A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks

With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. The allocation of the Industrial, Medical and Scientific (ISM) band has enabled the explosion of new technologies (e.g. Wi-Fi) due to its licence-exempt characteristic. The widespread adoption of Wi-Fi technology, combined with the rapid penetration of smart phones running popular user services (e.g. social online networks) has overcrowded substantially the ISM band. On the other hand, according to a number of recent reports, several parts of the static allocated licensed bands are under-utilized. This has brought up the idea of the opportunistic use of these bands through the, so-called, cognitive radios and cognitive radio networks. Cognitive radios have enabled the opportunity to transmit in several licensed bands without causing harmful interference to licensed users. Along with the realization of cognitive radios, new security threats have been raised. Adversaries can exploit several vulnerabilities of this new technology and cause severe performance degradation. Security threats are mainly related to two fundamental characteristics of cognitive radios: cognitive capability, and reconfigurability. Threats related to the cognitive capability include attacks launched by adversaries that mimic primary transmitters, and transmission of false observations related to spectrum sensing. Reconfiguration can be exploited by attackers through the use of malicious code installed in cognitive radios. Furthermore, as cognitive radio networks are wireless in nature, they face all classic threats present in the conventional wireless networks. The scope of this work is to give an overview of the security threats and challenges that cognitive radios and cognitive radio networks face, along with the current state-of-the-art to detect the corresponding attacks. In addition, future challenges are addressed.

[1]  Máire O'Neill,et al.  Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[2]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[3]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[4]  Genshe Chen,et al.  Performance evaluation of distributed compressed wideband sensing for cognitive radio networks , 2008, 2008 11th International Conference on Information Fusion.

[5]  N.R. Prasad Secure Cognitive Networks , 2008, 2008 European Conference on Wireless Technology.

[6]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[7]  Stephen Dean Brown FPGA Architectural Research: A Survey , 1996, IEEE Des. Test Comput..

[8]  Zhu Han,et al.  CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[9]  Zhongding Lei,et al.  IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.

[10]  Kaushik R. Chowdhury,et al.  A survey on MAC protocols for cognitive radio networks , 2009, Ad Hoc Networks.

[11]  Alexandros G. Fragkiadakis,et al.  Anomaly-Based Intrusion Detection Algorithms for Wireless Networks , 2010, WWIC.

[12]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[13]  Brian Choi,et al.  Distributed Spectrum Sensing for Cognitive Radio Systems , 2007, 2007 Information Theory and Applications Workshop.

[14]  Kyutae Lim,et al.  First Cognitive Radio Networking Standard for Personal/Portable Devices in TV White Spaces , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[15]  Markus Fiedler,et al.  Misbehavior Scenarios in Cognitive Radio Networks , 2010, Future Internet.

[16]  Ananthram Swami,et al.  Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework , 2007, IEEE Journal on Selected Areas in Communications.

[17]  Xiaohua Li,et al.  Secure transmission power of cognitive radios for dynamic spectrum access applications , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[18]  Jiann-Liang Chen,et al.  Reconfigurable Software Defined Radio and Its Applications , 2010 .

[19]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[20]  Chien-Chung Shen,et al.  Single-Radio Adaptive Channel Algorithm for Spectrum Agile Wireless Ad Hoc Networks , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[21]  Husheng Li,et al.  Defending against Hit-and-Run Attackers in Collaborative Spectrum Sensing of Cognitive Radio Networks: A Point System , 2010, 2010 IEEE 71st Vehicular Technology Conference.

[22]  Ladimer S. Nagurney Software defined radio in the electrical and computer engineering curriculum , 2009, 2009 39th IEEE Frontiers in Education Conference.

[23]  Gernot Heiser Virtualization for Embedded Systems , 2007 .

[24]  Ying Wang,et al.  Cognitive Radio: From Spectrum Sharing to Adaptive Learning and Reconfiguration , 2008, 2008 IEEE Aerospace Conference.

[25]  Shamik Sengupta,et al.  Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2010, 2010 IEEE International Conference on Communications.

[26]  V.R. Petty,et al.  KUAR: A Flexible Software-Defined Radio Development Platform , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[27]  Wei Yuan,et al.  Threshold-Learning in Local Spectrum Sensing of Cognitive Radio , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[28]  Mohamed-Slim Alouini,et al.  Empirical results for wideband multidimensional spectrum usage , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[29]  Neeraj Jaggi,et al.  MAC layer misbehavior effectiveness and collective aggressive reaction approach , 2010, 2010 IEEE Sarnoff Symposium.

