Skip to main content
Top

2020 | OriginalPaper | Chapter

Physical Layer Security of Cognitive IoT Networks

Authors : Güneş Karabulut Kurt, Özge Cepheli

Published in: Towards Cognitive IoT Networks

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet of Things (IoT) networks have the potential to drastically change our daily lives with a diverse set of applications. Healthcare, manufacturing, transportation and various other industries may encounter their impacts. As the IoT nodes evolve, it is only natural to expect an increase in their capabilities. Cognitive IoT (CIoT) networks contain IoT nodes with cognitive capabilities that can sense, and analyze the environment. These nodes can also act based on their analysis results. With such a potential, CIoT networks may also become a target for malicious users or attackers. In this chapter, we provide an overview of the main security requirements. Main attack types are summarized. Possible attacks on the CIoT nodes, including primary user emulation attacks, sensing data falsification attacks, objective function attacks and eavesdropping attacks are detailed. A case study targeting primary user emulation and sensing data falsification attacks based on a trust metric is detailed. Open issues are also highlighted.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gazis, V.: A survey of standards for machine-to-machine and the Internet of things. IEEE Commun. Surv. Tutor. 19(1), 482–511 (2017)CrossRef Gazis, V.: A survey of standards for machine-to-machine and the Internet of things. IEEE Commun. Surv. Tutor. 19(1), 482–511 (2017)CrossRef
4.
go back to reference IoT European Research Cluster, Digitising the Industry—Internet of Things Connecting the Physical, Digital and Virtual Worlds—IERC Cluster Book (2016) IoT European Research Cluster, Digitising the Industry—Internet of Things Connecting the Physical, Digital and Virtual Worlds—IERC Cluster Book (2016)
5.
go back to reference Chernyshev, M., Baig, Z., Bello, O., Zeadally, S.: Internet of things (IoT): research, simulators, and testbeds. IEEE Internet Things J. (2017) Chernyshev, M., Baig, Z., Bello, O., Zeadally, S.: Internet of things (IoT): research, simulators, and testbeds. IEEE Internet Things J. (2017)
6.
go back to reference Mitola, J., Maguire, G.Q.: Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)CrossRef Mitola, J., Maguire, G.Q.: Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)CrossRef
7.
go back to reference Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23(2), 201–220 (2005)CrossRef Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23(2), 201–220 (2005)CrossRef
8.
go back to reference Zhang, D., Chen, Z., Ren, J., Zhang, N., Awad, M.K., Zhou, H., Shen, X.S.: Energy-harvesting-aided spectrum sensing and data transmission in heterogeneous cognitive radio sensor network. IEEE Trans. Veh. Technol. 66(1), 831–843 (2017)CrossRef Zhang, D., Chen, Z., Ren, J., Zhang, N., Awad, M.K., Zhou, H., Shen, X.S.: Energy-harvesting-aided spectrum sensing and data transmission in heterogeneous cognitive radio sensor network. IEEE Trans. Veh. Technol. 66(1), 831–843 (2017)CrossRef
9.
go back to reference Amjad, M., Akhtar, F., Rehmani, M.H., Reisslein, M., Umer, T.: Full-duplex communication in cognitive radio networks: a survey. IEEE Commun. Surv, Tutor (2017)CrossRef Amjad, M., Akhtar, F., Rehmani, M.H., Reisslein, M., Umer, T.: Full-duplex communication in cognitive radio networks: a survey. IEEE Commun. Surv, Tutor (2017)CrossRef
10.
go back to reference Ali, A., Hamouda, W.: Advances on spectrum sensing for cognitive radio networks: theory and applications. IEEE Commun. Surv. Tutor. 19(2), 1277–1304 (2017)CrossRef Ali, A., Hamouda, W.: Advances on spectrum sensing for cognitive radio networks: theory and applications. IEEE Commun. Surv. Tutor. 19(2), 1277–1304 (2017)CrossRef
11.
