Security Threats in Cognitive Radio Networks

被引:23
|
作者
Zhang, Yuan [1 ]
Xu, Gaochao [1 ]
Geng, Xiaozhong [1 ]
机构
[1] Jilin Univ, Dept Comp Sci & Technol, Changchun 130023, Peoples R China
关键词
D O I
10.1109/HPCC.2008.21
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The research for Dynamic Spectrum Access (DSA) and cognitive radio network (CRN) becomes one of the focuses in wireless network currently. However, as many other new techniques, in the initialization period, the security factors in CRN are out of focus. This paper describes the special characteristics of cognitive radio (CR) and CRN, and analysis the current and potential security threats that due to their characteristics. Besides some countermeasures and keys need to attention are mentioned. The goal of this paper is to assist CR designers and the CR application engineers to consider the security factors in the initial development period of CR techniques.
引用
收藏
页码:1036 / 1041
页数:6
相关论文
共 50 条
  • [1] Security in cognitive radio networks: Threats and mitigation
    Clancy, T. Charles
    Goergen, Nathan
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND COMMUNICATIONS, 2008, : 440 - 447
  • [2] Security Threats in Mobile Cognitive Radio Networks
    Trubin, I. S.
    [J]. PROCEEDINGS OF 2018 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS 2018), 2018,
  • [3] Security Threats in Military Cognitive Radio Networks
    Slimeni, Feten
    Scheers, Bart
    Chtourou, Zied
    [J]. 2015 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2015,
  • [4] Taxonomy of Security Attacks and Threats in Cognitive Radio Networks
    Soliman, John N.
    Mageed, Tarek Abdel
    El-Hennawy, Hadia M.
    [J]. 2017 PROCEEDINGS OF THE JAPAN-AFRICA CONFERENCE ON ELECTRONICS, COMMUNICATIONS, AND COMPUTERS (JAC-ECC), 2017, : 127 - 131
  • [5] Simulation framework for security threats in cognitive radio networks
    Romero, E.
    Mouradian, A.
    Blesa, J.
    Moya, J. M.
    Araujo, A.
    [J]. IET COMMUNICATIONS, 2012, 6 (08) : 984 - 990
  • [6] Survey of Security Threats and Attacks in Cognitive Radio Networks
    Chauhan, Kamal Kumar
    Sanger, Amit Kumar Singh
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [7] A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks
    Fragkiadakis, Alexandros G.
    Tragos, Elias Z.
    Askoxylakis, Ioannis G.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 428 - 445
  • [8] Investigating Spectrum Sensing Security Threats in Cognitive Radio Networks
    Mapunya, Sekgoari
    Velempini, Mthulisi
    [J]. AD HOC NETWORKS, ADHOCNETS 2017, 2018, 223 : 60 - 68
  • [9] Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey
    Sharma, Rajesh K.
    Rawat, Danda B.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02): : 1023 - 1043
  • [10] Security threats and countermeasures of MAC layer in cognitive radio networks
    Manesh, Mohsen Riahi
    Kaabouch, Naima
    [J]. AD HOC NETWORKS, 2018, 70 : 85 - 102