A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions

In this survey, we present a comprehensive list of major known security threats within a cognitive radio network (CRN) framework. We classify attack techniques based on the type of attacker, namely exogenous (external) attackers, intruding malicious nodes and greedy cognitive radios (CRs). We further discuss threats related to infrastructure-based CRNs as well as infrastructure-less networks. Besides the short-term effects of attacks over CRN performance, we also discuss the often ignored longer term behavioral changes that are enforced by such attacks via the learning capability of CRN. After elaborating on various attack strategies, we discuss potential solutions to combat those attacks. An overview of robust CR communications is also presented. We finally elaborate on future research directions pertinent to CRN security. We hope this survey paper can provide the insight and the roadmap for future research efforts in the emerging field of CRN security.

[1]  Hamid Aghvami,et al.  Cognitive Radio game for secondary spectrum access problem , 2009, IEEE Transactions on Wireless Communications.

[2]  M. J. Gans,et al.  On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas , 1998, Wirel. Pers. Commun..

[3]  Chunyan Miao,et al.  A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.

[4]  Lang Tong,et al.  Betting on Gilbert-Elliot channels , 2010, IEEE Transactions on Wireless Communications.

[5]  Kang G. Shin,et al.  Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation , 2011, IEEE Transactions on Mobile Computing.

[6]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[7]  S. Roberts,et al.  Constrained bandwidth allocation in multi-sensor information fusion: a mechanism design approach , 2005, 2005 7th International Conference on Information Fusion.

[8]  Simon Haykin,et al.  Robust Transmit Power Control for Cognitive Radio , 2009, Proceedings of the IEEE.

[9]  Anant Sahai,et al.  SNR Walls for Signal Detection , 2008, IEEE Journal of Selected Topics in Signal Processing.

[10]  Ekram Hossain,et al.  Dynamic Spectrum Access and Management in Cognitive Radio Networks: Introduction , 2009 .

[11]  Geoffrey Ye Li,et al.  Robust channel estimation for OFDM systems with rapid dispersive fading channels , 1998, IEEE Trans. Commun..

[12]  Lutz H.-J. Lampe,et al.  Joint Sidelobe and Peak Power Reduction in OFDM-Based Cognitive Radio , 2010, 2010 IEEE 72nd Vehicular Technology Conference - Fall.

[13]  Feng Gao,et al.  A Robust and Efficient Cooperative Spectrum Sensing Scheme in Cognitive Radio Networks , 2010, 2010 IEEE International Conference on Communications Workshops.

[14]  Qing Zhao,et al.  Quickest Detection in Multiple On–Off Processes , 2010, IEEE Transactions on Signal Processing.

[15]  Özgür B. Akan,et al.  BIOlogically-Inspired Spectrum Sharing in Cognitive Radio Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[16]  Abhay Parekh,et al.  Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.

[17]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[18]  Athanasios V. Vasilakos,et al.  A market-clearing model for spectrum trade in cognitive radio networks , 2011, MobiHoc '11.

[19]  Zhu Han,et al.  Dynamic Spectrum Access and Management in Cognitive Radio Networks: References , 2009 .

[20]  Ying-Chang Liang,et al.  Robust precoding for orthogonal space-time block coded MIMO cognitive radio networks , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.

[21]  Peter Dayan,et al.  Q-learning , 1992, Machine Learning.

[22]  Jack L. Burbank,et al.  Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[23]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[24]  Guosen Yue,et al.  Design of Anti-Jamming Coding for Cognitive Radio , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[25]  Amir Ghasemi,et al.  Spectrum sensing in cognitive radio networks: the cooperation-processing tradeoff , 2007 .

[26]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[27]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[28]  Jiaheng Wang,et al.  Robust cognitive radio via game theory , 2010, 2010 IEEE International Symposium on Information Theory.

[29]  F. Richard Yu,et al.  Biologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios , 2010, IEEE Network.

[30]  Ji Yang,et al.  IEEE P1900.B: Coexistence Support for Reconfigurable, Heterogeneous Air Interfaces , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[31]  Tom Martin,et al.  Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.

[32]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[33]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..

[34]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[35]  Zhiqiang Li,et al.  A Distributed Consensus-Based Cooperative Spectrum-Sensing Scheme in Cognitive Radios , 2010, IEEE Transactions on Vehicular Technology.

[36]  Kang G. Shin,et al.  Attack-tolerant distributed sensing for dynamic spectrum access networks , 2009, 2009 17th IEEE International Conference on Network Protocols.