go back to reference Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis, D., Foteinos, V., Poulios, G., Moessner, K., et al.: Enabling smart cities through a cognitive management framework for the Internet of things. IEEE Commun. Mag. 51(6), 102–111 (2013)CrossRef Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis, D., Foteinos, V., Poulios, G., Moessner, K., et al.: Enabling smart cities through a cognitive management framework for the Internet of things. IEEE Commun. Mag. 51(6), 102–111 (2013)CrossRef
12.
go back to reference Wu, Q., Ding, G., Xu, Y., Feng, S., Du, Z., Wang, J., Long, K.: Cognitive Internet of things: a new paradigm beyond connection. IEEE Internet Things J. 1(2), 129–143 (2014)CrossRef Wu, Q., Ding, G., Xu, Y., Feng, S., Du, Z., Wang, J., Long, K.: Cognitive Internet of things: a new paradigm beyond connection. IEEE Internet Things J. 1(2), 129–143 (2014)CrossRef
13.
go back to reference Khan, A.A., Rehmani, M.H., Rachedi, A.: When cognitive radio meets the Internet of things. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 469–474. IEEE (2016) Khan, A.A., Rehmani, M.H., Rachedi, A.: When cognitive radio meets the Internet of things. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 469–474. IEEE (2016)
14.
go back to reference Khan, A.A., Rehmani, M.H., Rachedi, A.: Cognitive-radio-based Internet of things: applications, architectures, spectrum related functionalities, and future research directions. IEEE Wirel. Commun. 24(3), 17–25 (2017)CrossRef Khan, A.A., Rehmani, M.H., Rachedi, A.: Cognitive-radio-based Internet of things: applications, architectures, spectrum related functionalities, and future research directions. IEEE Wirel. Commun. 24(3), 17–25 (2017)CrossRef
15.
go back to reference Feng, S., Setoodeh, P., Haykin, S.: Smart home: cognitive interactive people-centric Internet of things. IEEE Commun. Mag. 55(2), 34–39 (2017)CrossRef Feng, S., Setoodeh, P., Haykin, S.: Smart home: cognitive interactive people-centric Internet of things. IEEE Commun. Mag. 55(2), 34–39 (2017)CrossRef
16.
go back to reference Bala Krishna, M., Doja, M.N.: Symmetric key management and distribution techniques in wireless ad hoc networks. In: 2011 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 727–731, Oct 2011 Bala Krishna, M., Doja, M.N.: Symmetric key management and distribution techniques in wireless ad hoc networks. In: 2011 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 727–731, Oct 2011
17.
go back to reference Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO’84, pp. 47–53. Springer, Berlin (1984) Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO’84, pp. 47–53. Springer, Berlin (1984)
18.
go back to reference Franklin, M., Boneh, D.: Identity based encryption from weil pairing. In: Proceedings of CRYPTO 2001, pp. 213–239. Springer, Berlin (2001) Franklin, M., Boneh, D.: Identity based encryption from weil pairing. In: Proceedings of CRYPTO 2001, pp. 213–239. Springer, Berlin (2001)
19.
go back to reference Chen, Z., Nan, X.H.: CPK Identity Authentication. National Defence Industry Press, Beijing, China (2006) Chen, Z., Nan, X.H.: CPK Identity Authentication. National Defence Industry Press, Beijing, China (2006)
20.
go back to reference Nan, X.H., Chen, Z.: Identifier-based private key generating method and device, 20 July 2006. WO Patent: WO/2006/074, 611 Nan, X.H., Chen, Z.: Identifier-based private key generating method and device, 20 July 2006. WO Patent: WO/2006/074, 611
21.
go back to reference Acharya, R., Asha, K.: Data integrity and intrusion detection in wireless sensor networks. In: 16th IEEE International Conference on Networks, ICON 2008, pp. 1–5, Dec 2008 Acharya, R., Asha, K.: Data integrity and intrusion detection in wireless sensor networks. In: 16th IEEE International Conference on Networks, ICON 2008, pp. 1–5, Dec 2008
22.
