A survey on security attacks and countermeasures with primary user detection in cognitive radio networks

被引:30
|
作者
Marinho J. [1 ,2 ]
Granjal J. [2 ,3 ]
Monteiro E. [2 ,3 ]
机构
[1] Instituto Politécnico de Coimbra, ISEC, DEIS, Rua Pedro Nunes - Quinta da Nora, Coimbra
[2] DEI-UC - Department of Informatics Engineering, University of Coimbra, Pólo II - Pinhal de Marrocos, Coimbra
[3] CISUC - Centre for Informatics and Systems of the University of Coimbra, Pólo II - Pinhal de Marrocos, Coimbra
关键词
Primary user detection; Primary user emulation; Security in cognitive radio; Spectrum sensing falsification;
D O I
10.1186/s13635-015-0021-0
中图分类号
学科分类号
摘要
Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most promising players by enabling the dynamic access to vacant frequency bands on a non-interference basis. However, the intrinsic characteristic of CR opens new ways for attackers, namely in the context of the effective detection of incumbent or primary users (PUs), the most fundamental and challenging requirement for the successful operation of CR networks. In this article, we provide a global and integrated vision of the main threats affecting CR environments in the context of the detection of primary users, with a particular focus on spectrum sensing data falsification and primary user emulation attacks. We also address solutions and research challenges still required to address such threats. Our discussion aims at being complete and self-contained, while also targeting readers with no specific background on this important topic of CR environments. It is, as far as our knowledge goes, the first work providing a global and clear vision of security threats and countermeasures in the context of primary user detection in CR. © 2015, Marinho et al.; licensee Springer.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] On Physical Layer Security for Cognitive Radio Networks with Primary User Interference
    Sibomana, Louis
    Hung Tran
    Zepernick, Hans-Juergen
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 281 - 286
  • [22] A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks
    Ahuja, Pooja
    Sethi, Preeti
    Chauhan, Naresh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (11) : 32715 - 32738
  • [23] A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks
    Pooja Ahuja
    Preeti Sethi
    Naresh Chauhan
    Multimedia Tools and Applications, 2024, 83 : 32715 - 32738
  • [24] Primary User Detection in Cognitive Radio Networks Through Quickest Detection
    Khan, Muhammad Sajjad
    Koo, Insoo
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 1 - 5
  • [25] iDetection: Intelligent Primary User Detection for Cognitive Radio Networks
    Ejaz, Waleed
    Hasan, Najam Ul
    Kim, Hyung Seok
    2012 6TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST), 2012, : 153 - 157
  • [26] A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks
    Fragkiadakis, Alexandros G.
    Tragos, Elias Z.
    Askoxylakis, Ioannis G.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 428 - 445
  • [27] Asymptotically optimum detection of primary user in cognitive radio networks
    Taherpour, A.
    Norouzi, Y.
    Nasiri-Kenari, M.
    Jamshidi, A.
    Zeinalpour-Yazdi, Z.
    IET COMMUNICATIONS, 2007, 1 (06) : 1138 - 1145
  • [28] Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks
    Duc-Tuyen Ta
    Nhan Nguyen-Thanh
    Maille, Patrick
    Van-Tam Nguyen
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2018, 4 (03) : 582 - 596
  • [29] Enhancing Security of Primary User in Underlay Cognitive Radio Networks With Secondary User Selection
    Qin, Mian
    Yang, Shouyi
    Deng, Hao
    Lee, Moon Ho
    IEEE ACCESS, 2018, 6 : 32624 - 32636
  • [30] A New Method to Detect Primary User Emulation Attacks in Cognitive Radio Networks
    Peng, Kai
    Zeng, Fanzi
    Zeng, Qingguang
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 674 - 677