CFP last date
20 May 2024
Reseach Article

Cognitive Radio Networks Security Threats and Attacks: A Review

Published on October 2014 by Suchismita Bhattacharjee, Roshni Rajkumari, Ningrinla Marchang
International Conference on Information and Communication Technologies
Foundation of Computer Science USA
ICICT - Number 2
October 2014
Authors: Suchismita Bhattacharjee, Roshni Rajkumari, Ningrinla Marchang
24c912eb-71c5-43f9-84fa-a41447831ab6

Suchismita Bhattacharjee, Roshni Rajkumari, Ningrinla Marchang . Cognitive Radio Networks Security Threats and Attacks: A Review. International Conference on Information and Communication Technologies. ICICT, 2 (October 2014), 16-19.

@article{
author = { Suchismita Bhattacharjee, Roshni Rajkumari, Ningrinla Marchang },
title = { Cognitive Radio Networks Security Threats and Attacks: A Review },
journal = { International Conference on Information and Communication Technologies },
issue_date = { October 2014 },
volume = { ICICT },
number = { 2 },
month = { October },
year = { 2014 },
issn = 0975-8887,
pages = { 16-19 },
numpages = 4,
url = { /proceedings/icict/number2/17969-1413/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Information and Communication Technologies
%A Suchismita Bhattacharjee
%A Roshni Rajkumari
%A Ningrinla Marchang
%T Cognitive Radio Networks Security Threats and Attacks: A Review
%J International Conference on Information and Communication Technologies
%@ 0975-8887
%V ICICT
%N 2
%P 16-19
%D 2014
%I International Journal of Computer Applications
Abstract

Cognitive Radio (CR) is a technology that promises to solve the spectrum shortage problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It aims to improve the utilization of the radio spectrum. Although the operational aspects of CR are being explored widely, its security aspects have gained little attention. In this survey, we present a comprehensive list of major known security threats and attacks within a Cognitive Radio Network (CRN). Our objective in this paper is to analyze the security issues of the main recent developments (which includes attacks and mitigations) of Cognitive Radio Networks. We hope that this survey paper can provide the insight and the roadmap for future research efforts in the emerging field of CRN security and utility.

