DocumentCode
1756479
Title
Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey
Author
Sharma, Rajesh K. ; Rawat, Danda B.
Author_Institution
Int. Grad. Sch. on Mobile Commun., Ilmenau Univ. of Technol., Ilmenau, Germany
Volume
17
Issue
2
fYear
2015
fDate
Secondquarter 2015
Firstpage
1023
Lastpage
1043
Abstract
Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices with the capability to adapt their operating parameters on the fly based on the radio environment, to utilize the scarce radio frequency spectrum in an efficient and opportunistic manner. However, due to the increasingly pervasive existence of smart wireless devices in cognitive radio networks (CRNs), CR systems are vulnerable to numerous security threats that affect the overall performance. There have been many significant advances on security threats and countermeasures in CRNs in the past few years. Our main goal in this paper is to present the state-of-the-art research results and approaches proposed for CRN security to protect both unlicensed secondary users and licensed primary users. Specifically, we present the recent advances on security threats/attacks and countermeasures in CRNs focusing more on the physical layer by categorizing them in terms of their types, their existence in the CR cycle, network protocol layers (exploited during their activities and defense strategies), and game theoretic approaches. The recent important attacks and countermeasures in CRNs are also summarized in the form of tables. We also present recommendations that can be followed while implementing countermeasures to enhance CRN security. With this paper, readers can have a more thorough understanding of CRN security attacks and countermeasures, as well as research trends in this area.
Keywords
cognitive radio; radio spectrum management; security of data; CR systems; CRN; cognitive radio networks; game theoretic approaches; licensed primary users; network protocol layers; scarce radio frequency spectrum; security threats; unlicensed secondary users; wireless devices; Collaboration; Communication system security; Physical layer; Protocols; Security; Sensors; Wireless communication; CR security; Cognitive radio (CR); game theory; software-defined radio; wireless security;
fLanguage
English
Journal_Title
Communications Surveys & Tutorials, IEEE
Publisher
ieee
ISSN
1553-877X
Type
jour
DOI
10.1109/COMST.2014.2380998
Filename
6985519
Link To Document