solutions to mitigate such threats. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:633 / 652
页数:20
相关论文
共 38 条
  • [11] DRMSUMNet: New directions in wireless networking using coordinated dynamic spectrum access
    Buddhikot, MM
    Kolodzy, P
    Miller, S
    Ryan, K
    Evans, J
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 78 - 85
  • [12] Burbank Jack L., 2008, 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008), P1, DOI 10.1109/CROWNCOM.2008.4562536
  • [13] Implementation issues in spectrum sensing for cognitive radios
    Cabric, D
    Mishra, SM
    Brodersen, RW
    [J]. CONFERENCE RECORD OF THE THIRTY-EIGHTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2, 2004, : 772 - 776
  • [14] Defense against primary user emulation attacks in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Reed, Jeffrey H.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) : 25 - 37
  • [15] Ensuring trustworthy spectrum sensing in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    [J]. 2006 1ST IEEE WORKSHOP ON NETWORKING TECHNOLOGIES FOR SOFTWARE DEFINED RADIO NETWORKS, 2006, : 110 - +
  • [16] Cordeiro C., 2006, Journal of Communications, V1, P38, DOI 10.4304/jcm.1.1.38-47
  • [17] The Sybil attack
    Douceur, JR
    [J]. PEER-TO-PEER SYSTEMS, 2002, 2429 : 251 - 260
  • [18] Goff T., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P1537, DOI 10.1109/INFCOM.2000.832552
  • [19] HERNANDEZSERRAN.J, 2008, J INFORM SCI ENG JIS, V24, P1629
  • [20] LACOSTE M, 2007, AUTONOMIC SECURITY 3