References
  1. I. F. Alyildiz et al. , A survey on Spectrum Management in Cognitive Radio Networks, IEEE Communication Magazine, pp. 40-48, April 2008.
  2. I. F. Akyildiz et al. , NeXt Generation/Dynamic Spectrum Ac- cess/Cognitive Radio Wireless Networks: A Survey, Elsevier Jl. on Comp. Networks, vol-50, pp. 2127-2159, September 2006.
  3. Q. Zhao and M. Brian Sadler, A survey of dynamic spectrum Access, IEEE Signal Processing Magazine, vol. 24, pp. 79- 89, May 2007.
  4. J. Mitola, Software Radios: Wireless Architecture for the 21st century, New York Wiley, 2000.
  5. Y. Zhang, G. Xa and X. Creng, Security threats in Cognitive Radio Networks, In10th IEEE International Conference on High Performance Computing and Processing(HPCC 2008) Dalian, China, Sept. 2008, pp. 1036-1041.
  6. R. Chen, Y. Thomas and J. Park, Ensuring Trustworthy Spec- trum Sensing in Cognitive Radio Networks, First IEEE work- shop on Networking Technologies for Software defined Radio Network(SDR), Reston, VA, Sept. 2006, pp. 1-11.
  7. R. Chen, Enhancing Attack Resilience in Cognitive Radio Network, Dissertion, Virginia Poly technique Institute and State University, Blocksburg, VA, 2008.
  8. T. Charles Clancy and N. Goergen, Security in Cognitive Ra- dio Networks: Threats and Mitigation, 3rd International Con- ference on Cognitive Radio Oriented Wireless Networks and Communications, Singapore, May 2008, pp. 1-8.
  9. S. Haykin, Cognitive Radio: Brain-Empowered Wireless Communications, IEEE Jl. on Sel. Areas in Communication, vol. 23, no. 2, pp. 201-220, Feb. 2005.
  10. J. L. Burbank, Security in Cognitive Radio Networks: The re- quired Evolution in approaches to wireless Network Security, Johns Hopkins University, MD, 2012.
  11. K. Pelechrinis, M. Iliofotou and S. V. Krishnamurthy, Denial of Service Attacks in Wireless Networks: The Case of Jam- mer, In IEEE Communication Surveys and Tutorials, vol. 13, pp. 245-257, April 2011.
  12. A. C. Toleda and X. Wang, Robust detection of Selfish misbe- havior in Wireless networks, IEEE Journal on Selected Areas in Communication, vol. 25, pp. 1124-1134, August 2007.
  13. C. Karlof and D. Wagner, Securing Routing in Wireless Sen- sor Networks: Attacks and Countermeasures, in Proceed- ings of the 1st IEEE International Workshop on Sensor Net- work Protocols and Applications, Berkeley, CA, May-2003, pp. 113-127.
  14. N. Chetan Mathur and K. P. Subbalakshmi, Security Issues in Cognitive Radio Networks, Stevens Institute of Technology, NJ, USA, 2007.
  15. W. Wang, Denial of Service attacks in cognitive radio net- works, in International Conference on Environmental Science and Information Application Technology(ESIAT), 2010, pp. 530-533.
  16. K. Bian and J. Park, MAC-layer Misbehaviors in Multi- hop Cognitive Radio Networks, in Proceedings of US- Korea Con- ference on Science, Technology and Enterpreneurship (UKC 2006), August 2006, pp. 1-8.
  17. O. Leon, J. Hernandez-Serrano and M. Soriano, Securing Cognitive Radio Networks, International Journal of Commu- nication Systems. vol. 23, pp. 116-130.
  18. R. Chen, J. Park, Y. Thomas and H. Jeffrey, Towards Secure Distributed Spectrum Sensing in Cognitive radio Networks, IEEE Communication Magazine, vol. 46, pp. 50-55, 2008.
  19. A. Rawat, P. Anand, H. Chen and P. Varshney, Countering Byzantine Attack in Cognitive Radio Network, IEEE Inter- national Conference on Acoustic Speech and Signal Process- ing(ICASSP), Dallas, TX, Mar. 2010, pp. 3098-3101.
  20. J. Hernandez-Serrano, O. Leon and M. Soriano, Modeling the Lion Attack in Cognitive Radio Networks, Journal on Wire- less Communications and Networking, pp. 1-10, 2011.
  21. T. Yucek and H. Arslam, A survey of Spectrum Sensing Al- gorithms for cognitive radio applications, IEEE Communi- cations surveys and tutorials, vol. 11, No. 1, pp. 116-130, First Quarter 2009.
  22. K. Pramod Varshney, Distributed Detection and data fusion, Springer, verlag, New York, 1997.
  23. S. Marti, T. Giuli, K. Lai and M. Baker, Mitigating routing misbehaviour in mobile ad hoc networks, in 6th ACM Inter- national Conference on Mobile Computing and Networking, Aug 2000, pp. 255- 265.
  24. S. Farahmand, G. Giannaris and X. Wang, Max-Min Strategies for power-limited games in the presence of correlated jam- ming, in 41st IEEE Conference Information Science and Sys- tems, 2007, pp. 300-305.
  25. X. Wenyuan, W. Trappe, Y. Zhang and T. Wood, The Feasibil- ity of launching and Detecting Jamming Attacks in Wire- less Networks, in Proceedings of 6th ACM International Sympo- sium on Mobile Ad hoc Networking and Computing, Urbana, IL, May 2005, pp. 46-57.
  26. L. Zhu and H. Zhou, Two types of attacks against Cogni- tive Radio Network MAC Protocols, in International Confer- ence on Computer Science and Software Engineering, vol. 4, Wuhan,China,Decembe. 2008, pp. 1110-1113.
  27. O. Uretan, N. Serinken, Wireless Security through RF finger- printing, Canadian Journal of Winter Electrical and Computer Engineering, 2007, vol. 32, pp. 27-33.
Index Terms

Computer Science
Information Sciences

Keywords

Cognitive Radio Cognitive Radio Network Security