Security in Cognitive Radio Networks - A Survey

被引:0
|
作者
Sumathi, A. C. [1 ]
Vidhyapriya, R. [2 ]
机构
[1] Sri Shakthi Inst Engn & Tech, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
[2] PSG Coll Technol, Dept Informat Technol, Coimbatore, Tamil Nadu, India
关键词
Cognitive Radio; Primary User Emulation attack; Primary user signal detection; IEEE; 802.22; standard; SpiderRadio;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cognitive radio is a new technology which compliments the wireless devices by improving the efficiency, speed and reliability. There is always a huge demand for the spectrum usage as the availability of the radio spectrum is limited. Cognitive radio technology is seen as a potential solution to the efficient utilization of available spectrum by the unlicensed legitimate users. One of the major threats of cognitive radio network is the Primary User Emulation attack. In this paper a survey of Cognitive Radio techniques with its IEEE 02.22 standard, various defensive methods against PUE attack, primary signal detection methods and the features of SpiderRadio, a cognitive radio device are presented.
引用
收藏
页码:114 / 118
页数:5
相关论文
共 50 条
  • [1] A Survey on Security in Cognitive Radio Networks
    Khasawneh, Mahmoud
    Agarwal, Anjali
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 64 - 70
  • [2] Survey of Security Issues in Cognitive Radio Networks
    El-Hajj, Wassim
    Safa, Haidar
    Guizani, Mohsen
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (02): : 181 - 198
  • [3] A Survey of Security Issues in Cognitive Radio Networks
    LI Jianwu
    FENG Zebing
    FENG Zhiyong
    ZHANG Ping
    [J]. China Communications, 2015, 12 (03) : 132 - 150
  • [4] A Survey of Security issues in Cognitive Radio Networks
    Li Jianwu
    Feng Zebing
    Feng Zhiyong
    Zhang Ping
    [J]. CHINA COMMUNICATIONS, 2015, 12 (03) : 132 - 150
  • [5] Recent Security Issues on Cognitive Radio Networks: A Survey
    Holcomb, Sterling
    Rawat, Danda B.
    [J]. SOUTHEASTCON 2016, 2016,
  • [6] Survey of Security Threats and Attacks in Cognitive Radio Networks
    Chauhan, Kamal Kumar
    Sanger, Amit Kumar Singh
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [7] A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks
    Fragkiadakis, Alexandros G.
    Tragos, Elias Z.
    Askoxylakis, Ioannis G.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 428 - 445
  • [8] Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey
    Sharma, Rajesh K.
    Rawat, Danda B.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02): : 1023 - 1043
  • [9] Security in Cognitive Radio Networks
    Akin, Sami
    [J]. 2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2014,
  • [10] Security in Cognitive Radio Networks
    Ren, Kui
    Zhu, Haojin
    Han, Zhu
    Poovendran, Radha
    [J]. IEEE NETWORK, 2013, 27 (03): : 2 - 3