go back to reference Chen, H., Fu, Z., Zhang, D.: Security and trust research in M2M system. In: 2011 IEEE International Conference on Vehicular Electronics and Safety (ICVES), pp. 286 –290, July 2011 Chen, H., Fu, Z., Zhang, D.: Security and trust research in M2M system. In: 2011 IEEE International Conference on Vehicular Electronics and Safety (ICVES), pp. 286 –290, July 2011
23.
go back to reference Spadacini, M., Savazzi, S., Nicoli, M., Nicoli, S.: Wireless networks for smart surveillance: technologies, protocol design and experiments. In: Wireless Communications and Networking Conference Workshops (WCNCW), pp. 214 –219, April 2012 Spadacini, M., Savazzi, S., Nicoli, M., Nicoli, S.: Wireless networks for smart surveillance: technologies, protocol design and experiments. In: Wireless Communications and Networking Conference Workshops (WCNCW), pp. 214 –219, April 2012
24.
go back to reference Mubarak, T.M., Sattar, S.A., Rao, G.A., Sajitha, M.: Intrusion detection: an energy efficient approach in heterogeneous WSN. In: 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT), pp. 1092–1096, March 2011 Mubarak, T.M., Sattar, S.A., Rao, G.A., Sajitha, M.: Intrusion detection: an energy efficient approach in heterogeneous WSN. In: 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT), pp. 1092–1096, March 2011
25.
go back to reference Cheng, X., Cao, K., Xu, J., Cui, G.: Analysis on the feasibility of denial of service of GPS receivers based on hidden messages. In: 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, ICCIT’09, pp. 363–368, Nov 2009 Cheng, X., Cao, K., Xu, J., Cui, G.: Analysis on the feasibility of denial of service of GPS receivers based on hidden messages. In: 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, ICCIT’09, pp. 363–368, Nov 2009
26.
go back to reference Zamani, M., Movahedi, M., Ebadzadeh, M., Pedram, H.: A DDoS-aware IDS model based on danger theory and mobile agents. In: 2009 International Conference on Computational Intelligence and Security, CIS’09, vol. 1, pp. 516–520, Dec 2009 Zamani, M., Movahedi, M., Ebadzadeh, M., Pedram, H.: A DDoS-aware IDS model based on danger theory and mobile agents. In: 2009 International Conference on Computational Intelligence and Security, CIS’09, vol. 1, pp. 516–520, Dec 2009
27.
go back to reference Kaur, G., Saxena, V., Gupta, J.P.: Anomaly detection in network traffic and role of wavelets. In: 2010 2nd International Conference on Computer Engineering and Technology (ICCET), vol. 7, pp. V7-46–V7-51, April 2010 Kaur, G., Saxena, V., Gupta, J.P.: Anomaly detection in network traffic and role of wavelets. In: 2010 2nd International Conference on Computer Engineering and Technology (ICCET), vol. 7, pp. V7-46–V7-51, April 2010
28.
go back to reference Kumar, S., Valdez, R., Gomez, O., Bose, S.: Survivability evaluation of wireless sensor network under DDoS attack. In: 2006 International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL 2006, p. 82, April 2006 Kumar, S., Valdez, R., Gomez, O., Bose, S.: Survivability evaluation of wireless sensor network under DDoS attack. In: 2006 International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL 2006, p. 82, April 2006
29.
go back to reference Roh, H., Jung, S.: Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks. In: 2010 International Conference on Information and Communication Technology Convergence (ICTC), pp. 482–483, Nov 2010 Roh, H., Jung, S.: Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks. In: 2010 International Conference on Information and Communication Technology Convergence (ICTC), pp. 482–483, Nov 2010
30.
