Skip to main content

2019 | OriginalPaper | Buchkapitel

23. Cognitive Radio Network Security

verfasst von : Olga León, K. P. Subbalakshmi

Erschienen in: Handbook of Cognitive Radio

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cognitive radio networks (CRNs) emerge as a possible solution to increase spectrum efficiency by allowing cognitive radios (CRs) to access spectrum in an opportunistic manner. Although security in CRNs has received less attention than other areas of CR technology, the need for addressing security issues is evidenced by two facts. First, as for any other type of wireless network, an open channel is used for communications that can easily be accessed by attackers. On the other hand, the particular attributes of CRNs raise new opportunities to malicious users, which can disrupt network operation. In this chapter, we provide an overview of those threats that are specific to CRNs. We classify them according to the layer in which the attacks are performed, give an insight of their impact on the network performance, and describe potential countermeasures that can be used to prevent them or mitigate their effect.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat 802.22 WG (2015) IEEE Standard for Information Technology – Telecommunications and Information Exchange Between Systems Wireless Regional Area Networks (WRAN) – Specific Requirements Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands. http://ieeexplore.ieee.org. Cited 15 Nov 2016 802.22 WG (2015) IEEE Standard for Information Technology – Telecommunications and Information Exchange Between Systems Wireless Regional Area Networks (WRAN) – Specific Requirements Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands. http://​ieeexplore.​ieee.​org. Cited 15 Nov 2016
3.
Zurück zum Zitat Akyildiz IF, Lee W-Y, Chowdhury KR (2009) CRAHNs: cognitive radio ad hoc networks. Ad Hoc Netw 7(5):810–836CrossRef Akyildiz IF, Lee W-Y, Chowdhury KR (2009) CRAHNs: cognitive radio ad hoc networks. Ad Hoc Netw 7(5):810–836CrossRef
4.
Zurück zum Zitat Akyildiz IF, Lee W-Y, Vuran MC, Mohanty S (2006) NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Comput Netw 50(13):2127–2159CrossRef Akyildiz IF, Lee W-Y, Vuran MC, Mohanty S (2006) NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Comput Netw 50(13):2127–2159CrossRef
6.
Zurück zum Zitat Anand S, Jin Z, Subbalakshmi KP (2008) An analytical model for primary user emulation attacks in cognitive radio networks. Paper Presented at the 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, Chicago, 14–17 Oct 2008 Anand S, Jin Z, Subbalakshmi KP (2008) An analytical model for primary user emulation attacks in cognitive radio networks. Paper Presented at the 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, Chicago, 14–17 Oct 2008
7.
Zurück zum Zitat Baldini G, Sturman T, Biswas AR, Leschhorn R, Godor G, Street M (2012) Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Commun Surv Tutorials 14(2):355–379CrossRef Baldini G, Sturman T, Biswas AR, Leschhorn R, Godor G, Street M (2012) Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Commun Surv Tutorials 14(2):355–379CrossRef
8.
Zurück zum Zitat Bhattacharjee S, Sengupta S, Chatterjee M (2013) Vulnerabilities in cognitive radio networks: a survey. Comput Commun 36(13):1387–1398CrossRef Bhattacharjee S, Sengupta S, Chatterjee M (2013) Vulnerabilities in cognitive radio networks: a survey. Comput Commun 36(13):1387–1398CrossRef
9.
Zurück zum Zitat Brawerman A, Blough D, Bing B (2004) Securing the download of radio configuration files for software defined radio devices. In: Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, Philadelphia, 1 Oct 2004 Brawerman A, Blough D, Bing B (2004) Securing the download of radio configuration files for software defined radio devices. In: Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, Philadelphia, 1 Oct 2004
10.
Zurück zum Zitat Chen R, Park JM, Bian K (2008) Robust distributed spectrum sensing in cognitive radio networks. In: Proceedings of the IEEE 27th Conference on Computer Communications (INFOCOM 2008), Phoenix, 16–17 Apr 2008 Chen R, Park JM, Bian K (2008) Robust distributed spectrum sensing in cognitive radio networks. In: Proceedings of the IEEE 27th Conference on Computer Communications (INFOCOM 2008), Phoenix, 16–17 Apr 2008
11.
