Loading…

A Survey of Security Issues in Cognitive Radio Networks

In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access envir...

Full description

Saved in:
Bibliographic Details
Published in:China communications 2015-03, Vol.12 (3), p.132-150
Main Authors: Li, Jianwu, Feng, Zebing, Feng, Zhiyong, Zhang, Ping
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c318t-d5043e30f7d6ad29e5baea394cc6e90f098c4833611939b578135bb4e5479e743
cites
container_end_page 150
container_issue 3
container_start_page 132
container_title China communications
container_volume 12
creator Li, Jianwu
Feng, Zebing
Feng, Zhiyong
Zhang, Ping
description In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.
doi_str_mv 10.1109/CC.2015.7084371
format article
fullrecord <record><control><sourceid>wanfang_jour_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_CC_2015_7084371</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>664677065</cqvip_id><ieee_id>7084371</ieee_id><wanfj_id>zgtx201503014</wanfj_id><sourcerecordid>zgtx201503014</sourcerecordid><originalsourceid>FETCH-LOGICAL-c318t-d5043e30f7d6ad29e5baea394cc6e90f098c4833611939b578135bb4e5479e743</originalsourceid><addsrcrecordid>eNpFkL1PwzAQxT2ARFU6M7BYSIxp7forHiuLj0oVSBRmy0kuwQUSsBNK-etJ1AK33HC_957uIXRGyZRSomfGTOeEiqkiKWeKHqERlYolgnN1giYxbkg_qZRMzkdILfC6C5-ww02J15B3wbc7vIyxg4h9jU1T1b71n4AfXOEbfAfttgkv8RQdl-41wuSwx-jp-urR3Car-5ulWaySnNG0TQpBOANGSlVIV8w1iMyBY5rnuQRNSqLTnKeMSUo105lQKWUiyzgIrjQozsbocu-7dXXp6spumi7UfaL9rtqv4U_CCB242Z7LQxNjgNK-B__mws5SYodarDF2wO2hll5xvld4APij_68XB7_npq4-fJ_8i0jJpVJECvYDj8Vo6A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A Survey of Security Issues in Cognitive Radio Networks</title><source>IEEE Xplore (Online service)</source><creator>Li, Jianwu ; Feng, Zebing ; Feng, Zhiyong ; Zhang, Ping</creator><creatorcontrib>Li, Jianwu ; Feng, Zebing ; Feng, Zhiyong ; Zhang, Ping</creatorcontrib><description>In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.</description><identifier>ISSN: 1673-5447</identifier><identifier>DOI: 10.1109/CC.2015.7084371</identifier><identifier>CODEN: CCHOBE</identifier><language>eng</language><publisher>China Institute of Communications</publisher><subject>active attacks ; Cognitive radio ; CRNs security ; Detectors ; Feature extraction ; Matched filters ; passive attacks ; physical layer security ; Radio transmitters ; Security ; security capacity ; 安全问题 ; 拒绝服务攻击 ; 无线电网络 ; 无线网络技术 ; 用户检测 ; 网络调查 ; 认知无线电 ; 频谱利用率</subject><ispartof>China communications, 2015-03, Vol.12 (3), p.132-150</ispartof><rights>Copyright © Wanfang Data Co. Ltd. All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c318t-d5043e30f7d6ad29e5baea394cc6e90f098c4833611939b578135bb4e5479e743</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/89450X/89450X.jpg</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7084371$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,27905,27906,54777</link.rule.ids></links><search><creatorcontrib>Li, Jianwu</creatorcontrib><creatorcontrib>Feng, Zebing</creatorcontrib><creatorcontrib>Feng, Zhiyong</creatorcontrib><creatorcontrib>Zhang, Ping</creatorcontrib><title>A Survey of Security Issues in Cognitive Radio Networks</title><title>China communications</title><addtitle>ChinaComm</addtitle><addtitle>China Communications</addtitle><description>In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.</description><subject>active attacks</subject><subject>Cognitive radio</subject><subject>CRNs security</subject><subject>Detectors</subject><subject>Feature extraction</subject><subject>Matched filters</subject><subject>passive attacks</subject><subject>physical layer security</subject><subject>Radio transmitters</subject><subject>Security</subject><subject>security capacity</subject><subject>安全问题</subject><subject>拒绝服务攻击</subject><subject>无线电网络</subject><subject>无线网络技术</subject><subject>用户检测</subject><subject>网络调查</subject><subject>认知无线电</subject><subject>频谱利用率</subject><issn>1673-5447</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNpFkL1PwzAQxT2ARFU6M7BYSIxp7forHiuLj0oVSBRmy0kuwQUSsBNK-etJ1AK33HC_957uIXRGyZRSomfGTOeEiqkiKWeKHqERlYolgnN1giYxbkg_qZRMzkdILfC6C5-ww02J15B3wbc7vIyxg4h9jU1T1b71n4AfXOEbfAfttgkv8RQdl-41wuSwx-jp-urR3Car-5ulWaySnNG0TQpBOANGSlVIV8w1iMyBY5rnuQRNSqLTnKeMSUo105lQKWUiyzgIrjQozsbocu-7dXXp6spumi7UfaL9rtqv4U_CCB242Z7LQxNjgNK-B__mws5SYodarDF2wO2hll5xvld4APij_68XB7_npq4-fJ_8i0jJpVJECvYDj8Vo6A</recordid><startdate>20150301</startdate><enddate>20150301</enddate><creator>Li, Jianwu</creator><creator>Feng, Zebing</creator><creator>Feng, Zhiyong</creator><creator>Zhang, Ping</creator><general>China