• DocumentCode
    2190
  • Title

    A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks

  • Author

    Fragkiadakis, Alexandros G. ; Tragos, Elias Z. ; Askoxylakis, I.G.

  • Author_Institution
    Inst. of Comput. Sci., Found. for Res. & Technol.-Hellas (FORTH), Heraklion, Greece
  • Volume
    15
  • Issue
    1
  • fYear
    2013
  • fDate
    First Quarter 2013
  • Firstpage
    428
  • Lastpage
    445
  • Abstract
    With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. The allocation of the Industrial, Medical and Scientific (ISM) band has enabled the explosion of new technologies (e.g. Wi-Fi) due to its licence-exempt characteristic. The widespread adoption of Wi-Fi technology, combined with the rapid penetration of smart phones running popular user services (e.g. social online networks) has overcrowded substantially the ISM band. On the other hand, according to a number of recent reports, several parts of the static allocated licensed bands are under-utilized. This has brought up the idea of the opportunistic use of these bands through the, so-called, cognitive radios and cognitive radio networks. Cognitive radios have enabled the opportunity to transmit in several licensed bands without causing harmful interference to licensed users. Along with the realization of cognitive radios, new security threats have been raised. Adversaries can exploit several vulnerabilities of this new technology and cause severe performance degradation. Security threats are mainly related to two fundamental characteristics of cognitive radios: cognitive capability, and reconfigurability. Threats related to the cognitive capability include attacks launched by adversaries that mimic primary transmitters, and transmission of false observations related to spectrum sensing. Reconfiguration can be exploited by attackers through the use of malicious code installed in cognitive radios. Furthermore, as cognitive radio networks are wireless in nature, they face all classic threats present in the conventional wireless networks. The scope of this work is to give an overview of the security threats and challenges that cognitive radios and cognitive radio networks face, along with the current state-of-the-art to detect the corresponding attacks. In addition, future challenges are addressed.
  • Keywords
    cognitive radio; telecommunication security; wireless LAN; ISM band allocation; Wi-Fi technology; cognitive capability; cognitive radio networks; cognitive reconfigurability; industrial medical and scientific band; licence-exempt characteristic; primary transmitters; security detection techniques; security threats; smart phones; social online networks; spectrum scarcity; spectrum sensing; static allocated licensed bands; user services; wireless domain; wireless networks; Cognitive radio; Communication system security; Security; Sensors; Transmitters; Wireless sensor networks; IEEE 802.22; cognitive radio networks; cognitive radios; cross layer attacks; primary user emulation attacks; software defined radio security; spectrum sense data falsification attacks;
  • fLanguage
    English
  • Journal_Title
    Communications Surveys & Tutorials, IEEE
  • Publisher
    ieee
  • ISSN
    1553-877X
  • Type

    jour

  • DOI
    10.1109/SURV.2011.122211.00162
  • Filename
    6129369