Zurück zum Zitat Chen R, Park J-M, Hou YT, Reed JH (2008) Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun Mag 46(4):50–55CrossRef Chen R, Park J-M, Hou YT, Reed JH (2008) Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun Mag 46(4):50–55CrossRef
12.
Zurück zum Zitat Chen R, Park J-M, Reed JH (2008) Defense against primary user emulation attacks in cognitive radio networks. IEEE J Sel Areas Commun 26(1):25–37CrossRef Chen R, Park J-M, Reed JH (2008) Defense against primary user emulation attacks in cognitive radio networks. IEEE J Sel Areas Commun 26(1):25–37CrossRef
13.
Zurück zum Zitat Chen H, Zhou M, Xie L, Wang K, Li J (2016) Joint spectrum sensing and resource allocation scheme in cognitive radio networks with spectrum sensing data falsification attack. IEEE Trans Veh Technol 65(11):9181–9191CrossRef Chen H, Zhou M, Xie L, Wang K, Li J (2016) Joint spectrum sensing and resource allocation scheme in cognitive radio networks with spectrum sensing data falsification attack. IEEE Trans Veh Technol 65(11):9181–9191CrossRef
14.
Zurück zum Zitat Cho J-H, Swami A, Chen R (2011) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutorials 13(4):562–583CrossRef Cho J-H, Swami A, Chen R (2011) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutorials 13(4):562–583CrossRef
15.
Zurück zum Zitat Dillinger M, Madani K, Alonistioti N (2005) Software defined radio: architectures, systems and functions. Wiley, Hoboken Dillinger M, Madani K, Alonistioti N (2005) Software defined radio: architectures, systems and functions. Wiley, Hoboken
16.
Zurück zum Zitat Di Pietro R, Oligeri G (2013) Jamming mitigation in cognitive radio networks. IEEE Netw 27(3):10–15CrossRef Di Pietro R, Oligeri G (2013) Jamming mitigation in cognitive radio networks. IEEE Netw 27(3):10–15CrossRef
17.
Zurück zum Zitat Fragkiadakis AG, Tragos EZ, Askoxylakis IG (2013) A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun Surv Tutorials 15(1):428–445CrossRef Fragkiadakis AG, Tragos EZ, Askoxylakis IG (2013) A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun Surv Tutorials 15(1):428–445CrossRef
18.
Zurück zum Zitat Grover K, Lim A, Yang Q (2014) Jamming and anti–jamming techniques in wireless networks: a survey. N Engl J Med 17(4):197–215 Grover K, Lim A, Yang Q (2014) Jamming and anti–jamming techniques in wireless networks: a survey. N Engl J Med 17(4):197–215
20.
Zurück zum Zitat Kaligineedi P, Khabbazian M, Bhargava VK (2008) Secure cooperative sensing techniques for cognitive radio systems. Paper Presented at the IEEE International Conference on Communications (ICC’08), Beijing, 19–23 May 2008 Kaligineedi P, Khabbazian M, Bhargava VK (2008) Secure cooperative sensing techniques for cognitive radio systems. Paper Presented at the IEEE International Conference on Communications (ICC’08), Beijing, 19–23 May 2008
21.
Zurück zum Zitat Kaligineedi P, Khabbazian M, Bhargava VK (2010) Malicious user detection in a cognitive radio cooperative sensing system. IEEE Trans Wirel Commun 9(8):2488–2497CrossRef Kaligineedi P, Khabbazian M, Bhargava VK (2010) Malicious user detection in a cognitive radio cooperative sensing system. IEEE Trans Wirel Commun 9(8):2488–2497CrossRef
22.
Zurück zum Zitat Kramer RM, Cook KS (2004) Trust and distrust in organizations: dilemmas and approaches. The future of modern genomics. Russell Sage Foundation, New York Kramer RM, Cook KS (2004) Trust and distrust in organizations: dilemmas and approaches. The future of modern genomics. Russell Sage Foundation, New York
23.