go back to reference Franke, J., Kleinjung, T., Paar, C., Pelzl, J., Priplata, C., Stahlke, C.: Shark: a realizable special hardware sieving device for factoring 1024-bit integers. Cryptogr. Hardw. Embed. Syst.-CHES 2005, 119–130 (2005) Franke, J., Kleinjung, T., Paar, C., Pelzl, J., Priplata, C., Stahlke, C.: Shark: a realizable special hardware sieving device for factoring 1024-bit integers. Cryptogr. Hardw. Embed. Syst.-CHES 2005, 119–130 (2005)
31.
go back to reference Kotenko, I., Stepashkin, M., Doynikova, E.: Security analysis of information systems taking into account social engineering attacks. In: 2011 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 611–618, Feb 2011 Kotenko, I., Stepashkin, M., Doynikova, E.: Security analysis of information systems taking into account social engineering attacks. In: 2011 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 611–618, Feb 2011
32.
go back to reference Proano, A., Lazos, L.: Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secur. Comput. 9(1), 101–114, Jan–Feb 2012 Proano, A., Lazos, L.: Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secur. Comput. 9(1), 101–114, Jan–Feb 2012
33.
go back to reference Kurita, S., Komoriya, K., Uda, R.: Privacy protection on transfer system of automated teller machine from brute force attack. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 72–77, March 2012 Kurita, S., Komoriya, K., Uda, R.: Privacy protection on transfer system of automated teller machine from brute force attack. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 72–77, March 2012
34.
go back to reference Huang, X., Shah, P.G., Sharma, D.: Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In: 2010 4th International Conference on Network and System Security (NSS), pp. 588–593, Sept 2010 Huang, X., Shah, P.G., Sharma, D.: Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In: 2010 4th International Conference on Network and System Security (NSS), pp. 588–593, Sept 2010
35.
go back to reference Liu, C.-H., Huang, Y.-Z.: The analysis for DoS and DDoS attacks of WLAN. In: 2010 Second International Conference on Multimedia and Information Technology (MMIT), vol. 2, pp. 108–111, April 2010 Liu, C.-H., Huang, Y.-Z.: The analysis for DoS and DDoS attacks of WLAN. In: 2010 Second International Conference on Multimedia and Information Technology (MMIT), vol. 2, pp. 108–111, April 2010
36.
go back to reference Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: ACM SIGCOMM Computer Communication Review, vol. 34, pp. 219–230. ACM (2004) Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: ACM SIGCOMM Computer Communication Review, vol. 34, pp. 219–230. ACM (2004)
37.
go back to reference Yucek, T., Arslan, H.: A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surv. Tutor. 11(1), 116–130 (2009)CrossRef Yucek, T., Arslan, H.: A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surv. Tutor. 11(1), 116–130 (2009)CrossRef
38.
go back to reference Zhao, Q., Sadler, B.: A survey of dynamic spectrum access. IEEE Signal Process. Mag. 24(3), 79–89 (2007)CrossRef Zhao, Q., Sadler, B.: A survey of dynamic spectrum access. IEEE Signal Process. Mag. 24(3), 79–89 (2007)CrossRef
39.
go back to reference Zou, Y., Zhu, J., Yang, L., Liang, Y.C., Yao, Y.D.: Securing physical-layer communications for cognitive radio networks. IEEE Commun. Mag. 53(9), 48–54 (2015)CrossRef Zou, Y., Zhu, J., Yang, L., Liang, Y.C., Yao, Y.D.: Securing physical-layer communications for cognitive radio networks. IEEE Commun. Mag. 53(9), 48–54 (2015)CrossRef
41.
go back to reference Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(I), 25 (2008) Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(I), 25 (2008)
42.
