Countermeasures to Security Threats/Attacks on Different Protocol Layers in Cognitive Radio Networks: An Overview

被引:0
|
作者
Raj, Shekhar [1 ]
Sahu, O. P. [1 ]
机构
[1] Natl Inst Technol, Dept Elect & Commun, Kurukshetra, Haryana, India
关键词
cognitive radios; cognitive radio networks; primary user; secondary user; security threats/attacks; protocol layers; malicious user; ATTACK;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cognitive Radio (CR) is a revolutionary technology which allows the unlicensed user to co-exist along with licensed user. It complements the wireless device by helping in improving its efficiency, reliability, and speed. New security threats have being lifted along with the understanding of cognitive radio, which thereby degrades the performance of cognitive radio. There has been a remarkable growth in security threats prevailing in CR Network (CRN) and also there countermeasure in the past decade. The main objective of this work is to protect CRN from both malicious user and licensed user. Specifically, we present various countermeasures against all possible attacks and threats in different protocol layers in CRN. The various security approaches on different protocol layers can be summarized as using error correcting codes, spread spectrum techniques, cryptographic algorithms and MAC layer admission control mechanism. With this paper, reader can have a clear idea about various countermeasures against attacks on different protocol layer and also about the research trends in this area.
引用
收藏
页码:1076 / 1082
页数:7
相关论文
共 50 条
  • [21] A Security Protocol for MAC Layer in Cognitive Radio Networks
    Wu, Huayi
    Hui, Ning
    Bai, Baohua
    [J]. 2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL IV, 2011, : 326 - 329
  • [22] A Security Protocol for MAC Layer in Cognitive Radio Networks
    Wu, Huayi
    Hui, Ning
    Bai, Baohua
    [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IX, 2010, : 327 - 330
  • [23] Detection of Attacks and Countermeasures in Cognitive Radio Network
    Priyadharshini, R. Ahila
    Haimavathi, K. Uma
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1102 - 1106
  • [24] Mitigating Security Attacks in Spectrum Allocation in Cognitive Radio Networks
    Singh W.N.
    Marchang N.
    [J]. SN Computer Science, 5 (5)
  • [25] Security Challenges for Drone Communications: Possible Threats, Attacks and Countermeasures
    Krichen, Moez
    Adoni, Wilfried Yves Hamilton
    Mihoub, Alaeddine
    Alzahrani, Mohammed Y.
    Nahhal, Tarik
    [J]. 2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, : 184 - 189
  • [26] Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures
    Rajendran, Gowthamaraj
    Nivash, Ragul R. S.
    Parthy, Purushotham Parthiban
    Balamurugan, S.
    [J]. 2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [27] Location Privacy in Database-driven Cognitive Radio Networks: Attacks and Countermeasures
    Gao, Zhaoyu
    Zhu, Haojin
    Liu, Yao
    Li, Muyuan
    Cao, Zhenfu
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2751 - 2759
  • [28] A Review on Security Threats in Cognitive Radio
    Banerjee, Abhinaba
    Das, Sushanta
    [J]. 2014 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE), 2014,
  • [29] Combating Security Threats via Immunity and Adaptability in Cognitive Radio Networks
    Nikodem, Jan
    Chaczko, Zenon
    Nikodem, Maciej
    Klempous, Ryszard
    Wickramasooriya, Ruckshan
    [J]. RECENT ADVANCES IN INTELLIGENT ENGINEERING SYSTEMS, 2012, 378 : 221 - 242
  • [30] An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools
    Hu, Wei
    Chang, Chip-Hong
    Sengupta, Anirban
    Bhunia, Swarup
    Kastner, Ryan
    Li, Hai
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (06) : 1010 - 1038