A survey on security attacks and countermeasures with primary user detection in cognitive radio networks

Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most promising players by enabling the dynamic access to vacant frequency bands on a non-interference basis. However, the intrinsic characteristic of CR opens new ways for attackers, namely in the context of the effective detection of incumbent or primary users (PUs), the most fundamental and challenging requirement for the successful operation of CR networks. In this article, we provide a global and integrated vision of the main threats affecting CR environments in the context of the detection of primary users, with a particular focus on spectrum sensing data falsification and primary user emulation attacks. We also address solutions and research challenges still required to address such threats. Our discussion aims at being complete and self-contained, while also targeting readers with no specific background on this important topic of CR environments. It is, as far as our knowledge goes, the first work providing a global and clear vision of security threats and countermeasures in the context of primary user detection in CR.

[1]  Asis Nasipuri Collaborative Detection of Spatially Correlated Signals in Sensor Networks , 2005 .

[2]  Helena Rifà-Pous,et al.  Authenticating hard decision sensing reports in cognitive radio networks , 2012, Comput. Networks.

[3]  Miguel Soriano,et al.  Securing cognitive radio networks , 2010, Int. J. Commun. Syst..

[4]  Fakhri Karray,et al.  Multisensor data fusion: A review of the state-of-the-art , 2013, Inf. Fusion.

[5]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[6]  Zhu Han,et al.  Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[7]  Ian F. Akyildiz,et al.  Reinforcement learning for cooperative sensing gain in cognitive radio ad hoc networks , 2013, Wirel. Networks.

[8]  Jan M. Rabaey,et al.  Location in distributed ad-hoc wireless sensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[9]  Tongtong Li,et al.  Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Han-Chieh Chao,et al.  Secure centralized spectrum sensing for cognitive radio networks , 2012, Wirel. Networks.

[11]  A. C. Sumathi,et al.  Security in cognitive radio networks - a survey , 2012, 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA).

[12]  Hanen Idoudi,et al.  Security Challenges in Cognitive Radio Networks , 2014 .

[13]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[14]  Mansoor Alam,et al.  A robust malicious user detection scheme in cooperative spectrum sensing , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[15]  Santhanakrishnan Anand,et al.  Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.

[16]  Van Tam Nguyen,et al.  Cognitive Radio RF: Overview and Challenges , 2012, VLSI Design.

[17]  Geoffrey Ye Li,et al.  Ten years of research in spectrum sensing and sharing in cognitive radio , 2012, EURASIP J. Wirel. Commun. Netw..

[18]  Zhu Han,et al.  Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[19]  Danijela Cabric,et al.  Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.

[20]  Mohsen Guizani,et al.  Securing cognitive radio networks against primary user emulation attacks , 2015, IEEE Network.

[21]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[22]  Licheng Jiao,et al.  Compressive spectrum sensing in the cognitive radio networks by exploiting the sparsity of active radios , 2013, Wirel. Networks.

[23]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.

[24]  Amy C. Malady,et al.  Clustering methods for distributed spectrum sensing in cognitive radio systems , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[25]  Kuang-Ching Wang,et al.  Value-Fusion versus Decision-Fusion for Fault-tolerance in Collaborative Target Detection in Sensor Networks , 2001 .

[26]  Shuigeng Zhou,et al.  A Walking Beacon-Assisted Localization in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[27]  Ji Wang,et al.  Trust-based data fusion mechanism design in cognitive radio networks , 2014, 2014 IEEE Conference on Communications and Network Security.

[28]  José Marinho,et al.  Cognitive radio: survey on communication protocols, spectrum decision issues, and future research directions , 2011, Wireless Networks.

[29]  Wenliang Du,et al.  A physical layer authentication scheme for countering primary user emulation attack , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[30]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[31]  Kang G. Shin,et al.  Attack-tolerant distributed sensing for dynamic spectrum access networks , 2009, 2009 17th IEEE International Conference on Network Protocols.

[32]  Fredrik Rusek,et al.  Iterative receivers with channel estimation for multi-user MIMO-OFDM: complexity and performance , 2012, EURASIP Journal on Wireless Communications and Networking.