go back to reference Soto, J., Queiroz, S., Nogueira, M.: Managing sensing and cooperation to analyze pue attacks in cognitive radio ad hoc networks. In: 2012 8th International Conference on Network and Service Management (CNSM) and 2012 Workshop on Systems Virtualiztion Management (SVM), pp. 219–223 (2012) Soto, J., Queiroz, S., Nogueira, M.: Managing sensing and cooperation to analyze pue attacks in cognitive radio ad hoc networks. In: 2012 8th International Conference on Network and Service Management (CNSM) and 2012 Workshop on Systems Virtualiztion Management (SVM), pp. 219–223 (2012)
43.
go back to reference Hao, D., Sakurai, K.: A differential game approach to mitigating primary user emulation attacks in cognitive radio networks. In: 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), pp. 495–502 (2012) Hao, D., Sakurai, K.: A differential game approach to mitigating primary user emulation attacks in cognitive radio networks. In: 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), pp. 495–502 (2012)
44.
go back to reference Yu, R., Zhang, Y., Liu, Y., Gjessing, S., Guizani, M.: Securing cognitive radio networks against primary user emulation attacks. IEEE Netw. 30(6), 62–69 (2016)CrossRef Yu, R., Zhang, Y., Liu, Y., Gjessing, S., Guizani, M.: Securing cognitive radio networks against primary user emulation attacks. IEEE Netw. 30(6), 62–69 (2016)CrossRef
45.
go back to reference Qin, Z., Li, Q., Hsieh, G.: Defending against cooperative attacks in cooperative spectrum sensing. IEEE Trans. Wirel. Commun. 12(6), 2680–2687 (2013)CrossRef Qin, Z., Li, Q., Hsieh, G.: Defending against cooperative attacks in cooperative spectrum sensing. IEEE Trans. Wirel. Commun. 12(6), 2680–2687 (2013)CrossRef
46.
go back to reference Duan, L., Min, A.W., Huang, J., Shin, K.G.: Attack prevention for collaborative spectrum sensing in cognitive radio networks. IEEE J. Sel. Areas Commun. 30(9), 1658–1665 (2012)CrossRef Duan, L., Min, A.W., Huang, J., Shin, K.G.: Attack prevention for collaborative spectrum sensing in cognitive radio networks. IEEE J. Sel. Areas Commun. 30(9), 1658–1665 (2012)CrossRef
47.
go back to reference Cepheli, Ö., Kurt, G.K.: Physical layer security in cognitive radio networks: a beamforming approach. In: 2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom), pp. 233–237 (2013) Cepheli, Ö., Kurt, G.K.: Physical layer security in cognitive radio networks: a beamforming approach. In: 2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom), pp. 233–237 (2013)
48.
go back to reference Clancy, T.C., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: IEEE Crowncom, pp. 1–8, May 2008 Clancy, T.C., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: IEEE Crowncom, pp. 1–8, May 2008
49.
go back to reference Leon, O., Serrano, J.H., Soriano, M.: Securing cognitive radio networks. Intl. J. Commun. Syst. 23, 633 (2010) Leon, O., Serrano, J.H., Soriano, M.: Securing cognitive radio networks. Intl. J. Commun. Syst. 23, 633 (2010)
50.
go back to reference El-Hajj, W., Safa, H., Guizani, M.: Survey of security issues in cognitive radio networks. J. Internet Tech. 12(2) 25–37 (2011). On Physical Layer Security for Cognitive Radio Networks El-Hajj, W., Safa, H., Guizani, M.: Survey of security issues in cognitive radio networks. J. Internet Tech. 12(2) 25–37 (2011). On Physical Layer Security for Cognitive Radio Networks
51.
go back to reference Xu, W., et al.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 3rd ACM Workshop on Wireless Security, Philadelphia, PA, pp. 80–89, Jan 2004 Xu, W., et al.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 3rd ACM Workshop on Wireless Security, Philadelphia, PA, pp. 80–89, Jan 2004
52.
