A Survey onadvances in security threats and its counter measures in cognitive radio networks
-
2018-03-19 https://doi.org/10.14419/ijet.v7i2.8.10465 -
Cognitive radio, Cognitive radio networks, Layer attacks, Security requirements, IEEE 802.22 -
Abstract
Cognitive radio is a promising wireless communication technology that improves spectrum utilization and offers many benefits for internet users. Cognitive radio networks utilizes the available limited resources in a more efficient and flexible way. The main objective of the Cognitive network is to efficiently utilize the unutilized spectrum and meet the demand of the secondary users. some of the important features of cognitive of Cognitive radio networks are dynamic spectrum access, self organizing and flexibility. As Cognitive radio networks are flexible in nature, it will be effected by various security attacks which in turn affects the performance of the network. Furthermore Cognitive radio networks transmit the spectrum in several licensed bands and it also performs dynamic spectrum allocation. Cognitive radio and Cognitive radio networks are wireless in nature these face conventional attacks. In this survey we address various attacks in different layers , new threats and challenges that Cognitive networks face, current available solutions to address layer attacks. In addition applications, open problems and future Research challenges are also specified.
-
References
[1] J. Mitola and G. Q. Maguire, “Cognitive Radio: Making software radios more personalâ€, IEEE personal Communications, 1989, vol. 6, no. 4, pp.13-18.
[2] J. Mitola, "Cognitive Radio – An Integrated Agent Architecture for Software Defined Radio", Ph.D. Dissertation, Royal Institute of Technology, Kista, Sweden, May 8, 2000, ISSN: 14035286, 313pages..
[3] Wassim, S. Haidar and G. Mohsen, “Survey of Security Issues in Cognitive Radio Networksâ€, Journal of Internet Technology, 2011, vol. 12 No. 2, pp.181-198.
[4] FCC, “Notice for Proposed Rulemaking (NPRM 03-322): Facilitating Opportunities for flexible, Efficient, and Reliable Spectrum Use Employing Cognitive Radio Technologies,†ET Docket, No. 03-108,2003.
[5] D. Sicker and R. Dhillon “Security of Cognitive Radio Networks (Synthesis Lectures on Communications)â€, Morgan & Claypool Publishers (January 30, 2013), ISBN- 13:978-1608451005.
[6] Federal Communication Commission, “Unlicensed operation in the TV broadcast bands and additional spectrum for unlicensed devices below 900 MHz in the 3GHz band,†ET Docket, No. 04-186, May2004.
[7] A.G. Fragkiadakis, E. Z. Tragos and I. G. Askoxylakis, “A Survey on Security Threats and Detection Techniques in Cognitive Radio Networksâ€, IEEE Communications Surveys & Tutorials, 2013, vol. 15 , issue: 1 , pp. 428-445.
[8] S. Parvin, F. K. Hussain, O. K. Hussain, S. Han, B. Tian, and E. Chang, “Cognitive radio network security: A surveyâ€, Journal of Network and Computer Applications, 2012, vol. 35, pp.1691–1708.
[9] O. León, J. Hernández-Serrano, and M. Soriano, “Securing cognitive radio networksâ€, Int. Jr. of Communication Systems, 2010, vol. 23, Issue 5, pp.633-652.
[10] T. C. Clancy and N. Goergen, “Security in Cognitive Radio Networks: Threats and Mitigationâ€, CrownCom 2008,3rdInternational Conference on Cognitive Radio OrientedWireless Networks and Communications, 2008, pp. 1 – 8.
[11] T. R. Newman and T. C. Clancy, “Security threats to cognitive radio signal classifiersâ€, Proceedings of the Virginia tech wireless personal communications symposium, 2013, pp.1-9.
[12] K. C. Chen, Y. J. Peng, N. Prasad, N., Liang, Y. C. and S. Sun “Cognitive radio network architecture: part I. general structureâ€, 2nd international conference on ubiquitous information management and communication, 2008, CRs. pp.114–119.
[13] R. Chen and J. Park, “Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networksâ€, 1st IEEE workshop on Networking Technologies for Software Defined Radio Networks,( SDR '06), 2006, pp. 110 –119.