[30]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[31]  Ryuji Kohno,et al.  Security Issues for Software Defined Radio : Design of a Secure Download System(Special Issue on Software Defined Radio Technology and Its Applications) , 2002 .

[32]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..

[33]  S. Besen THE EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE: A PRELIMINARY ANALYSIS , 1990 .

[34]  T. C. Aysal,et al.  Cooperative Spectrum Sensing with Noisy Hard Decision Transmissions , 2009, 2009 IEEE International Conference on Communications.

[35]  Ryuji Kohno,et al.  A proposal of architectural elements for implementing secure software download service in software defined radio , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[36]  John S. Baras,et al.  Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments , 2009, IEEE/ACM Transactions on Networking.

[37]  David K. Chiabi European Telecommunications Standards Institute , 2015 .

[38]  K. P. Subbalakshmi,et al.  Digital Signatures for Centralized DSA Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[39]  Michael Gastpar,et al.  On Capacity Under Receive and Spatial Spectrum-Sharing Constraints , 2007, IEEE Transactions on Information Theory.

[40]  B. Farhang-Boroujeny,et al.  An Experimental Cognitive Radio for First Responders , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[41]  Xiaodong Wang,et al.  Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[42]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[43]  Joseph Mitola Cognitive Radio for Flexible Mobile Multimedia Communications , 2001, Mob. Networks Appl..

[44]  Santhanakrishnan Anand,et al.  Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.

[45]  E. Jones Software Defined Radios, Cognitive Radio and the Software Communications Architecture (SCA) in relation to COMMS, radar and ESM , 2008 .

[46]  Friedrich Jondral,et al.  Software-Defined Radio—Basics and Evolution to Cognitive Radio , 2005, EURASIP J. Wirel. Commun. Netw..

[47]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.

[48]  Douglas M. Blough,et al.  Securing the download of radio configuration files for software defined radio devices , 2004, MobiWac '04.

[49]  Kang G. Shin,et al.  In-band spectrum sensing in cognitive radio networks: energy detection or feature detection? , 2008, MobiCom '08.

[50]  Carlos A. Pomalaza-Raez,et al.  Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[51]  Raj Jain,et al.  A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.

[52]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[53]  Martine Villegas,et al.  Analysis of spectrum utilization in suburb environment—evaluation of potentials for cognitive radio , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.

[54]  Yunfei Chen Collaborative spectrum sensing in the presence of secondary user interferences for lognormal shadowing , 2012, Wirel. Commun. Mob. Comput..

[55]  Petri Mähönen,et al.  Lessons Learned from an Extensive Spectrum Occupancy Measurement Campaign and a Stochastic Duty Cycle Model , 2009, 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities and Workshops.

[56]  Teng Joon Lim,et al.  Cooperative Quickest Spectrum Sensing in Cognitive Radios with Unknown Parameters , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[57]  Kaigui Bian,et al.  MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .

[58]  Sai Shankar Nandagopalan,et al.  IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios , 2006, J. Commun..

[59]  G.J.M. Smit,et al.  A Reconfigurable Radio Architecture for Cognitive Radio in Emergency Networks , 2006, 2006 European Conference on Wireless Technology.

[60]  Kang G. Shin,et al.  Attack-tolerant distributed sensing for dynamic spectrum access networks , 2009, 2009 17th IEEE International Conference on Network Protocols.

[61]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[62]  Alexandros G. Fragkiadakis,et al.  Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype , 2012, EURASIP J. Wirel. Commun. Netw..

[63]  Jung-Min Park,et al.  Tamper Resistance for Software Defined Radio Software , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.

[64]  Ryuji Kohno,et al.  Secure download system based on software defined radio composed of FPGAs , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[65]  Timothy J. O'Shea,et al.  Applications of Machine Learning to Cognitive Radio Networks , 2007, IEEE Wireless Communications.

[66]  Dirk Grunwald,et al.  A Software Defined Radio Application Utilizing Modern FPGAs and NoC Interconnects , 2007, 2007 International Conference on Field Programmable Logic and Applications.

[67]  Sheila E. Frankel,et al.  Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .

[68]  Shuguang Cui,et al.  Optimal Linear Cooperation for Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE Journal of Selected Topics in Signal Processing.