Zurück zum Zitat Lee J-H (2015) Cooperative relaying protocol for improving physical layer security in wireless decode-and-forward relaying networks. Wirel Pers Commun 83(4):3033–3044CrossRef Lee J-H (2015) Cooperative relaying protocol for improving physical layer security in wireless decode-and-forward relaying networks. Wirel Pers Commun 83(4):3033–3044CrossRef
24.
Zurück zum Zitat Marinho J, Granjal J, Monteiro E (2015) A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP J Inf Secur 2015(1):1–14CrossRef Marinho J, Granjal J, Monteiro E (2015) A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP J Inf Secur 2015(1):1–14CrossRef
25.
Zurück zum Zitat Michael LB, Mihaljevic MJ, Haruyama S, Kohno R (2002) A framework for secure download for software-defined radio. IEEE Commun Mag 40(7):88–96CrossRef Michael LB, Mihaljevic MJ, Haruyama S, Kohno R (2002) A framework for secure download for software-defined radio. IEEE Commun Mag 40(7):88–96CrossRef
26.
Zurück zum Zitat Michiardi P, Molva R (2003) Secure cooperative sensing techniques for cognitive radio systems. In: Proceedings of WiOpt 2003, INRIA, Sophia-Antipolis, 3–5 May 2003 Michiardi P, Molva R (2003) Secure cooperative sensing techniques for cognitive radio systems. In: Proceedings of WiOpt 2003, INRIA, Sophia-Antipolis, 3–5 May 2003
27.
Zurück zum Zitat Min AW, Shin KG, Hu X (2010) Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation. IEEE Trans Mob Comput 10(10):1434–1447CrossRef Min AW, Shin KG, Hu X (2010) Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation. IEEE Trans Mob Comput 10(10):1434–1447CrossRef
28.
Zurück zum Zitat Mitchell C (2005) Trusted computing. Iet, London Mitchell C (2005) Trusted computing. Iet, London
29.
Zurück zum Zitat Patwari N, Ash JN, Kyperountas S, Hero AO III, Moses RL, Correal NS (2005) Locating the nodes: cooperative localization in wireless sensor networks. Signal Process Mag 22(4):54–69CrossRef Patwari N, Ash JN, Kyperountas S, Hero AO III, Moses RL, Correal NS (2005) Locating the nodes: cooperative localization in wireless sensor networks. Signal Process Mag 22(4):54–69CrossRef
30.
Zurück zum Zitat Pelechrinis K, Koutsopoulos I, Broustis I, Krishnamurthy SV (2009) Lightweight jammer localization in wireless networks: system design and implementation. In: Proceedings of the Global Telecommunications Conference (GLOBECOM 2009), Hawai, 30 Nov–4 Dec 2009 Pelechrinis K, Koutsopoulos I, Broustis I, Krishnamurthy SV (2009) Lightweight jammer localization in wireless networks: system design and implementation. In: Proceedings of the Global Telecommunications Conference (GLOBECOM 2009), Hawai, 30 Nov–4 Dec 2009
32.
Zurück zum Zitat Rawat AS, Anand P, Hao C, Varshney PK (2011) Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks. IEEE Trans Signal Process 59(2):774–786MathSciNetCrossRef Rawat AS, Anand P, Hao C, Varshney PK (2011) Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks. IEEE Trans Signal Process 59(2):774–786MathSciNetCrossRef
33.
Zurück zum Zitat Sawada M, Cossette D, Wellar B, Kurt T (2006) Analysis of the urban/rural broadband divide in Canada: using GIS in planning terrestrial wireless deployment. Gov Inf Q 23(3):454–479CrossRef Sawada M, Cossette D, Wellar B, Kurt T (2006) Analysis of the urban/rural broadband divide in Canada: using GIS in planning terrestrial wireless deployment. Gov Inf Q 23(3):454–479CrossRef
34.
Zurück zum Zitat Song C, Zhang Q (2009) Achieving cooperative spectrum sensing in wireless cognitive radio networks. ACM SIGMOBILE Mob Comput Commun Rev 13(2):14–25CrossRef Song C, Zhang Q (2009) Achieving cooperative spectrum sensing in wireless cognitive radio networks. ACM SIGMOBILE Mob Comput Commun Rev 13(2):14–25CrossRef
35.
