Cognitive Radio Network Security Threats: A Review

被引:0
|
作者
Mishra, Nikita [1 ]
Srivastava, Sumit [2 ]
Sharan, Shivendra Nath [3 ]
机构
[1] Manipal Univ Jaipur, Dept Elect & Commun, Jaipur, Rajasthan, India
[2] Manipal Univ Jaipur, Dept Informat Technol, Jaipur, Rajasthan, India
[3] NIIT Univ, Dept Elect & Commun, Neemrana, India
关键词
Cognitive Radio Network; attack; security and spectrum;
D O I
10.1109/icct46177.2019.8969053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Overcrowded ISM band and inefficient spectrum utilization at a licensed band lead to the development of Cognitive Radio Network. It is an intelligent wireless technology capable of learning and adapting changes in surrounding environment parameters. However, the security of Cognitive radio restricts its widespread application. In addition to traditional wireless network security threats, cognitive radios are vulnerable to new threats posed by flexible spectrum allocation policy. Various attacks are targeting the physical, MAC, network, transport and application layers of a protocol stack. There is a need to have an excellent knowledge of the attacker's characteristics for secure and robust Cognitive Radio deployment. This paper meticulously recaps the security hazards posed to the cognitive radio network at various layers. Also, we have summarized attacks according to protocol layer and security requirements in a tabular format.
引用
收藏
页码:333 / 338
页数:6
相关论文
共 50 条
  • [31] Physical Layer Security in Cognitive Radio Inspired NOMA Network
    Xiang, Zhongwu
    Yang, Weiwei
    Pan, Gaofeng
    Cai, Yueming
    Song, Yi
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2019, 13 (03) : 700 - 714
  • [32] A Framework of the PHY-layer Approach to Defense Against Security Threats in Cognitive Radio Networks
    Wen, Hong
    Li, Shaoqian
    Zhu, Xiping
    Zhou, Liang
    IEEE NETWORK, 2013, 27 (03): : 34 - 39
  • [33] Bot armies as threats to network security
    Banks, Sheila B.
    Stytz, Martin R.
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2007, 2007, 6570
  • [34] Spectrum Handoff in Cognitive Radio Cellular Network: A Review
    Mishra, M. P.
    Vidyarthi, D. P.
    PROCEEDINGS OF THE 2019 8TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2019), 2019, : 210 - 215
  • [35] Security in Cognitive Radio Networks
    Akin, Sami
    2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2014,
  • [36] Security in Cognitive Radio Networks
    Ren, Kui
    Zhu, Haojin
    Han, Zhu
    Poovendran, Radha
    IEEE NETWORK, 2013, 27 (03): : 2 - 3
  • [37] On the Security of Cognitive Radio Networks
    Elkashlan, Maged
    Wang, Lifeng
    Duong, Trung Q.
    Karagiannidis, George K.
    Nallanathan, Arumugam
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (08) : 3790 - 3795
  • [38] Security in cognitive radio networks
    Pei, Qing-Qi
    Li, Hong-Ning
    Zhao, Hong-Yang
    Li, Nan
    Min, Ying
    Tongxin Xuebao/Journal on Communications, 2013, 34 (01): : 144 - 158
  • [39] HMAC-RSA: A security mechanism in cognitive radio for enhancing the security in a radio cognitive system
    Srinivasan, Sundar
    ShivaKumar, K. B.
    Muazzam, Mohammad
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (05) : 4449 - 4459
  • [40] A Review on Cloud Security Threats and Solutions
    Sebastian, Anu Maria
    Kizhakkethottam, Jubilent J.
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORKS SECURITY (ICSNS 2015), 2015,