Title :
A survey on security in Cognitive Radio networks
Author :
Khasawneh, Mahmoud ; Agarwal, Abhishek
Author_Institution :
Dept. of Electr. & Comput. Eng., Concordia Univ., Montreal, QC, Canada
Abstract :
Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access the frequency bands when licensed users which are referred to as primary users (PUs) are inactive. One important technical area that has received little attention to date in the cognitive radio system is wireless security. New classes of security threats and challenges have been introduced in the cognitive radio systems, and providing strong security may prove to be the most difficult aspect of making cognitive radio a long-term commercially-viable concept. This paper addresses the main challenges, security attacks and their mitigation techniques in cognitive radio networks. The attacks showed are organized based on the protocol layer that an attack is operating on.
Keywords :
cognitive radio; protocols; radio networks; telecommunication security; cognitive radio networks; long-term commercially-viable concept; mitigation techniques; protocol layer; security attacks; spectrum demand; wireless security; Authentication; Cognitive radio; Linear programming; Physical layer; Protocols; Sensors; Attack; Cognitive radio; Primary User (PU); Secondary User (SU); Security;
Conference_Titel :
Computer Science and Information Technology (CSIT), 2014 6th International Conference on
Conference_Location :
Amman
Print_ISBN :
978-1-4799-3998-5
DOI :
10.1109/CSIT.2014.6805980