A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions

被引:207
|
作者
Attar, Alireza [1 ]
Tang, Helen [2 ,3 ]
Vasilakos, Athanasios V. [4 ,5 ]
Yu, F. Richard [2 ]
Leung, Victor C. M. [1 ]
机构
[1] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
[2] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[3] Def R&D Canada, Secure Mobile Networking Grp, Ottawa, ON, Canada
[4] Univ Western Macedonia, Dept Comp & Telecommun Engn, GR-50100 Kozani, Greece
[5] Natl Tech Univ Athens NTUA, Dept Elect & Comp Engn, Athens 15780, Greece
关键词
Cognitive radio (CR); denial of service (DoS); incumbent emulation; security; spectrum sensing data falsification (SSDF); AD HOC NETWORKS; CAPACITY; SYSTEMS;
D O I
10.1109/JPROC.2012.2208211
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this survey, we present a comprehensive list of major known security threats within a cognitive radio network (CRN) framework. We classify attack techniques based on the type of attacker, namely exogenous (external) attackers, intruding malicious nodes and greedy cognitive radios (CRs). We further discuss threats related to infrastructure-based CRNs as well as infrastructure-less networks. Besides the short-term effects of attacks over CRN performance, we also discuss the often ignored longer term behavioral changes that are enforced by such attacks via the learning capability of CRN. After elaborating on various attack strategies, we discuss potential solutions to combat those attacks. An overview of robust CR communications is also presented. We finally elaborate on future research directions pertinent to CRN security. We hope this survey paper can provide the insight and the roadmap for future research efforts in the emerging field of CRN security.
引用
收藏
页码:3172 / 3186
页数:15
相关论文
共 50 条
  • [2] A Comprehensive Survey on Spectrum Sensing in Cognitive Radio Networks: Recent Advances, New Challenges, and Future Research Directions
    Arjoune, Youness
    Kaabouch, Naima
    [J]. SENSORS, 2019, 19 (01)
  • [3] Neighbor discovery in traditional wireless networks and cognitive radio networks: Basics, taxonomy, challenges and future research directions
    Khan, Athar Ali
    Rehmani, Mubashir Husain
    Saleem, Yasir
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 52 : 173 - 190
  • [4] A Survey on Requirements of Future Intelligent Networks: Solutions and Future Research Directions
    Husen, Arif
    Chaudary, Muhammad Hasanain
    Ahmad, Farooq
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (04)
  • [5] Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions
    Driss, Maha
    Hasan, Daniah
    Boulila, Wadii
    Ahmad, Jawad
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 2385 - 2395
  • [6] A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions
    De Alwis, Chamitha
    Porambage, Pawani
    Dev, Kapal
    Gadekallu, Thippa Reddy
    Liyanage, Madhusanka
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (01): : 534 - 570
  • [7] An Overview and Future Directions on Physical-Layer Security for Cognitive Radio Networks
    Tashman, Deemah H.
    Hamouda, Walaa
    [J]. IEEE NETWORK, 2021, 35 (03): : 205 - 211
  • [8] A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks
    Ahuja, Pooja
    Sethi, Preeti
    Chauhan, Naresh
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (11) : 32715 - 32738
  • [9] A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks
    Pooja Ahuja
    Preeti Sethi
    Naresh Chauhan
    [J]. Multimedia Tools and Applications, 2024, 83 : 32715 - 32738
  • [10] Security in Cognitive Radio Networks - A Survey
    Sumathi, A. C.
    Vidhyapriya, R.
    [J]. 2012 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2012, : 114 - 118