Institute of Communications</general><general>Network Information Processing Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China%Key Laboratory of Universal Wireless Communications Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>2B.</scope><scope>4A8</scope><scope>92I</scope><scope>93N</scope><scope>PSX</scope><scope>TCJ</scope></search><sort><creationdate>20150301</creationdate><title>A Survey of Security Issues in Cognitive Radio Networks</title><author>Li, Jianwu ; Feng, Zebing ; Feng, Zhiyong ; Zhang, Ping</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c318t-d5043e30f7d6ad29e5baea394cc6e90f098c4833611939b578135bb4e5479e743</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>active attacks</topic><topic>Cognitive radio</topic><topic>CRNs security</topic><topic>Detectors</topic><topic>Feature extraction</topic><topic>Matched filters</topic><topic>passive attacks</topic><topic>physical layer security</topic><topic>Radio transmitters</topic><topic>Security</topic><topic>security capacity</topic><topic>安全问题</topic><topic>拒绝服务攻击</topic><topic>无线电网络</topic><topic>无线网络技术</topic><topic>用户检测</topic><topic>网络调查</topic><topic>认知无线电</topic><topic>频谱利用率</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Jianwu</creatorcontrib><creatorcontrib>Feng, Zebing</creatorcontrib><creatorcontrib>Feng, Zhiyong</creatorcontrib><creatorcontrib>Zhang, Ping</creatorcontrib><collection>维普_期刊</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Wanfang Data Journals - Hong Kong</collection><collection>WANFANG Data Centre</collection><collection>Wanfang Data Journals</collection><collection>万方数据期刊 - 香港版</collection><collection>China Online Journals (COJ)</collection><collection>China Online Journals (COJ)</collection><jtitle>China communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Jianwu</au><au>Feng, Zebing</au><au>Feng, Zhiyong</au><au>Zhang, Ping</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey of Security Issues in Cognitive Radio Networks</atitle><jtitle>China communications</jtitle><stitle>ChinaComm</stitle><addtitle>China Communications</addtitle><date>2015-03-01</date><risdate>2015</risdate><volume>12</volume><issue>3</issue><spage>132</spage><epage>150</epage><pages>132-150</pages><issn>1673-5447</issn><coden>CCHOBE</coden><abstract>In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.</abstract><pub>China Institute of Communications</pub><doi>10.1109/CC.2015.7084371</doi><tpages>19</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1673-5447
ispartof China communications, 2015-03, Vol.12 (3), p.132-150
issn 1673-5447
language eng
recordid cdi_crossref_primary_10_1109_CC_2015_7084371
source IEEE Xplore (Online service)
subjects active attacks
Cognitive radio
CRNs security
Detectors
Feature extraction
Matched filters
passive attacks
physical layer security
Radio transmitters
Security
security capacity
安全问题
拒绝服务攻击
无线电网络
无线网络技术
用户检测
网络调查
认知无线电
频谱利用率
title A Survey of Security Issues in Cognitive Radio Networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T18%3A24%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-wanfang_jour_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20of%20Security%20Issues%20in%20Cognitive%20Radio%20Networks&rft.jtitle=China%20communications&rft.au=Li,%20Jianwu&rft.date=2015-03-01&rft.volume=12&rft.issue=3&rft.spage=132&rft.epage=150&rft.pages=132-150&rft.issn=1673-5447&rft.coden=CCHOBE&rft_id=info:doi/10.1109/CC.2015.7084371&rft_dat=%3Cwanfang_jour_cross%3Ezgtx201503014%3C/wanfang_jour_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c318t-d5043e30f7d6ad29e5baea394cc6e90f098c4833611939b578135bb4e5479e743%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_cqvip_id=664677065&rft_ieee_id=7084371&rft_wanfj_id=zgtx201503014&rfr_iscdi=true