Countermeasures to Security Threats/Attacks on Different Protocol Layers in Cognitive Radio Networks: An Overview

被引:0
|
作者
Raj, Shekhar [1 ]
Sahu, O. P. [1 ]
机构
[1] Natl Inst Technol, Dept Elect & Commun, Kurukshetra, Haryana, India
关键词
cognitive radios; cognitive radio networks; primary user; secondary user; security threats/attacks; protocol layers; malicious user; ATTACK;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cognitive Radio (CR) is a revolutionary technology which allows the unlicensed user to co-exist along with licensed user. It complements the wireless device by helping in improving its efficiency, reliability, and speed. New security threats have being lifted along with the understanding of cognitive radio, which thereby degrades the performance of cognitive radio. There has been a remarkable growth in security threats prevailing in CR Network (CRN) and also there countermeasure in the past decade. The main objective of this work is to protect CRN from both malicious user and licensed user. Specifically, we present various countermeasures against all possible attacks and threats in different protocol layers in CRN. The various security approaches on different protocol layers can be summarized as using error correcting codes, spread spectrum techniques, cryptographic algorithms and MAC layer admission control mechanism. With this paper, reader can have a clear idea about various countermeasures against attacks on different protocol layer and also about the research trends in this area.
引用
收藏
页码:1076 / 1082
页数:7
相关论文
共 50 条
  • [1] Security Threats and Challenges on Different Protocol Layers in Cognitive Radio Networks: An Overview
    Raj, Shekhar
    Sahu, O. P.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN CONTROL, COMMUNICATION AND INFORMATION SYSTEMS (ICICCI-2017), 2017, : 136 - 140
  • [2] Survey of Security Threats and Attacks in Cognitive Radio Networks
    Chauhan, Kamal Kumar
    Sanger, Amit Kumar Singh
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [3] Taxonomy of Security Attacks and Threats in Cognitive Radio Networks
    Soliman, John N.
    Mageed, Tarek Abdel
    El-Hennawy, Hadia M.
    [J]. 2017 PROCEEDINGS OF THE JAPAN-AFRICA CONFERENCE ON ELECTRONICS, COMMUNICATIONS, AND COMPUTERS (JAC-ECC), 2017, : 127 - 131
  • [4] Security threats and countermeasures of MAC layer in cognitive radio networks
    Manesh, Mohsen Riahi
    Kaabouch, Naima
    [J]. AD HOC NETWORKS, 2018, 70 : 85 - 102
  • [5] Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey
    Sharma, Rajesh K.
    Rawat, Danda B.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02): : 1023 - 1043
  • [6] A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks
    Ahuja, Pooja
    Sethi, Preeti
    Chauhan, Naresh
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (11) : 32715 - 32738
  • [7] A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks
    Pooja Ahuja
    Preeti Sethi
    Naresh Chauhan
    [J]. Multimedia Tools and Applications, 2024, 83 : 32715 - 32738
  • [8] Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey
    Salahdine, Fatima
    Kaabouch, Naima
    [J]. PHYSICAL COMMUNICATION, 2020, 39
  • [9] A survey on security attacks and countermeasures with primary user detection in cognitive radio networks
    Marinho J.
    Granjal J.
    Monteiro E.
    [J]. EURASIP Journal on Information Security, 2015 (1):
  • [10] Security Threats in Cognitive Radio Networks
    Zhang, Yuan
    Xu, Gaochao
    Geng, Xiaozhong
    [J]. HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 1036 - 1041