Taxonomy of security attacks and threats in cognitive radio networks

Cognitive radio networks (CRNs) are thought to be the most encouraging solution in enhancing the spectrum utilization and solving the spectrum scarcity, however due to the nature of these intelligent networks and its accessing methods from licensed and unlicensed users, CRNs are exposed to different types of threats and attacks from different malicious users more than traditional wireless networks, which can affect the network availability and performance. In this paper, recent security attacks and threats on CRNs will be investigated and introduced in order to study the security aspects for CRNs that can be used to guard and secure CRNs from the well-known attacks.

[1]  Zhiyong Feng,et al.  A survey of security issues in Cognitive Radio Networks , 2015 .

[2]  Fei Hu,et al.  Spectrum Sharing in Wireless Networks : Fairness, Efficiency, and Security , 2016 .

[3]  Johnson P. Thomas,et al.  MAC-TCP cross-layer attack and its defense in cognitive radio networks , 2014, Q2SWinet '14.

[4]  Ian F. Akyildiz,et al.  A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.

[5]  Song Han,et al.  Cognitive radio network security: A survey , 2012, J. Netw. Comput. Appl..

[6]  Mohsen Guizani,et al.  Survey of Security Issues in Cognitive Radio Networks , 2011 .

[7]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[8]  J. Morris Chang,et al.  A layered approach to cognitive radio network security: A survey , 2014, Comput. Networks.

[9]  Natarajan Meghanathan A Comprehensive Review and Analysis of Solutions for Different Layers ofthe TCP/IP Layer Stack and Security Issues for Cognitive Radio Networks , 1970 .

[10]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[11]  Ningrinla Marchang,et al.  Cognitive Radio Networks Security Threats and Attacks: A Review , 2014 .

[12]  Husheng Li,et al.  Cross-Layer Attack and Defense in Cognitive Radio Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[13]  Natarajan Meghanathan,et al.  A Survey on the Communication Protocols and Security in Cognitive Radio Networks , 2013, Int. J. Commun. Networks Inf. Secur..

[14]  Valentin Rakovic,et al.  Security Aspects of Policy Controlled Cognitive Radio , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[15]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[16]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[17]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[18]  Erik G. Larsson,et al.  Spectrum Sensing for Cognitive Radio : State-of-the-Art and Recent Advances , 2012, IEEE Signal Processing Magazine.

[19]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[20]  Kang G. Shin,et al.  Cognitive radios for dynamic spectrum access: from concept to reality , 2010, IEEE Wireless Communications.

[21]  Y. Thomas Hou,et al.  Cognitive radio communications and networks: principles and practice , 2012 .

[22]  Kaigui Bian,et al.  MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .

[23]  Mohamed Ibnkahla Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle , 2014 .

[24]  Maria-Gabriella Di Benedetto,et al.  A Survey on MAC Strategies for Cognitive Radio Networks , 2012, IEEE Communications Surveys & Tutorials.

[25]  Jing Zhao,et al.  Robust Topology Control in Multi-Hop Cognitive Radio Networks , 2012, IEEE Transactions on Mobile Computing.

[26]  Ghaith Hattab,et al.  Multiband Spectrum Access: Great Promises for Future Cognitive Radio Networks , 2014, Proceedings of the IEEE.

[27]  Qusay H. Mahmoud,et al.  Cognitive Networks: Towards Self-Aware Networks , 2007 .

[28]  Jim Esch,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proc. IEEE.

[29]  Kaushik R. Chowdhury,et al.  A survey on MAC protocols for cognitive radio networks , 2009, Ad Hoc Networks.