A Survey of Security issues in Cognitive Radio Networks

被引:63
|
作者
Li Jianwu [1 ]
Feng Zebing [2 ]
Feng Zhiyong [2 ]
Zhang Ping [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Network Informat Proc Ctr, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Minist Educ, Key Lab Universal Wireless Commun, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
CRNs security; physical layer security; security capacity; active attacks; passive attacks; PHYSICAL-LAYER SECURITY; INTRUSION DETECTION; SECRECY; SOFTWARE; COMMUNICATION; SYSTEMS;
D O I
10.1109/CC.2015.7084371
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In the last decade, cognitive radio (CR) has emerged as a major next generation wireless networking technology, which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization. However, there exist enormous. challenges for the open and random access environment of. CRNs, where the unlicensed secondary users (SUs) can use the channels that are not currently used by the licensed primary users (PUs) via spectrum-sensing technology. Because of this access method, some malicious users may access the cognitive network arbitrarily and launch some special attacks, such as primary user emulation attack, falsifying data or denial of service attack, which will cause serious damage to the cognitive radio network. In addition to the specific security threats of cognitive network, CRNs also fate up to the conventional security threats, such as eavesdropping, tampering, imitation, forgery, and noncooperation etc.. Hence, Cognitive radio networks have much more risks than traditional wireless networks with its special network model. In this paper, we considered the security threats from passive and active attacks. Firstly, the PHY layer security is presented in the view of passive attacks, and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications. Moreover, malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection. Finally, we discuss the general countermeasures of security threats in three phases. In particular, we discuss the far reaching effect of defensive strategy against attacks in CRNs.
引用
收藏
页码:132 / 150
页数:19
相关论文
共 50 条
  • [1] Survey of Security Issues in Cognitive Radio Networks
    El-Hajj, Wassim
    Safa, Haidar
    Guizani, Mohsen
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (02): : 181 - 198
  • [2] A Survey of Security Issues in Cognitive Radio Networks
    LI Jianwu
    FENG Zebing
    FENG Zhiyong
    ZHANG Ping
    [J]. China Communications, 2015, 12 (03) : 132 - 150
  • [3] Recent Security Issues on Cognitive Radio Networks: A Survey
    Holcomb, Sterling
    Rawat, Danda B.
    [J]. SOUTHEASTCON 2016, 2016,
  • [4] Security in Cognitive Radio Networks - A Survey
    Sumathi, A. C.
    Vidhyapriya, R.
    [J]. 2012 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2012, : 114 - 118
  • [5] A Survey on Security in Cognitive Radio Networks
    Khasawneh, Mahmoud
    Agarwal, Anjali
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 64 - 70
  • [6] Research on security issues of cognitive radio networks
    Zhu, Li
    Mao, Huaqing
    [J]. CONFERENCE ON WEB BASED BUSINESS MANAGEMENT, VOLS 1-2, 2010, : 921 - 926
  • [7] A survey on security issues in cognitive radio based cooperative sensing
    Shrivastava, Shivanshu
    Rajesh, A.
    Bora, P. K.
    Chen, Bin
    Dai, Mingjun
    Lin, Xiaohui
    Wang, Hui
    [J]. IET COMMUNICATIONS, 2021, 15 (07) : 875 - 905
  • [8] Survey of Security Threats and Attacks in Cognitive Radio Networks
    Chauhan, Kamal Kumar
    Sanger, Amit Kumar Singh
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [9] Security Issues in Database-driven Cognitive Radio Networks
    Fang, Chen-Liao-Hui
    Zhu, Hao-Jin
    [J]. 2015 International Conference on Software Engineering and Information System (SEIS 2015), 2015, : 763 - 768
  • [10] A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks
    Fragkiadakis, Alexandros G.
    Tragos, Elias Z.
    Askoxylakis, Ioannis G.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 428 - 445