DocumentCode
134571
Title
A survey on security in Cognitive Radio networks
Author
Khasawneh, Mahmoud ; Agarwal, Abhishek
Author_Institution
Dept. of Electr. & Comput. Eng., Concordia Univ., Montreal, QC, Canada
fYear
2014
fDate
26-27 March 2014
Firstpage
64
Lastpage
70
Abstract
Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access the frequency bands when licensed users which are referred to as primary users (PUs) are inactive. One important technical area that has received little attention to date in the cognitive radio system is wireless security. New classes of security threats and challenges have been introduced in the cognitive radio systems, and providing strong security may prove to be the most difficult aspect of making cognitive radio a long-term commercially-viable concept. This paper addresses the main challenges, security attacks and their mitigation techniques in cognitive radio networks. The attacks showed are organized based on the protocol layer that an attack is operating on.
Keywords
cognitive radio; protocols; radio networks; telecommunication security; cognitive radio networks; long-term commercially-viable concept; mitigation techniques; protocol layer; security attacks; spectrum demand; wireless security; Authentication; Cognitive radio; Linear programming; Physical layer; Protocols; Sensors; Attack; Cognitive radio; Primary User (PU); Secondary User (SU); Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and Information Technology (CSIT), 2014 6th International Conference on
Conference_Location
Amman
Print_ISBN
978-1-4799-3998-5
Type
conf
DOI
10.1109/CSIT.2014.6805980
Filename
6805980
Link To Document