[14] R. Chen, J. Park, Y. T. Hou and J. Reed, “ Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networksâ€, IEEE Communications Magazine, 2012,vol. 46, issue. 4, pp.50-55.
[15] R. Chen, J. Park and J. H. Reed, “Defense against Primary user Emulation Attacks in Cognitive Radio Networksâ€, IEEE Journal on selected areas in communications, vol. 26, no.1, 2008, pp.25-37.
[16] A. Safdar and M. O’Neill, “Common Control Channel Security Framework for Cognitive Radio Networksâ€, 69th IEEE Vehicular Technology Conference, 2009, pp.1-5.
[17] J. L. Burbank, “Security in Cognitive Radio Networks: The Required Evoluation in Approaches to Wireless Network Securityâ€, CrownCom 2008, pp.1-7.
[18] D. Cabric, S. M. Mishra and R. W. Brodersen, “Implementation Issues in Spectrum Sensing for Cognitive Radiosâ€, 38th Asilomar Conference on Signals, Systems and Computers, 2004, pp.772-776.
[19] “IEEE 802 Tutorial: Cognitive Radioâ€, Scott Seidel, Raytheon, presented at IEEE 802 Plenary, 18 July2005.
[20] T. R. Shields, "SDR Update," Global Standards Collaboration, Sophia Antipolis, France, Powerpoint Presentation GSC10_grsc3 (05)20,2005.
[21] R. W. Thomas, L. A. DaSilva and A. B. MacKenzie, "Cognitive networks," IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, November, 2005, pp.352-360.
[22] FDR Forum, Cognitive Radio Definitions and Nomenclature, Approved Document SDRF-06-P-0009- V1.0.0, 10 September2016.
[23] N. Mathur and K. P. Subbalakshmi, “Security issues in cognitive radio networksâ€, Cognitive networks: towards self-aware networks. John Wiley and Sons, Ltd;2007.
[24] N. Mathur and K. P. Subbalakshmi, “Digital signatures for centralized DSA networksâ€, 4th IEEE conf. on consumer comm. and networking, 2007, pp.1037–1041.
[25] Y. B. Reddy, “Solving Hidden Terminal Problem in Cognitive Networks Using Cloud Applicationâ€, SENSORCOMM 2012, pp.235-240.
[26] Y. B. Reddy and S. Ellis, “Modeling Cognitive Radio Networks for Efficient Data Transfer Using Cloud Linkâ€, ITNG 2013, April 2014, Las Vegas,USA.
[27] M. Shahid and J. Kamruzzama, “Agile spectrum evacuation in cognitive radio networksâ€, IEEE international conference on communications (ICC), 2015, pp.1–6.
[28] Dr. Seetaiah Kilaru, Hari Kishore K, Sravani T, Anvesh Chowdary L, Balaji T “Review and Analysis of Promising Technologies with Respect to fifth Generation Networksâ€, 2014 First International Conference on Networks & Soft Computing,ISSN:978-1-4799-3486-7/14,pp.270, August2014.
[29] T. Padmapriya and V. Saminadan, “Inter-cell Load Balancing technique for multi-class traffic in MIMO-LTE-A Networksâ€, International Journal of Electrical, Electronics and Data Communication (IJEEDC), ISSN: 2320- 2084, vol.3, no.8, pp. 22-26, Aug 2015.
[30] S.V.Manikanthan and V.Rama“Optimal Performance Of Key Predistribution Protocol In Wireless Sensor Networks†International Innovative Research Journal of Engineering and Technology ,ISSN NO: 2456-1983,Vol-2,Issue –Special –March 2017.
[31] S.V.Manikanthan and D.Sugandhi “ Interference Alignment Techniques For Mimo Multicell Based On Relay Interference Broadcast Channel †International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume- 7 ,Issue 1 –MARCH 2014.
-
Downloads
-
How to Cite
Ganesh, D., & Pavan Kumar, T. (2018). A Survey onadvances in security threats and its counter measures in cognitive radio networks. International Journal of Engineering & Technology, 7(2.8), 372-378. https://doi.org/10.14419/ijet.v7i2.8.10465Received date: 2018-03-22
Accepted date: 2018-03-22
Published date: 2018-03-19