Countermeasures to Security Threats/Attacks on Different Protocol Layers in Cognitive Radio Networks: An Overview

被引:0
|
作者
Raj, Shekhar [1 ]
Sahu, O. P. [1 ]
机构
[1] Natl Inst Technol, Dept Elect & Commun, Kurukshetra, Haryana, India
关键词
cognitive radios; cognitive radio networks; primary user; secondary user; security threats/attacks; protocol layers; malicious user; ATTACK;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cognitive Radio (CR) is a revolutionary technology which allows the unlicensed user to co-exist along with licensed user. It complements the wireless device by helping in improving its efficiency, reliability, and speed. New security threats have being lifted along with the understanding of cognitive radio, which thereby degrades the performance of cognitive radio. There has been a remarkable growth in security threats prevailing in CR Network (CRN) and also there countermeasure in the past decade. The main objective of this work is to protect CRN from both malicious user and licensed user. Specifically, we present various countermeasures against all possible attacks and threats in different protocol layers in CRN. The various security approaches on different protocol layers can be summarized as using error correcting codes, spread spectrum techniques, cryptographic algorithms and MAC layer admission control mechanism. With this paper, reader can have a clear idea about various countermeasures against attacks on different protocol layer and also about the research trends in this area.
引用
收藏
页码:1076 / 1082
页数:7
相关论文
共 50 条
  • [41] Security Attacks and Countermeasures in Surveillance Wireless Sensor Networks
    Sert, Seyyit Alper
    Onur, Ertan
    Yazici, Adnan
    2015 9TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2015, : 201 - 205
  • [42] A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures
    Wang, Xiaojie
    Zhao, Zhonghui
    Yi, Ling
    Ning, Zhaolong
    Guo, Lei
    Yu, F. richard
    Guo, Song
    ACM COMPUTING SURVEYS, 2025, 57 (03)
  • [43] Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures
    Hu, Yiwen
    Wang, Sihan
    Tu, Guan-Hua
    Xiao, Li
    Xie, Tian
    Lei, Xinyu
    Li, Chi-Yu
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 89 - 100
  • [44] Security in Cognitive Radio Networks
    Akin, Sami
    2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2014,
  • [45] Security in Cognitive Radio Networks
    Ren, Kui
    Zhu, Haojin
    Han, Zhu
    Poovendran, Radha
    IEEE NETWORK, 2013, 27 (03): : 2 - 3
  • [46] On the Security of Cognitive Radio Networks
    Elkashlan, Maged
    Wang, Lifeng
    Duong, Trung Q.
    Karagiannidis, George K.
    Nallanathan, Arumugam
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (08) : 3790 - 3795
  • [47] Security in cognitive radio networks
    Pei, Qing-Qi
    Li, Hong-Ning
    Zhao, Hong-Yang
    Li, Nan
    Min, Ying
    Tongxin Xuebao/Journal on Communications, 2013, 34 (01): : 144 - 158
  • [48] Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A Survey
    Sinha, Preeti
    Jha, V. K.
    Rai, Amit Kumar
    Bhushan, Bharat
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSPC'17), 2017, : 288 - 293
  • [49] Countermeasures against radio jamming attacks in wireless sensor networks
    Mpitziopoulos, Aristides
    Gavalas, Damianos
    Networks and Quantum Computing, 2011, : 1 - 18
  • [50] An Overview and Future Directions on Physical-Layer Security for Cognitive Radio Networks
    Tashman, Deemah H.
    Hamouda, Walaa
    IEEE NETWORK, 2021, 35 (03): : 205 - 211