Loading…
Spectrum Sharing Security and Attacks in CRNs: a Review
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Coop...
Saved in:
Published in: | International journal of advanced computer science & applications 2014, Vol.5 (1) |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c252t-d54f87a22668fb4e2f8d3d7ab1aac21b9070124119ba33c1a46d0223408ee5b13 |
---|---|
cites | |
container_end_page | |
container_issue | 1 |
container_start_page | |
container_title | International journal of advanced computer science & applications |
container_volume | 5 |
creator | Alhakami, Wajdi Mansour, Ali A., Ghazanfar |
description | Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges. |
doi_str_mv | 10.14569/IJACSA.2014.050111 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2656573004</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2656573004</sourcerecordid><originalsourceid>FETCH-LOGICAL-c252t-d54f87a22668fb4e2f8d3d7ab1aac21b9070124119ba33c1a46d0223408ee5b13</originalsourceid><addsrcrecordid>eNotkE1Lw0AYhBdRsGh_gZcFz6nvu5-JtxD8qBSFRsHbstlsNNWmdTdR-u-tjXOZOQwz8BBygTBDIVV2NX_IizKfMUAxAwmIeEQmDKVKpNRwfMhpgqBfT8k0xhXsxTOmUj4hutx614dhTct3G9rujZbeDaHtd9R2Nc373rqPSNuOFsvHeE0tXfrv1v-ck5PGfkY__fcz8nJ781zcJ4unu3mRLxLHJOuTWoom1ZYxpdKmEp41ac1rbSu01jGsMtCATCBmleXcoRWqBsa4gNR7WSE_I5fj7jZsvgYfe7PaDKHbXxqmpJKaA4h9i48tFzYxBt-YbWjXNuwMgjlAMiMk8wfJjJD4L8pMV7I</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2656573004</pqid></control><display><type>article</type><title>Spectrum Sharing Security and Attacks in CRNs: a Review</title><source>Publicly Available Content Database</source><source>EZB Electronic Journals Library</source><creator>Alhakami, Wajdi ; Mansour, Ali ; A., Ghazanfar</creator><creatorcontrib>Alhakami, Wajdi ; Mansour, Ali ; A., Ghazanfar</creatorcontrib><description>Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2014.050111</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Access control ; Artificial intelligence ; Cognitive radio ; Data communication ; Wireless networks</subject><ispartof>International journal of advanced computer science & applications, 2014, Vol.5 (1)</ispartof><rights>2014. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c252t-d54f87a22668fb4e2f8d3d7ab1aac21b9070124119ba33c1a46d0223408ee5b13</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2656573004?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4021,25751,27921,27922,27923,37010,44588</link.rule.ids></links><search><creatorcontrib>Alhakami, Wajdi</creatorcontrib><creatorcontrib>Mansour, Ali</creatorcontrib><creatorcontrib>A., Ghazanfar</creatorcontrib><title>Spectrum Sharing Security and Attacks in CRNs: a Review</title><title>International journal of advanced computer science & applications</title><description>Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges.</description><subject>Access control</subject><subject>Artificial intelligence</subject><subject>Cognitive radio</subject><subject>Data communication</subject><subject>Wireless networks</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNotkE1Lw0AYhBdRsGh_gZcFz6nvu5-JtxD8qBSFRsHbstlsNNWmdTdR-u-tjXOZOQwz8BBygTBDIVV2NX_IizKfMUAxAwmIeEQmDKVKpNRwfMhpgqBfT8k0xhXsxTOmUj4hutx614dhTct3G9rujZbeDaHtd9R2Nc373rqPSNuOFsvHeE0tXfrv1v-ck5PGfkY__fcz8nJ781zcJ4unu3mRLxLHJOuTWoom1ZYxpdKmEp41ac1rbSu01jGsMtCATCBmleXcoRWqBsa4gNR7WSE_I5fj7jZsvgYfe7PaDKHbXxqmpJKaA4h9i48tFzYxBt-YbWjXNuwMgjlAMiMk8wfJjJD4L8pMV7I</recordid><startdate>2014</startdate><enddate>2014</enddate><creator>Alhakami, Wajdi</creator><creator>Mansour, Ali</creator><creator>A., Ghazanfar</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>2014</creationdate><title>Spectrum Sharing Security and Attacks in CRNs: a Review</title><author>Alhakami, Wajdi ; Mansour, Ali ; A., Ghazanfar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c252t-d54f87a22668fb4e2f8d3d7ab1aac21b9070124119ba33c1a46d0223408ee5b13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Access control</topic><topic>Artificial intelligence</topic><topic>Cognitive radio</topic><topic>Data communication</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Alhakami, Wajdi</creatorcontrib><creatorcontrib>Mansour, Ali</creatorcontrib><creatorcontrib>A., Ghazanfar</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Research Library (ProQuest Database)</collection><collection>Research Library (Corporate)</collection><collection>ProQuest Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science & applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alhakami, Wajdi</au><au>Mansour, Ali</au><au>A., Ghazanfar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Spectrum Sharing Security and Attacks in CRNs: a Review</atitle><jtitle>International journal of advanced computer science & applications</jtitle><date>2014</date><risdate>2014</risdate><volume>5</volume><issue>1</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2014.050111</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2158-107X |
ispartof | International journal of advanced computer science & applications, 2014, Vol.5 (1) |
issn | 2158-107X 2156-5570 |
language | eng |
recordid | cdi_proquest_journals_2656573004 |
source | Publicly Available Content Database; EZB Electronic Journals Library |
subjects | Access control Artificial intelligence Cognitive radio Data communication Wireless networks |
title | Spectrum Sharing Security and Attacks in CRNs: a Review |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T11%3A26%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Spectrum%20Sharing%20Security%20and%20Attacks%20in%20CRNs:%20a%20Review&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=Alhakami,%20Wajdi&rft.date=2014&rft.volume=5&rft.issue=1&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2014.050111&rft_dat=%3Cproquest_cross%3E2656573004%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c252t-d54f87a22668fb4e2f8d3d7ab1aac21b9070124119ba33c1a46d0223408ee5b13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2656573004&rft_id=info:pmid/&rfr_iscdi=true |