Security in cognitive radio networks

Security in cognitive radio networks is increasingly attracting the attention of researchers from both academia and industry, due to the open and dynamic nature of the cognitive networking architecture where various unknown and malicious devices could participate in the spectrum sensing and access, leading the legitimate cognitive users to be exposed to much more internal and external attacks than ever before. For example, cognitive radio is supposed to be capable of learning its surrounding environment and adapting its operating parameters to any changes in the radio environment, which, however, could be utilized by malicious users for illegal attacks. More specifically, the malicious users may emit interference signals to intentionally modify the radio environment in which the cognitive radio operates, misleading legitimate users and even compromising them or causing them to malfunction. It is thus of high importance to launch this workshop to identify and address the security vulnerabilities and risks in cognitive radio networks. This workshop aims to serve as a venue to bring together researchers from academia and industry to identify and discuss technical challenges and recent results in cognitive radio security. The topics of interest include, but are not limited to: z Spectrum sensing attack and countermeasures z Spectrum access attack and countermeasures z Spectrum management attack and countermeasures z Denial-of-service attack modeling and analysis in cognitive radio networks z Eavesdropping attack modeling and analysis in cognitive radio networks z Byzantine attack modeling and analysis in cognitive radio networks z Information-theoretical secrecy capacity of cognitive transmissions z Tradeoff designs for secure and reliable cognitive radio networks z Cooperative relaying for cognitive radio security z Multiple antenna techniques for cognitive radio security z Beamforming techniques for cognitive radio security z Artificial noise design for cognitive radio security z Physical-layer security in cognitive radio networks z MAC layer vulnerabilities and counter measures z Cross-layer security design, implementation, and analysis z Emerging cognitive radio networking standards and the impact of cognitive radio security z Experimental results on cognitive radio security