• DocumentCode
    134571
  • Title

    A survey on security in Cognitive Radio networks

  • Author

    Khasawneh, Mahmoud ; Agarwal, Abhishek

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Concordia Univ., Montreal, QC, Canada
  • fYear
    2014
  • fDate
    26-27 March 2014
  • Firstpage
    64
  • Lastpage
    70
  • Abstract
    Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access the frequency bands when licensed users which are referred to as primary users (PUs) are inactive. One important technical area that has received little attention to date in the cognitive radio system is wireless security. New classes of security threats and challenges have been introduced in the cognitive radio systems, and providing strong security may prove to be the most difficult aspect of making cognitive radio a long-term commercially-viable concept. This paper addresses the main challenges, security attacks and their mitigation techniques in cognitive radio networks. The attacks showed are organized based on the protocol layer that an attack is operating on.
  • Keywords
    cognitive radio; protocols; radio networks; telecommunication security; cognitive radio networks; long-term commercially-viable concept; mitigation techniques; protocol layer; security attacks; spectrum demand; wireless security; Authentication; Cognitive radio; Linear programming; Physical layer; Protocols; Sensors; Attack; Cognitive radio; Primary User (PU); Secondary User (SU); Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and Information Technology (CSIT), 2014 6th International Conference on
  • Conference_Location
    Amman
  • Print_ISBN
    978-1-4799-3998-5
  • Type

    conf

  • DOI
    10.1109/CSIT.2014.6805980
  • Filename
    6805980