go back to reference Brown, T.X., Sethi, A.: Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi- dimensional analysis and assessment. Mob. Netw. Appl. 13(5), 516–532 (2008)CrossRef Brown, T.X., Sethi, A.: Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi- dimensional analysis and assessment. Mob. Netw. Appl. 13(5), 516–532 (2008)CrossRef
53.
go back to reference Sampath, A., Dai, H., Zheng, H., Zhao, B.Y.: Multi-channel jamming attacks using cognitive radios. In: IEEE ICCCN, pp. 352–357, Aug 2007 Sampath, A., Dai, H., Zheng, H., Zhao, B.Y.: Multi-channel jamming attacks using cognitive radios. In: IEEE ICCCN, pp. 352–357, Aug 2007
54.
go back to reference Di Pietro, R., Oligeri, G.: Jamming mitigation in cognitive radio networks. IEEE Netw. 27(3), 10–15 (2013)CrossRef Di Pietro, R., Oligeri, G.: Jamming mitigation in cognitive radio networks. IEEE Netw. 27(3), 10–15 (2013)CrossRef
55.
go back to reference Cepheli, Ö., Tedik, S., Kurt, G.K.: A high data rate wireless communication system with improved secrecy: full duplex beamforming. IEEE Commun. Lett. 18(6), 1075–1078 (2014) Cepheli, Ö., Tedik, S., Kurt, G.K.: A high data rate wireless communication system with improved secrecy: full duplex beamforming. IEEE Commun. Lett. 18(6), 1075–1078 (2014)
56.
go back to reference Cepheli, Ö., Kurt, G.K., Dartmann, G., Ascheid, G.: A joint optimization scheme for artificial noise and transmit filter for half and full duplex wireless cyber physical systems. IEEE Trans. Sustain. Comput. 3(2) (2018) Cepheli, Ö., Kurt, G.K., Dartmann, G., Ascheid, G.: A joint optimization scheme for artificial noise and transmit filter for half and full duplex wireless cyber physical systems. IEEE Trans. Sustain. Comput. 3(2) (2018)
57.
go back to reference Mathur, C.N., Subbalakshmi, K.P.: Digital signatures for centralized DSA networks. In: First IEEE Workshop on Cognitive Radio Networks, Nevada, USA, Jan, Las Vegas, pp. 1037–1041 (2007) Mathur, C.N., Subbalakshmi, K.P.: Digital signatures for centralized DSA networks. In: First IEEE Workshop on Cognitive Radio Networks, Nevada, USA, Jan, Las Vegas, pp. 1037–1041 (2007)
58.
go back to reference Cepheli, Ö., Dartmann, G., Kurt, G.K., Ascheid, G.: An encryption aware physical layer security system. In: IEEE International Conference on Communications (ICC) Workshop, Paris, France, 21–25 May 2017 Cepheli, Ö., Dartmann, G., Kurt, G.K., Ascheid, G.: An encryption aware physical layer security system. In: IEEE International Conference on Communications (ICC) Workshop, Paris, France, 21–25 May 2017
59.
go back to reference Gokceli, S., Cepheli, Ö., Tedik Basaran, S., Kurt, G.K., Dartmann, G., Ascheid, G.: How effective is the artificial noise? Real-time analysis of a PHY security scenario. In: 5th IEEE GLOBECOM Workshop on Trusted Communications with Physical Layer Security, Singapore, 4–8 Dec 2017 Gokceli, S., Cepheli, Ö., Tedik Basaran, S., Kurt, G.K., Dartmann, G., Ascheid, G.: How effective is the artificial noise? Real-time analysis of a PHY security scenario. In: 5th IEEE GLOBECOM Workshop on Trusted Communications with Physical Layer Security, Singapore, 4–8 Dec 2017
61.
go back to reference Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 66–77. ACM (2004) Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 66–77. ACM (2004)
Metadata
Title
Physical Layer Security of Cognitive IoT Networks
Authors
Güneş Karabulut Kurt
Özge Cepheli
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-42573-9_8