Zurück zum Zitat Walters JP, Liang Z, Shi W, Chaudhary V (2007) Wireless sensor network security: a survey. Secur Distrib Grid Mob Pervasive Comput 1:367 Walters JP, Liang Z, Shi W, Chaudhary V (2007) Wireless sensor network security: a survey. Secur Distrib Grid Mob Pervasive Comput 1:367
36.
Zurück zum Zitat Wang W, Bhattacharjee S, Chatterjee M, Kwiat K (2013) Collaborative jamming and collaborative defense in cognitive radio networks. Pervasive Mob Comput 9(4):572–587CrossRef Wang W, Bhattacharjee S, Chatterjee M, Kwiat K (2013) Collaborative jamming and collaborative defense in cognitive radio networks. Pervasive Mob Comput 9(4):572–587CrossRef
37.
Zurück zum Zitat Wang B, Wu Y, Liu KJR, Clancy TC (2011) An anti-jamming stochastic game for cognitive radio networks. IEEE J Sel Areas Commun 29(4):877–889CrossRef Wang B, Wu Y, Liu KJR, Clancy TC (2011) An anti-jamming stochastic game for cognitive radio networks. IEEE J Sel Areas Commun 29(4):877–889CrossRef
38.
Zurück zum Zitat Yifeng C, Yijun M, Ota K, Changqing L, Mianxiong D, Yang L (2014) Optimal data fusion of collaborative spectrum sensing under attack in cognitive radio networks. IEEE Netw 28(1):17–23CrossRef Yifeng C, Yijun M, Ota K, Changqing L, Mianxiong D, Yang L (2014) Optimal data fusion of collaborative spectrum sensing under attack in cognitive radio networks. IEEE Netw 28(1):17–23CrossRef
40.
Zurück zum Zitat Zhang L, Ding G, Wu Q, Zou Y, Han Z, Wang J (2015) Byzantine attack and defense in cognitive radio networks: a survey. IEEE Commun Surv Tutorials 17(3):1342–1363CrossRef Zhang L, Ding G, Wu Q, Zou Y, Han Z, Wang J (2015) Byzantine attack and defense in cognitive radio networks: a survey. IEEE Commun Surv Tutorials 17(3):1342–1363CrossRef
41.
Zurück zum Zitat Zhang T, Li Z, Safavi-Naini R (2014) Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing. In: Proceedings of IEEE Conference on Computer Communications (INFOCOM 2014), Toronto, 27 Apr–2 May 2014 Zhang T, Li Z, Safavi-Naini R (2014) Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing. In: Proceedings of IEEE Conference on Computer Communications (INFOCOM 2014), Toronto, 27 Apr–2 May 2014
42.
Zurück zum Zitat Zhang W, Mallik RK, Letaief K (2008) Cooperative spectrum sensing optimization in cognitive radio networks. In: Proceedings of the IEEE International Conference on Communications (ICC 2008), Beijing, 19–23 May 2008 Zhang W, Mallik RK, Letaief K (2008) Cooperative spectrum sensing optimization in cognitive radio networks. In: Proceedings of the IEEE International Conference on Communications (ICC 2008), Beijing, 19–23 May 2008
43.
Zurück zum Zitat Zhang K, Mao Y, Leng S, Fang S (2013) Efficient anti-jamming strategies in multi-channel wireless networks. In: Proceedings of the 2013 International Conference on Computational Problem-solving (ICCP), Jiuzhai, 22–23 Oct 2013 Zhang K, Mao Y, Leng S, Fang S (2013) Efficient anti-jamming strategies in multi-channel wireless networks. In: Proceedings of the 2013 International Conference on Computational Problem-solving (ICCP), Jiuzhai, 22–23 Oct 2013
44.
Zurück zum Zitat Zou Y, Zhu J (2016) Physical-layer security for cooperative relay networks. Springer, BerlinCrossRef Zou Y, Zhu J (2016) Physical-layer security for cooperative relay networks. Springer, BerlinCrossRef
Metadaten
Titel
Cognitive Radio Network Security
verfasst von
Olga León
K. P. Subbalakshmi
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-1394-2_23

Neuer Inhalt