A Survey on C-RAN Security

While 4G is speeding up its steps toward global markets, 5G has initiated its full development to satisfy an increasing demand on mobile data traffic and big data bandwidth. Centralized data processing, collaborative radio, real-time cloud infrastructure, and cloud radio access network (C-RAN), along with their excellent advantages are being sought by more and more operators to meet end-user requirements. As a promising mobile wireless network architecture, compared with traditional RAN, C-RAN has incomparable advantages in terms of low power consumption, reduced base station (BS) numbers, and economic capital and operating expenditure. It can also improve network capacity and BS utilization rate. Recently, C-RAN security has aroused special attention and concern. However, the literature still lacks an overall review on it in order to guide current and future research. In this paper, we first overview the architecture, deployment scenarios, and special characteristics of C-RAN. We then provide a thorough review on the existing security studies in the field of C-RAN based on its three logic layers and corresponding security threats and attacks. Particularly, we discuss whether the current literature can satisfy the expected security requirements in C-RAN. Based on this, we indicate open research issues and propose future research trends.

[1]  Zhengang Pan,et al.  Toward green and soft: a 5G perspective , 2014, IEEE Communications Magazine.

[2]  Dirk Wübben,et al.  Cloud technologies for flexible 5G radio access networks , 2014, IEEE Communications Magazine.

[3]  Kaigui Bian,et al.  Security vulnerabilities in IEEE 802.22 , 2008, WICON 2008.

[4]  Sachin Shetty,et al.  Secure Radio Resource Management in Cloud Computing Based Cognitive Radio Networks , 2012, 2012 41st International Conference on Parallel Processing Workshops.

[5]  Xiaorui Wang,et al.  Security technology in virtualization system: State of the art and future direction , 2012 .

[6]  Xuelong Li,et al.  Recent Advances in Cloud Radio Access Networks: System Architectures, Key Techniques, and Open Issues , 2016, IEEE Communications Surveys & Tutorials.

[7]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[8]  Umer Salim,et al.  RAN as a service: Challenges of designing a flexible RAN architecture in a cloud-based heterogeneous mobile network , 2013, 2013 Future Network & Mobile Summit.

[9]  Abhinav Srivastava,et al.  Hardening OpenStack Cloud Platforms against Compute Node Compromises , 2016, AsiaCCS.

[10]  Zahir Tari,et al.  Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.

[11]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[12]  Kaigui Bian,et al.  MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .

[13]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.

[14]  Máire O'Neill,et al.  Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[15]  Yonggang Wen,et al.  Cloud radio access network (C-RAN): a primer , 2015, IEEE Network.

[16]  Yi Zheng,et al.  Cooperative Spectrum Sensing Based on SNR Comparison in Fusion Center for Cognitive Radio , 2009, 2009 International Conference on Advanced Computer Control.

[17]  Yunfei Chen Collaborative spectrum sensing in the presence of secondary user interferences for lognormal shadowing , 2012, Wirel. Commun. Mob. Comput..

[18]  Bo Ai,et al.  Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors , 2014, IEEE Access.

[19]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[20]  J. Mitola,et al.  Software radios: Survey, critical evaluation and future directions , 1992, IEEE Aerospace and Electronic Systems Magazine.

[21]  Roy D. Yates,et al.  Secret Communication with a Fading Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[22]  Joseph Mitola Cognitive Radio for Flexible Mobile Multimedia Communications , 2001, Mob. Networks Appl..

[23]  Santhanakrishnan Anand,et al.  Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.

[24]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[25]  Zhu Han,et al.  Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[26]  Jie Li,et al.  Joint Spectrum Sensing and Resource Allocation Scheme in Cognitive Radio Networks with Spectrum Sensing Data Falsification Attack , 2016, IEEE Transactions on Vehicular Technology.

[27]  Michael S. Berger,et al.  Cloud RAN for Mobile Networks—A Technology Overview , 2015, IEEE Communications Surveys & Tutorials.

[28]  Min Sheng,et al.  Exploiting Hybrid Clustering and Computation Provisioning for Green C-RAN , 2016, IEEE Journal on Selected Areas in Communications.

[29]  Feng Zhu,et al.  Enhanced robust cooperative spectrum sensing in cognitive radio , 2009, Journal of Communications and Networks.

[30]  Zhu Han,et al.  CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[31]  Kaushik R. Chowdhury,et al.  A survey on MAC protocols for cognitive radio networks , 2009, Ad Hoc Networks.

[32]  Supeng Leng,et al.  Joint Scheduling and Beamforming Coordination in Cloud Radio Access Networks With QoS Guarantees , 2016, IEEE Transactions on Vehicular Technology.

[33]  Gianmarco Baldini,et al.  Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.

[34]  T. C. Aysal,et al.  Cooperative Spectrum Sensing with Noisy Hard Decision Transmissions , 2009, 2009 IEEE International Conference on Communications.

[35]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[36]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[37]  Wenliang Du,et al.  A physical layer authentication scheme for countering primary user emulation attack , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[38]  Qing Wang,et al.  Wireless network cloud: Architecture and system requirements , 2010, IBM J. Res. Dev..

[39]  Carlos A. Pomalaza-Raez,et al.  Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[40]  Kang G. Shin,et al.  OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks , 2008, IEEE Transactions on Mobile Computing.

[41]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[42]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[43]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[44]  Vincent W. S. Wong,et al.  A Dynamic Resource Sharing Mechanism for Cloud Radio Access Networks , 2016, IEEE Transactions on Wireless Communications.