Cognitive Radio Network Security Threats: A Review

被引:0
|
作者
Mishra, Nikita [1 ]
Srivastava, Sumit [2 ]
Sharan, Shivendra Nath [3 ]
机构
[1] Manipal Univ Jaipur, Dept Elect & Commun, Jaipur, Rajasthan, India
[2] Manipal Univ Jaipur, Dept Informat Technol, Jaipur, Rajasthan, India
[3] NIIT Univ, Dept Elect & Commun, Neemrana, India
关键词
Cognitive Radio Network; attack; security and spectrum;
D O I
10.1109/icct46177.2019.8969053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Overcrowded ISM band and inefficient spectrum utilization at a licensed band lead to the development of Cognitive Radio Network. It is an intelligent wireless technology capable of learning and adapting changes in surrounding environment parameters. However, the security of Cognitive radio restricts its widespread application. In addition to traditional wireless network security threats, cognitive radios are vulnerable to new threats posed by flexible spectrum allocation policy. Various attacks are targeting the physical, MAC, network, transport and application layers of a protocol stack. There is a need to have an excellent knowledge of the attacker's characteristics for secure and robust Cognitive Radio deployment. This paper meticulously recaps the security hazards posed to the cognitive radio network at various layers. Also, we have summarized attacks according to protocol layer and security requirements in a tabular format.
引用
收藏
页码:333 / 338
页数:6
相关论文
共 50 条
  • [21] Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey
    Salahdine, Fatima
    Kaabouch, Naima
    PHYSICAL COMMUNICATION, 2020, 39 (39)
  • [22] A survey on security threats in cognitive radio networks based on cooperative spectrum sensing
    Zemo, Flavien Donkeng
    Bakkali, Sara
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (04) : 433 - 466
  • [23] Throughput of cognitive radio networks with improved energy detector under security threats
    Yadav, Kuldeep
    Roy, Sanjay Dhar
    Kundu, Sumit
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (06)
  • [24] A Signal Verification Approach to Cognitive Radio Network Security
    Farhat, Md Tanzin
    Javaid, Ahmad Y.
    Devabhaktuni, Vijay
    Wu, Zhiqiang
    NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 137 - 143
  • [25] A layered approach to cognitive radio network security: A survey
    Hlavacek, Deanna
    Chang, J. Morris
    COMPUTER NETWORKS, 2014, 75 : 414 - 436
  • [26] Countermeasures to Security Threats/Attacks on Different Protocol Layers in Cognitive Radio Networks: An Overview
    Raj, Shekhar
    Sahu, O. P.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 1076 - 1082
  • [27] Security in cognitive radio networks: The required evolution in approaches to wireless network security
    Burbank, Jack L.
    2008 3RD INTERNATIONAL CONFERENCE ON COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND COMMUNICATIONS, 2008, : 454 - 460
  • [28] Problem of Network Security Threats
    Mendyk-Krajewska, Teresa
    Mazur, Zygmunt
    3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 436 - 443
  • [29] A review on spectrum allocation in cognitive radio network
    Singh, Wangjam Niranjan
    Marchang, Ningrinla
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2019, 23 (02) : 172 - 193
  • [30] Security Issues in Cooperative Spectrum Sensing for Cognitive Radio Network
    Du, Jiang
    Zhu, Chunjiao
    Chen, Zhaohui
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768