[69]  Zhu Han,et al.  Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[70]  Chittabrata Ghosh,et al.  Secure Communication in Cognitive Radio Networks , 2022 .

[71]  John J. Fitton SECURITY CONSIDERATIONS FOR SOFTWARE DEFINED RADIOS , 2002 .

[72]  Ryuji Kohno,et al.  A framework for secure download for software-defined radio , 2002 .

[73]  Pramod K. Varshney,et al.  Countering byzantine attacks in cognitive radio networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[74]  Xuemin Shen,et al.  HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management , 2008, IEEE Journal on Selected Areas in Communications.

[75]  Russell Tessier,et al.  FPGA Architecture: Survey and Challenges , 2008, Found. Trends Electron. Des. Autom..

[76]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[77]  Murat Çakiroglu,et al.  Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.

[78]  Husheng Li,et al.  Cross-Layer Attack and Defense in Cognitive Radio Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[79]  Maxim Raya,et al.  DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.

[80]  Xianming Qing,et al.  Spectrum Survey in Singapore: Occupancy Measurements and Analyses , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[81]  T.X. Brown,et al.  Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[82]  C. Cordeiro,et al.  C-MAC: A Cognitive MAC Protocol for Multi-Channel Wireless Networks , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[83]  Kaigui Bian,et al.  Security vulnerabilities in IEEE 802.22 , 2008, WICON 2008.

[84]  Jack L. Burbank,et al.  Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[85]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[86]  Hazem H. Refai,et al.  A Frequency Agile Implementation for IEEE 802.22 Using Software Defined Radio Platform , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[87]  Hiroshi Harada A small-size software defined cognitive radio prototype , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[88]  Niraj K. Jha,et al.  An architecture for secure software defined radio , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.

[89]  Peter C. Mason,et al.  Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[90]  Robert G. Cole,et al.  Voice over IP performance monitoring , 2001, CCRV.

[91]  Geethapriya Thamilarasu,et al.  A Cross-layer Approach to Detect Jamming Attacks in Wireless Ad hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[92]  Juan Hernández-Serrano,et al.  Modeling the Lion Attack in Cognitive Radio Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[93]  Dirk Grunwald,et al.  MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs , 2006, MobiSys '06.

[94]  Zhu Han,et al.  Collaborative spectrum sensing from sparse observations using matrix completion for cognitive radio networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[95]  John A. Copeland,et al.  An anti-cloning framework for software defined radio mobile devices , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[96]  William M. Campbell,et al.  BIOMETRICALLY ENHANCED SOFTWARE-DEFINED RADIOS , 2003 .

[97]  Bin Shen,et al.  Optimal Linear Soft Fusion Schemes for Cooperative Sensing in Cognitive Radio Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[98]  Feng Zhu,et al.  Enhanced robust cooperative spectrum sensing in cognitive radio , 2009, Journal of Communications and Networks.

[99]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[100]  Vijay K. Bhargava,et al.  OMC-MAC: An Opportunistic Multichannel MAC for Cognitive Radio Networks , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.

[101]  Ranjan K. Mallik,et al.  Cooperative Spectrum Sensing Optimization in Cognitive Radio Networks , 2008, 2008 IEEE International Conference on Communications.

[102]  Li Zhu,et al.  Two Types of Attacks against  Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.

[103]  Mohamed-Slim Alouini,et al.  On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.

[104]  L. Van der Perre,et al.  Receiver Architectures for Software-defined Radios in Mobile Terminals: the Path to Cognitive Radios , 2007, 2007 IEEE Radio and Wireless Symposium.

[105]  Sanjay Jha,et al.  Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[106]  Catherine K. Murphy Combining belief functions when evidence conflicts , 2000, Decis. Support Syst..

[107]  Yi Zheng,et al.  Cooperative Spectrum Sensing Based on SNR Comparison in Fusion Center for Cognitive Radio , 2009, 2009 International Conference on Advanced Computer Control.

[108]  Gianmarco Baldini,et al.  Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.

[109]  Kang G. Shin,et al.  OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks , 2008, IEEE Transactions on Mobile Computing.

[110]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[111]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[112]  Insoo Koo,et al.  An enhanced cooperative spectrum sensing scheme based on evidence theory and reliability source evaluation in cognitive radio context , 2009, IEEE Communications Letters.