A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks

被引:280
|
作者
Fragkiadakis, Alexandros G. [1 ]
Tragos, Elias Z. [1 ]
Askoxylakis, Ioannis G. [1 ]
机构
[1] Fdn Res & Technol Hellas FORTH, Inst Comp Sci, GR-71110 Iraklion, Crete, Greece
来源
关键词
cognitive radios; cognitive radio networks; primary user emulation attacks; spectrum sense data falsification attacks; cross layer attacks; software defined radio security; IEEE; 802.22; SOFTWARE DEFINED RADIO; USER EMULATION ATTACKS; SPECTRUM ACCESS; MAC; MISBEHAVIOR; FRAMEWORK; DOWNLOAD;
D O I
10.1109/SURV.2011.122211.00162
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. The allocation of the Industrial, Medical and Scientific (ISM) band has enabled the explosion of new technologies (e. g. Wi-Fi) due to its licence-exempt characteristic. The widespread adoption of Wi-Fi technology, combined with the rapid penetration of smart phones running popular user services (e. g. social online networks) has overcrowded substantially the ISM band. On the other hand, according to a number of recent reports, several parts of the static allocated licensed bands are under-utilized. This has brought up the idea of the opportunistic use of these bands through the, so-called, cognitive radios and cognitive radio networks. Cognitive radios have enabled the opportunity to transmit in several licensed bands without causing harmful interference to licensed users. Along with the realization of cognitive radios, new security threats have been raised. Adversaries can exploit several vulnerabilities of this new technology and cause severe performance degradation. Security threats are mainly related to two fundamental characteristics of cognitive radios: cognitive capability, and reconfigurability. Threats related to the cognitive capability include attacks launched by adversaries that mimic primary transmitters, and transmission of false observations related to spectrum sensing. Reconfiguration can be exploited by attackers through the use of malicious code installed in cognitive radios. Furthermore, as cognitive radio networks are wireless in nature, they face all classic threats present in the conventional wireless networks. The scope of this work is to give an overview of the security threats and challenges that cognitive radios and cognitive radio networks face, along with the current state-of-the-art to detect the corresponding attacks. In addition, future challenges are addressed.
引用
收藏
页码:428 / 445
页数:18
相关论文
共 50 条
  • [1] Survey of Security Threats and Attacks in Cognitive Radio Networks
    Chauhan, Kamal Kumar
    Sanger, Amit Kumar Singh
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [2] Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey
    Salahdine, Fatima
    Kaabouch, Naima
    [J]. PHYSICAL COMMUNICATION, 2020, 39
  • [3] Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey
    Sharma, Rajesh K.
    Rawat, Danda B.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02): : 1023 - 1043
  • [4] Security Threats in Cognitive Radio Networks
    Zhang, Yuan
    Xu, Gaochao
    Geng, Xiaozhong
    [J]. HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 1036 - 1041
  • [5] Security in cognitive radio networks: Threats and mitigation
    Clancy, T. Charles
    Goergen, Nathan
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND COMMUNICATIONS, 2008, : 440 - 447
  • [6] Security Threats in Mobile Cognitive Radio Networks
    Trubin, I. S.
    [J]. PROCEEDINGS OF 2018 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS 2018), 2018,
  • [7] Security Threats in Military Cognitive Radio Networks
    Slimeni, Feten
    Scheers, Bart
    Chtourou, Zied
    [J]. 2015 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2015,
  • [8] A survey on security threats in cognitive radio networks based on cooperative spectrum sensing
    Zemo, Flavien Donkeng
    Bakkali, Sara
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (04)
  • [9] A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks
    Ahuja, Pooja
    Sethi, Preeti
    Chauhan, Naresh
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (11) : 32715 - 32738
  • [10] A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks
    Pooja Ahuja
    Preeti Sethi
    Naresh Chauhan
    [J]. Multimedia Tools and Applications, 2024, 83 : 32715 - 32738