Skip to main content

2016 | OriginalPaper | Buchkapitel

Security Issues in Cognitive Radio: A Review

verfasst von : Shriraghavan Madbushi, Rajeshree Raut, M. S. S. Rukmini

Erschienen in: Microelectronics, Electromagnetics and Telecommunications

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Electromagnetic spectrum is a scarce, important and a very useful resource. However, this resource has not been utilized effectively or in other words most of the spectrum remains vacant. Due to fixed or licensed spectrum allocation the spectrum remains vacant for a considerable amount of time. Cognitive radio, a wireless and an intelligent technology was proposed by Joseph Mitola to make efficient use of spectrum. The use of EM wave as a transmission medium makes security a major concern in Cognitive Radio as these are easily susceptible to attacks. Also, being a flexible wireless network technology it is susceptible to traditional threats as well as unique attacks which will have an adverse effects on its performance. This paper introduces the Cognitive Radio technology and mainly focuses on security issues related to it. Further, we present a layered classification of security issues of this exciting area of communication technology.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat A. Fragkiadakis, E. Tragos, I. Askoxylakis, A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks. IEEE Commun. Surv. Tutorials PP(99), 1–18 (2012) A. Fragkiadakis, E. Tragos, I. Askoxylakis, A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks. IEEE Commun. Surv. Tutorials PP(99), 1–18 (2012)
2.
Zurück zum Zitat T. Clancy, N. Goergen, Security in cognitive radio networks: threats and mitigation. in Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom) (2008), pp. 1–8 T. Clancy, N. Goergen, Security in cognitive radio networks: threats and mitigation. in Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom) (2008), pp. 1–8
3.
Zurück zum Zitat S. Haykin, Cognitive Radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23, 201–220 (2005)CrossRef S. Haykin, Cognitive Radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23, 201–220 (2005)CrossRef
4.
Zurück zum Zitat L.E. Doyle, Essentials of cognitive radio, Cambridge wireless essentials series (2009) L.E. Doyle, Essentials of cognitive radio, Cambridge wireless essentials series (2009)
5.
Zurück zum Zitat G. Baldini, T. Sturman, A.R. Biswas, Security aspects in software defined radio and cognitive radio networks : a survey and a way ahead. IEEE Commun. Surv. Tutorial 14 (2012) G. Baldini, T. Sturman, A.R. Biswas, Security aspects in software defined radio and cognitive radio networks : a survey and a way ahead. IEEE Commun. Surv. Tutorial 14 (2012)
6.
Zurück zum Zitat J. Mitola, Cognitive radio: An integrated agent architecture for software defined radio, doctor of technology, Royal Institute of Technology (KTH), Stockholm, Sweden (2000) J. Mitola, Cognitive radio: An integrated agent architecture for software defined radio, doctor of technology, Royal Institute of Technology (KTH), Stockholm, Sweden (2000)
7.
Zurück zum Zitat W. El-Hajj, H. Safa, M. Guizani, Survey of security issues in cognitive radio networks W. El-Hajj, H. Safa, M. Guizani, Survey of security issues in cognitive radio networks
8.
Zurück zum Zitat H. Kim, Privacy preserving security framework for cognitive radio networks, IETE Technical Review, vol. 30, Issue 2 (2013) H. Kim, Privacy preserving security framework for cognitive radio networks, IETE Technical Review, vol. 30, Issue 2 (2013)
9.
Zurück zum Zitat D. Hlavacek, J. Morris Chang, A layered approach to cognitive radio network security: a survey, computer network (2014) D. Hlavacek, J. Morris Chang, A layered approach to cognitive radio network security: a survey, computer network (2014)
10.
Zurück zum Zitat M. Haghighat, S.M. Sadough, Cooperative spectrum sensing in cognitive radio networks under primary user emulation attacks. in Sixth International Symposium on Telecommunications (2012), pp. 148–151 M. Haghighat, S.M. Sadough, Cooperative spectrum sensing in cognitive radio networks under primary user emulation attacks. in Sixth International Symposium on Telecommunications (2012), pp. 148–151
11.
Zurück zum Zitat A. Attar, H. Tang, A.V. Vasilakos, F. Richard Yu, V.C.M. Leung, A survey of security challenges in cognitive radio networks: solutions and future research directions A. Attar, H. Tang, A.V. Vasilakos, F. Richard Yu, V.C.M. Leung, A survey of security challenges in cognitive radio networks: solutions and future research directions
12.
Zurück zum Zitat C.N. Mathur, K.P. Subbalakshmi, Security issues in cognitive radio networks: cognitive networks: towards self aware networks (2007) C.N. Mathur, K.P. Subbalakshmi, Security issues in cognitive radio networks: cognitive networks: towards self aware networks (2007)
13.
Zurück zum Zitat R. Chen, J.M. Park, J.M. Reed, Defense against primary user emulation attacks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008)CrossRef R. Chen, J.M. Park, J.M. Reed, Defense against primary user emulation attacks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008)CrossRef
14.
Zurück zum Zitat A. Rawat, P. Anand, H. Chen, P. Varshney, Countering byzantine attacks in cognitive radio networks, acoustics speech and signal processing (ICASSP). in IEEE International Conference (2010), pp. 3098–3101 A. Rawat, P. Anand, H. Chen, P. Varshney, Countering byzantine attacks in cognitive radio networks, acoustics speech and signal processing (ICASSP). in IEEE International Conference (2010), pp. 3098–3101
15.
Zurück zum Zitat F.K. Jondral, Software-defined radio—basic and evolution to cognitive radio, EURASIP Journal on Wireless Communications and Networking (2005) F.K. Jondral, Software-defined radio—basic and evolution to cognitive radio, EURASIP Journal on Wireless Communications and Networking (2005)
16.
Zurück zum Zitat R. Chen, J.M. Park, Ensuring trustworthy spectrum sensing in Cognitive Radio Networks. in IEEE Workshop on Networking Technologies for Software Defined Radio (SDR’06) (2006), pp. 110–119 R. Chen, J.M. Park, Ensuring trustworthy spectrum sensing in Cognitive Radio Networks. in IEEE Workshop on Networking Technologies for Software Defined Radio (SDR’06) (2006), pp. 110–119
17.
Zurück zum Zitat Y. Liu, P. Ning, H. Dai, Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. in Proceedings of IEEE Symposium Security and Privacy (2010) Y. Liu, P. Ning, H. Dai, Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. in Proceedings of IEEE Symposium Security and Privacy (2010)
Metadaten
Titel
Security Issues in Cognitive Radio: A Review
verfasst von
Shriraghavan Madbushi
Rajeshree Raut
M. S. S. Rukmini
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2728-1_12

Neuer Inhalt