Countermeasures to Security Threats/Attacks on Different Protocol Layers in Cognitive Radio Networks: An Overview

被引:0
|
作者
Raj, Shekhar [1 ]
Sahu, O. P. [1 ]
机构
[1] Natl Inst Technol, Dept Elect & Commun, Kurukshetra, Haryana, India
关键词
cognitive radios; cognitive radio networks; primary user; secondary user; security threats/attacks; protocol layers; malicious user; ATTACK;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cognitive Radio (CR) is a revolutionary technology which allows the unlicensed user to co-exist along with licensed user. It complements the wireless device by helping in improving its efficiency, reliability, and speed. New security threats have being lifted along with the understanding of cognitive radio, which thereby degrades the performance of cognitive radio. There has been a remarkable growth in security threats prevailing in CR Network (CRN) and also there countermeasure in the past decade. The main objective of this work is to protect CRN from both malicious user and licensed user. Specifically, we present various countermeasures against all possible attacks and threats in different protocol layers in CRN. The various security approaches on different protocol layers can be summarized as using error correcting codes, spread spectrum techniques, cryptographic algorithms and MAC layer admission control mechanism. With this paper, reader can have a clear idea about various countermeasures against attacks on different protocol layer and also about the research trends in this area.
引用
收藏
页码:1076 / 1082
页数:7
相关论文
共 50 条
  • [31] An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities
    Demertzi, Vasiliki
    Demertzis, Stavros
    Demertzis, Konstantinos
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (02):
  • [32] Security Threats and Countermeasures for Intra-Vehicle Networks
    Wampler, David
    Fu, Huirong
    Zhu, Ye
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 153 - +
  • [33] A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures
    Yazdinejad, Abbas
    Zolfaghari, Behrouz
    Azmoodeh, Amin
    Dehghantanha, Ali
    Karimipour, Hadis
    Fraser, Evan
    Green, Arthur G.
    Russell, Conor
    Duncan, Emily
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [34] A survey on security threats in cognitive radio networks based on cooperative spectrum sensing
    Zemo, Flavien Donkeng
    Bakkali, Sara
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (04)
  • [35] Throughput of cognitive radio networks with improved energy detector under security threats
    Yadav, Kuldeep
    Roy, Sanjay Dhar
    Kundu, Sumit
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (06)
  • [36] Analogous Study of Security Threats in Cognitive Radio
    Sohu, Izhar Ahmed
    Rahimoon, Asif Ahmed
    Junejo, Amjad Ali
    Sohu, Arsalan Ahmed
    Junejo, Sadam Hussain
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET), 2019,
  • [37] Cognitive Radio Network Security Threats: A Review
    Mishra, Nikita
    Srivastava, Sumit
    Sharan, Shivendra Nath
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), 2019, : 333 - 338
  • [38] Security in wireless sensor networks: a survey of attacks and countermeasures
    Martins, David
    Guyennet, Herve
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2011, 1 (1-3) : 151 - 162
  • [39] Security Issues in Wireless Sensor Networks: Attacks and Countermeasures
    Chelli, Kahina
    [J]. WORLD CONGRESS ON ENGINEERING, WCE 2015, VOL I, 2015, : 519 - 524
  • [40] Security Attacks and Its Countermeasures in Wireless Sensor Networks - A
    Kiruthika, B.
    Abinaya, S.
    Ezhilarasie, R.
    Umamakeswari, A.
    [J]. RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2015, 6 (03): : 1374 - 1387