[33]  Ping Zhang,et al.  Security management based on trust determination in cognitive radio networks , 2014, EURASIP J. Adv. Signal Process..

[34]  Qian Zhang,et al.  Cooperative Boundary Detection for Spectrum Sensing Using Dedicated Wireless Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[35]  Carl A. Gunter,et al.  Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[36]  Gianmarco Baldini,et al.  Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.

[37]  Hüseyin Arslan,et al.  Utilization of Location Information in Cognitive Wireless Networks , 2007, IEEE Wireless Communications.

[38]  Álvaro Araujo,et al.  Security in cognitive wireless sensor networks. Challenges and open problems , 2012, EURASIP Journal on Wireless Communications and Networking.

[39]  Apurva N. Mody,et al.  Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[40]  Tingting Liu,et al.  Research on hidden malicious user detection problem , 2014, Secur. Commun. Networks.

[41]  Juan Hernández-Serrano,et al.  Cooperative detection of primary user emulation attacks in CRNs , 2012, Comput. Networks.

[42]  Hyunseung Choo,et al.  VeriEST: verification via primary user emulation signal-based test for secure distributed spectrum sensing in cognitive radio networks , 2012, Secur. Commun. Networks.

[43]  Jiasong Mu,et al.  Throat polyp detection based on compressed big data of voice with support vector machine algorithm , 2014, EURASIP Journal on Advances in Signal Processing.

[44]  Zhu Han,et al.  Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks , 2010, EURASIP J. Adv. Signal Process..

[45]  Zhou Su,et al.  Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.

[46]  Chunsheng Xin,et al.  Detection of PUE Attacks in Cognitive Radio Networks Based on Signal Activity Pattern , 2014, IEEE Transactions on Mobile Computing.

[47]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[48]  Alec Yasinsac,et al.  Peer identification in wireless and sensor networks using signal properties , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[49]  Dragos Niculescu,et al.  Positioning in ad hoc sensor networks , 2004, IEEE Network.

[50]  Álvaro Araujo,et al.  PUE attack detection in CWSNs using anomaly detection techniques , 2013, EURASIP J. Wirel. Commun. Netw..

[51]  Fiorenzo Franceschini,et al.  A review of localization algorithms for distributed wireless sensor networks in manufacturing , 2009, Int. J. Comput. Integr. Manuf..

[52]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[53]  Federico Boccardi,et al.  Load & backhaul aware decoupled downlink/uplink access in 5G systems , 2014, 2015 IEEE International Conference on Communications (ICC).

[54]  F. Richard Yu,et al.  An energy-efficient cooperative spectrum sensing scheme for cognitive radio networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[55]  Mohsen Guizani,et al.  Survey of Security Issues in Cognitive Radio Networks , 2011 .

[56]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[57]  Maryam Haghighat,et al.  Smart primary user emulation in cognitive radio networks: defence strategies against radio‐aware attacks and robust spectrum sensing , 2015, Trans. Emerg. Telecommun. Technol..

[58]  Shafaq Murtaza,et al.  A mitigation strategy against malicious Primary User Emulation Attack in Cognitive Radio networks , 2014, 2014 International Conference on Emerging Technologies (ICET).

[59]  Chunsheng Xin,et al.  CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks , 2014, Wirel. Networks.

[60]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[61]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[62]  Michele Nogueira Lima,et al.  A framework for resilient and secure spectrum sensing on cognitive radio networks , 2015, Comput. Networks.

[63]  Daeyoung Park,et al.  Coordinating transmit power and carrier phase for wireless networks with multi-packet reception capability , 2013, EURASIP J. Wirel. Commun. Netw..

[64]  Peng Kai,et al.  A New Method to Detect Primary User Emulation Attacks in Cognitive Radio Networks , 2014 .

[65]  Jack L. Burbank,et al.  Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[66]  Jing Xu,et al.  A survey on dynamic spectrum access protocols for distributed cognitive wireless networks , 2012, EURASIP Journal on Wireless Communications and Networking.