[37]  Vikram Krishnamurthy,et al.  Game Theoretic Issues in Cognitive Radio Systems (Invited Paper) , 2009, J. Commun..

[38]  Albert-László Barabási,et al.  Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.

[39]  Dominique Noguet,et al.  Sensing techniques for Cognitive Radio - State of the art and trends , 2009 .

[40]  F. Richard Yu,et al.  Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks , 2010, Wirel. Networks.

[41]  Ali Zamani,et al.  Communication System Recognition by Modulation Recognition , 2004, ICT.

[42]  Victor C. M. Leung,et al.  Denial of Service Attacks in Cognitive Radio Networks through Channel Eviction Triggering , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[43]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[44]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[45]  Eitan Altman,et al.  Jamming in Wireless Networks Under Uncertainty , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.

[46]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[47]  Helen Tang,et al.  Lightweight Integrated Authentication for Tactical MANETs , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[48]  Geoffrey Ye Li,et al.  Robust channel estimation for OFDM systems with rapid dispersive fading channels , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).

[49]  O. Holland,et al.  Dynamic Scalable Software Downloads for Mobile Terminal Mass-upgrades , 2007, 2007 16th IST Mobile and Wireless Communications Summit.

[50]  Tung-Sang Ng,et al.  Robust Beamforming in Cognitive Radio , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[51]  R. Venkatesha Prasad,et al.  Cognitive functionality in next generation wireless networks: standardization efforts , 2008, IEEE Communications Magazine.

[52]  Hamid Aghvami,et al.  A Universal Resource Awareness Channel for Cognitive Radio , 2006, 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications.

[53]  Zhu Han,et al.  Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.

[54]  Chunyan Miao,et al.  Towards a trust aware cognitive radio architecture , 2009, MOCO.

[55]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[56]  Anant Sahai,et al.  Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.

[57]  Zhongding Lei,et al.  IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.

[58]  Apurva N. Mody,et al.  Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[59]  Qing Zhao,et al.  Distributed Learning in Multi-Armed Bandit With Multiple Players , 2009, IEEE Transactions on Signal Processing.

[60]  Shamik Sengupta,et al.  Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2010, 2010 IEEE International Conference on Communications.

[61]  James Gross,et al.  Robust Clustering of Ad-Hoc Cognitive Radio Networks under Opportunistic Spectrum Access , 2011, 2011 IEEE International Conference on Communications (ICC).

[62]  Guanding Yu,et al.  On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.

[63]  Eitan Altman,et al.  Jamming in wireless networks under uncertainty , 2009, WiOpt.

[64]  Peter C. Mason,et al.  Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[65]  Li Zhu,et al.  Two Types of Attacks against  Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.

[66]  Mohamed-Slim Alouini,et al.  On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.

[67]  Olasunkanmi Durowoju,et al.  Distributed Power Control for Cognitive Radio Networks, Based on Incumbent Outage Information , 2011, 2011 IEEE International Conference on Communications (ICC).

[68]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[69]  Vikram Krishnamurthy,et al.  Quickest Time Herding and Detection for Optimal Social Learning , 2010, ArXiv.

[70]  Zhu Han,et al.  Distributed Coalition Formation Games for Secure Wireless Transmission , 2009, Mob. Networks Appl..

[71]  Mingyan Liu,et al.  Optimality of Myopic Sensing in Multi-Channel Opportunistic Access , 2008, 2008 IEEE International Conference on Communications.

[72]  Tharmalingam Ratnarajah,et al.  Joint Transceiver Beamforming in MIMO Cognitive Radio Network Via Second-Order Cone Programming , 2012, IEEE Transactions on Signal Processing.

[73]  Máire O'Neill,et al.  Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[74]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[75]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[76]  Shlomo Shamai,et al.  Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.

[77]  Gerd Ascheid,et al.  MSE-based linear transceiver optimization in MIMO cognitive radio networks with imperfect channel knowledge , 2010, 2010 2nd International Workshop on Cognitive Information Processing.

[78]  H. Vincent Poor,et al.  Cognitive Medium Access: Exploration, Exploitation, and Competition , 2007, IEEE Transactions on Mobile Computing.

[79]  Tung-Sang Ng,et al.  Robust beamforming in cognitive radio , 2010 .

[80]  Ananthram Swami,et al.  Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework , 2007, IEEE Journal on Selected Areas in Communications.