Privacy Preserving Security Framework for Cognitive Radio Networks

Abstract To address the ever-increasing demand for wireless bandwidth, cognitive radio networks (CRNs) have been proposed to improve the efficiency of channel utilization. CRN permits unlicensed users to utilize the idle spectrum as long as it does not introduce interference to the primary users due to the Federal Communications Commission’s recent regulatory policies. In this article, we first identify the security challenges on CRNs. Then, we present main security issues together with privacy issues on CRNs and provide a privacy preserving security framework as a potential solution. The proposed framework provides a privacy preserving yet accountable security among the CRN entities. Finally, we suggest directions of future work on secure CRNs by describing several open issues.

[1]  Ian F. Akyildiz,et al.  CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.

[2]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[3]  Himanshu Katiyar,et al.  Cooperative Communication: A Review , 2011 .

[4]  Li Zhu,et al.  An Investigation on Security of Cognitive Radio Networks , 2011, 2011 International Conference on Management and Service Science.

[5]  Hyun Sung Kim,et al.  Location-based authentication protocol for first cognitive radio networking standard , 2011, J. Netw. Comput. Appl..

[6]  Zhoujun Li,et al.  An efficient and non-interactive hierarchical key agreement protocol , 2011, Comput. Secur..

[7]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[8]  Qusay H. Mahmoud,et al.  Cognitive Networks: Towards Self-Aware Networks , 2007 .

[9]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[10]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..

[11]  Jin Li,et al.  Optimal Frequency-time Allocation in Cognitive Radio Wireless Mesh Networks , 2011 .

[12]  N.R. Prasad Secure Cognitive Networks , 2008, 2008 European Conference on Wireless Technology.

[13]  Zhongding Lei,et al.  IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.

[14]  Shuai Li,et al.  Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.

[15]  Song Han,et al.  Cognitive radio network security: A survey , 2012, J. Netw. Comput. Appl..

[16]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[17]  John M. Acken,et al.  A Cross Section of the Issues and Research Activities Related to Both Information Security and Cloud Computing , 2011 .