Analysis of the various Security Attacks and Countermeasures in Cognitive Radio Network
DOI:
https://doi.org/10.26438/ijcse/v6si3.6165Keywords:
Cognitive Radio (CR), Cognitive Radio Networks (CRNs), Primary Users (PUs), Spectrum Sensing Data forgery (SSDF) Secondary Users (SUs)Abstract
The cognitive radio technology is one of the best candidates to handle the problem of the scarcity of the radio spectrum. The basic principle of cognitive radio is that it allows to secondary users to use the free (idle) primary channels. The cognitive radio networks do not only face the traditional security attacks, but also new security attacks due to the new characteristics of the cognitive radio technology. A number of the major news attacks in the Cognitive Radio Networks (CRNs) are the primary user emulation, spectrum sensing data forgery, and jamming attacks. In wireless networks, security is a challenging aspect. In the CRN, it is much more difficult because Cognitive Radios (CR) performs the various functions such as sensing the radio spectrum, managing the spectrum, spectrum mobility and sharing the spectrum. To perform all these functions efficiently without any attack, security mechanisms are required to implement. In this paper, major security attacks in the cognitive radio networks are discussed. Also, the various countermeasures to these security attacks in CRN are described.
References
Akyildiz, I.F., Yeol, L.W., Vuran, M.C., Shantidev, M., “Next generation /dynamic spectrum access/cognitive radio wireless networks a survey”, Elsevier Computer Network, vol:50, pp no. 2127-2159, 2006.
Salem, T.M., Abd El-kader S.M., Ramadan, S.M., Abdel-Mageed, M.Z., “Opportunistic Spectrum Access in Cognitive Radio Ad Hoc Networks” IJCSI International Journal of Computer Science Issues, vol. 11(1), pp no-41-50, 2014.
Rawat, D. B., Song,M., Shetty,S., “ Dynamic Spectrum Access for Wireless Networks”. Springer, 2015.
Chen, R., Park, J.M., “Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks”, IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR), Reston, pp no.110-119, 2006.
Alahmadi, A., Abdelhakim, M., Ren, J., Li, T., “Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard,” Information Forensics and Security, IEEE Transactions on, vol: 9(5), pp no. 772-781, 2014.
Haykin, S., "Cognitive radio: Brain-Empowered wireless communication," IEEE journal on selected areas in communication, vol: 25, pp no. 201-220, 2005.
Zou, Y., Wang. X., Shen, Z., “Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks,” IEEE Transactions on Communications, vol:61(12), pp no.5103-5113, 2013.
Tafazzoli, S., Berangi, R., “Cognitive Radio Handover in Cellular Networks”, IJCSI International Journal of Computer Science Issues, vol:11(2),no 1, pp no 1694-0784, 2014.
Mathur, C., Subbalakshmi, K., “Security Issues in Cognitive Radio Networks, Cognitive Networks: Towards Self-Aware Networks”, Wiley, pp no. 284-293, 2007.
Zhihui Shu; Yi Qian; Song Ci, “On physical layer security for cognitive radio networks,” Network, IEEE, vol:27, no.3, pp no.28-33,2013.
Xu, W., Trappe, W., Zhang, Y., Wood, T., “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks”, ACM MobiHoc, pp no.46-57, 2005.
Babu, B.R., Tripathi, M., Gaur,M.S., Gopalani, D., Jat,D.S., “Cognitive Radio Ad-Hoc Networks: Attacks and Its Impact” IEEE conference on Emerging Trends in Networks and Computer Communications (ETNCC), pp no. 125-130,2015.
Zhu, L., Zhou, H., “Two Types of Attacks against Cognitive Radio Network MAC Protocols”, International Conference on Computer Science and Software Engineering, vol:4, pp no.1110-111, 2008,.
Mathur, C.N., Subbalakshmi, K.P.,"Digital signatures for centralized DSA network," in First IEEE workshop on cognitive radio networks, 2007.
Huang, L., Xie, L., Yu, H., Wang, W., Yao, Y. “Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks”, International Conference on Communications and Mobile Computing (CMC), vol: l, no. 2, pp no. 169-17, 2010.
Zhao, C., Wang, W., Huang, L., Yao, Y., “Anti-PUE Attack Base on the Transmitter Fingerprint Identification in Cognitive Radio”, International Conference on Wireless Communications, Networking and Mobile Computing, pp no. 1-5, 2009.
Pandharipande, A., , Kim, J.M., Mazzarese, D., Ji, B., “IEEE P802.22 Wireless RANs: Technology Proposal Package for IEEE 802.22”, IEEE WG on WRANs, 2005.
Chen, R., Park, J.M., Hou, Y.T., Reed, J.H., “Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks”, IEEE Communications Magazine, vol.46, no.4, pp no. 50-55, 2008.
Kaligineedi, P., Khabbazian, M., Bhargava, V.K., “Secure Cooperative Sensing Techniques for Cognitive Radio Systems”, IEEE International Conference on Communications, pp no.3406-3410, 2008.
Wang, W., Li, H., Sun, Y., Han, Z., “Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks”, Conference on Information Sciences and Systems, 2009.
Sodagari, S., Attar, A., Leung, V., Bilen, S., “Denial of service attacks in Cognitive radio networks through channel eviction triggering”, IEEE Global Telecommunication, pp no. 610, 2010.
Karlof, C., Wagner, D., “Secure Routing in Wireless Networks: Attacks and Countermeasures”, Ad Hoc Networks, vol:1, pp no.293-315, 2009.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
