Cognitive Radio Network Security Threats: A Review

被引:0
|
作者
Mishra, Nikita [1 ]
Srivastava, Sumit [2 ]
Sharan, Shivendra Nath [3 ]
机构
[1] Manipal Univ Jaipur, Dept Elect & Commun, Jaipur, Rajasthan, India
[2] Manipal Univ Jaipur, Dept Informat Technol, Jaipur, Rajasthan, India
[3] NIIT Univ, Dept Elect & Commun, Neemrana, India
关键词
Cognitive Radio Network; attack; security and spectrum;
D O I
10.1109/icct46177.2019.8969053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Overcrowded ISM band and inefficient spectrum utilization at a licensed band lead to the development of Cognitive Radio Network. It is an intelligent wireless technology capable of learning and adapting changes in surrounding environment parameters. However, the security of Cognitive radio restricts its widespread application. In addition to traditional wireless network security threats, cognitive radios are vulnerable to new threats posed by flexible spectrum allocation policy. Various attacks are targeting the physical, MAC, network, transport and application layers of a protocol stack. There is a need to have an excellent knowledge of the attacker's characteristics for secure and robust Cognitive Radio deployment. This paper meticulously recaps the security hazards posed to the cognitive radio network at various layers. Also, we have summarized attacks according to protocol layer and security requirements in a tabular format.
引用
收藏
页码:333 / 338
页数:6
相关论文
共 50 条
  • [1] A Review on Security Threats in Cognitive Radio
    Banerjee, Abhinaba
    Das, Sushanta
    2014 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE), 2014,
  • [2] A Review on Recent Advances in Spectrum Sensing, Energy Fifficiency and Security Threats in Cognitive Radio Network
    Sharma, Girraj
    Sharma, Ritu
    2015 INTERNATIONAL CONFERENCE ON MICROWAVE, OPTICAL AND COMMUNICATION ENGINEERING (ICMOCE), 2015, : 114 - 117
  • [3] Security Threats in Cognitive Radio Networks
    Zhang, Yuan
    Xu, Gaochao
    Geng, Xiaozhong
    HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 1036 - 1041
  • [4] Security in cognitive radio networks: Threats and mitigation
    Clancy, T. Charles
    Goergen, Nathan
    2008 3RD INTERNATIONAL CONFERENCE ON COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND COMMUNICATIONS, 2008, : 440 - 447
  • [5] Security Threats in Mobile Cognitive Radio Networks
    Trubin, I. S.
    PROCEEDINGS OF 2018 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS 2018), 2018,
  • [6] Analogous Study of Security Threats in Cognitive Radio
    Sohu, Izhar Ahmed
    Rahimoon, Asif Ahmed
    Junejo, Amjad Ali
    Sohu, Arsalan Ahmed
    Junejo, Sadam Hussain
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET), 2019,
  • [7] Security Threats in Military Cognitive Radio Networks
    Slimeni, Feten
    Scheers, Bart
    Chtourou, Zied
    2015 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2015,
  • [8] Taxonomy of Security Attacks and Threats in Cognitive Radio Networks
    Soliman, John N.
    Mageed, Tarek Abdel
    El-Hennawy, Hadia M.
    2017 PROCEEDINGS OF THE JAPAN-AFRICA CONFERENCE ON ELECTRONICS, COMMUNICATIONS, AND COMPUTERS (JAC-ECC), 2017, : 127 - 131
  • [9] Simulation framework for security threats in cognitive radio networks
    Romero, E.
    Mouradian, A.
    Blesa, J.
    Moya, J. M.
    Araujo, A.
    IET COMMUNICATIONS, 2012, 6 (08) : 984 - 990
  • [10] Survey of Security Threats and Attacks in Cognitive Radio Networks
    Chauhan, Kamal Kumar
    Sanger, Amit Kumar Singh
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,