Recent security issues on cognitive radio networks: A survey

Cognitive radio networks are a method for improving wireless communications with radios that can adapt their operating parameters to cope with changes in their environment. This flexibility enables radios to perform with greater throughput, robustness, and field updatability than traditional wireless communication devices; unfortunately, it also presents several security challenges unique to cognitive radio networks and new angles for traditional attacks. These threats can be classified into radio configurability and cognitive radio behavioral vulnerabilities. In this paper we explore specific threats to cognitive radio networks and their countermeasures from literature. With this paper, readers can have a thorough understanding of cognitive radio network security and the research trends in this area.

[1]  Xiuzhen Cheng,et al.  Dynamic spectrum access: from cognitive radio to network radio , 2012, IEEE Wireless Communications.

[2]  Hui Zhao,et al.  Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels , 2015, 2015 IEEE International Conference on Communication Software and Networks (ICCSN).

[3]  Shuai Li,et al.  Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.

[4]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[5]  Gianmarco Baldini,et al.  Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.

[6]  Gurpreet Singh,et al.  A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.

[7]  P. Agrawal,et al.  Cognitive Radio Network setup without a Common Control Channel , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[8]  Jun-ichi Takada,et al.  ACU and RSM Based Radio Spectrum Management for Realization of Flexible Software Defined Radio World , 2003 .

[9]  Sachin Shetty,et al.  Dynamic Spectrum Access for Wireless Networks , 2015, SpringerBriefs in Electrical and Computer Engineering.

[10]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[11]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[12]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[13]  Jaime Lloret Mauri,et al.  Cognitive Networks: Applications and Deployments , 2014 .

[14]  A. Sahai,et al.  Spectrum Enforcement and Liability Assignment in Cognitive Radio Systems , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[15]  Sachin Shetty,et al.  Stackelberg-Game-Based Dynamic Spectrum Access in Heterogeneous Wireless Systems , 2016, IEEE Systems Journal.

[16]  Zhu Han,et al.  CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[17]  Li Zhu,et al.  Two Types of Attacks against  Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.

[18]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[19]  Olav Queseth,et al.  Cooperative and selfish behaviour in unlicensed spectrum using the CSMA/CA protocol , 2004 .

[20]  Shuguang Cui,et al.  On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[21]  Niraj K. Jha,et al.  An architecture for secure software defined radio , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.

[22]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[23]  Tongtong Li,et al.  Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.

[24]  Douglas M. Blough,et al.  Securing the download of radio configuration files for software defined radio devices , 2004, MobiWac '04.

[25]  Sachin Shetty,et al.  Geolocation-aware resource management in cloud computing-based cognitive radio networks , 2014, Int. J. Cloud Comput..

[26]  Yacov Yacobi,et al.  Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..

[27]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[28]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[29]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[30]  Joseph Mitola,et al.  Most Active Band (MAB) Attack and Countermeasures in a Cognitive Radio Network , 2012, IEEE Transactions on Wireless Communications.

[31]  Do-Hoon Kim,et al.  Selfish attacks and detection in cognitive radio Ad-Hoc networks , 2013, IEEE Network.

[32]  Yiyang Pei,et al.  Robust Beamforming Design: From Cognitive Radio MISO Channels to Secrecy MISO Channels , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[33]  Scott D. Lathrop,et al.  Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[34]  Danda B. Rawat,et al.  Precoder adaptation and power control for cognitive radios in dynamic spectrum access environments , 2012, IET Commun..