A survey on security attacks and countermeasures with primary user detection in cognitive radio networks

被引:30
|
作者
Marinho J. [1 ,2 ]
Granjal J. [2 ,3 ]
Monteiro E. [2 ,3 ]
机构
[1] Instituto Politécnico de Coimbra, ISEC, DEIS, Rua Pedro Nunes - Quinta da Nora, Coimbra
[2] DEI-UC - Department of Informatics Engineering, University of Coimbra, Pólo II - Pinhal de Marrocos, Coimbra
[3] CISUC - Centre for Informatics and Systems of the University of Coimbra, Pólo II - Pinhal de Marrocos, Coimbra
关键词
Primary user detection; Primary user emulation; Security in cognitive radio; Spectrum sensing falsification;
D O I
10.1186/s13635-015-0021-0
中图分类号
学科分类号
摘要
Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most promising players by enabling the dynamic access to vacant frequency bands on a non-interference basis. However, the intrinsic characteristic of CR opens new ways for attackers, namely in the context of the effective detection of incumbent or primary users (PUs), the most fundamental and challenging requirement for the successful operation of CR networks. In this article, we provide a global and integrated vision of the main threats affecting CR environments in the context of the detection of primary users, with a particular focus on spectrum sensing data falsification and primary user emulation attacks. We also address solutions and research challenges still required to address such threats. Our discussion aims at being complete and self-contained, while also targeting readers with no specific background on this important topic of CR environments. It is, as far as our knowledge goes, the first work providing a global and clear vision of security threats and countermeasures in the context of primary user detection in CR. © 2015, Marinho et al.; licensee Springer.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Modeling and Comparison of Primary User Detection Techniques in Cognitive Radio Networks
    Wu, Tsai-Wei
    Lin, You-En
    Hsieh, Hung-Yun
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [42] Security threats and countermeasures of MAC layer in cognitive radio networks
    Manesh, Mohsen Riahi
    Kaabouch, Naima
    AD HOC NETWORKS, 2018, 70 : 85 - 102
  • [43] Detection of Primary User in Cognitive Radio Networks Under Correlated Noise
    Guan, Dongliang
    Xiong, Gang
    2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 156 - +
  • [44] Optimal Cooperative Detection of Primary User Emulation Attacks in Distributed Cognitive Radio Network
    Dang, Manman
    Zhao, Zhifeng
    Zhang, Honggang
    2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 368 - 373
  • [45] Survey of Security Issues in Cognitive Radio Networks
    El-Hajj, Wassim
    Safa, Haidar
    Guizani, Mohsen
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (02): : 181 - 198
  • [46] Cooperative detection of primary user emulation attacks based on channel-tap power in mobile cognitive radio networks
    Chin, Wen-Long
    Trong Nghia Le
    Tseng, Chun-Lin
    Kao, Wei-Che
    Tsai, Chun-Shen
    Kao, Chun-Wei
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2014, 15 (04) : 263 - 274
  • [47] A Survey of Security Issues in Cognitive Radio Networks
    LI Jianwu
    FENG Zebing
    FENG Zhiyong
    ZHANG Ping
    中国通信, 2015, 12 (03) : 132 - 150
  • [48] A Survey of Security issues in Cognitive Radio Networks
    Li Jianwu
    Feng Zebing
    Feng Zhiyong
    Zhang Ping
    CHINA COMMUNICATIONS, 2015, 12 (03) : 132 - 150
  • [49] Improved cooperative spectrum sensing under primary user emulation attacks in cognitive radio networks
    Orumwense, Efe
    Oyerinde, Olutayo
    Mneney, Stanley
    JOURNAL OF ENGINEERING RESEARCH, 2017, 5 (03): : 73 - 90
  • [50] Mitigating Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard
    Alahmadi, Ahmed
    Abdelhakim, Mai
    Ren, Jian
    Li, Tongtong
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 3229 - 3234