The Security of Physical Layer in Cognitive Radio Networks

—Cognitive Radio (CR) is a novel technology that promises to solve the lack of spectrum by allowing secondary users to use licensed band, so that they can coexist with primary users without causing interference to their communications. With the development of CR, extending to the level of network, cognitive radio networks (CRNs) emerge as the times require. Nowadays the operational aspects of CRN are being explored vigorously, and several potential security challenges for cognitive radio have gained lots of attention. In this paper, we explore the security issues on physical layer for cognitive radio networks. First, we give a brief overview of the CRNs, then we review several existing secure threats to the physical layer in CRNs and we propose a new kind of security problem. Next, we discuss the related countermeasures on how to defend against these attacks. Subsequently, we conduct an evaluation of these countermeasures, and make some future works for secure CRNs. At last, we make the conclusion.

[1]  Gyanendra Prasad Joshi,et al.  Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends , 2013, Sensors.

[2]  Ramjee Prasad,et al.  Deployment of Cognitive Radio in India , 2014, Wirel. Pers. Commun..

[3]  Sajal K. Das,et al.  Coordination problem in cognitive wireless mesh networks , 2013, Pervasive Mob. Comput..

[4]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[5]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[6]  Lu Zhang,et al.  Anti-jamming Scheme Based on Zero Pre-shared Secret in Cognitive Radio Network , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.

[7]  Cheng Yang,et al.  The Coverage Analysis of Cognitive Radio Network , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[8]  Santhanakrishnan Anand,et al.  Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.

[9]  Guangyue Lu,et al.  Social Incentives for Cooperative Spectrum Sensing in Distributed Cognitive Radio Networks , 2014, KSII Trans. Internet Inf. Syst..

[10]  Qihui Wu,et al.  Joint spectrum sensing and transmit power adaptation in interference-aware cognitive radio networks , 2014, Trans. Emerg. Telecommun. Technol..

[11]  Ying-Chang Liang,et al.  Cognitive radio network architecture: part I -- general structure , 2008, ICUIMC '08.

[12]  Roberto Di Pietro,et al.  Jamming mitigation in cognitive radio networks , 2013, IEEE Network.

[13]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[14]  Prasant Mohapatra,et al.  Hearing is believing: Detecting mobile primary user emulation attack in white space , 2011, 2011 Proceedings IEEE INFOCOM.

[15]  Apurva N. Mody,et al.  Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[16]  Xiaofu Ma,et al.  Practical Issues for Spectrum Management With Cognitive Radios , 2014, Proceedings of the IEEE.

[17]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[18]  Ruoshan Kong,et al.  Distributed and Centralized Schemes for Channel Sensing Order Setting in Multi-user Cognitive Radio Networks , 2014, Wirel. Pers. Commun..

[19]  Olga León Abarca,et al.  Securing cognitive radio networks , 2010 .

[20]  Yuan Shi,et al.  Detecting Primary User Emulation Attack in Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[21]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[22]  Kouichi Sakurai,et al.  A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[23]  Zhu Han,et al.  Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[24]  David Fernandes Cruz Moura,et al.  Anti-jamming defense mechanism in cognitive radios networks , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[25]  Ben Y. Zhao,et al.  Multi-channel Jamming Attacks using Cognitive Radios , 2007, 2007 16th International Conference on Computer Communications and Networks.

[26]  Sajad Sadough,et al.  Spectrum Sensing for Cognitive Radio Networks Based on Blind Source Separation , 2013, KSII Trans. Internet Inf. Syst..

[27]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[28]  Juan Rico,et al.  Resource management for QoS support in cognitive radio networks , 2014, IEEE Communications Magazine.

[29]  Chunsheng Xin,et al.  Detection of PUE Attacks in Cognitive Radio Networks Based on Signal Activity Pattern , 2014, IEEE Transactions on Mobile Computing.

[30]  Carlo S. Regazzoni,et al.  Comparison among Cognitive Radio Architectures for Spectrum Sensing , 2011, EURASIP J. Wirel. Commun. Netw..

[31]  Qusay H. Mahmoud,et al.  Cognitive Networks: Towards Self-Aware Networks , 2007 .

[32]  Sisi Liu,et al.  Thwarting inside jamming attacks on wireless broadcast communications , 2011, WiSec '11.

[33]  R.W. Brodersen,et al.  Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[34]  Ping Zhang,et al.  Cognitive information metrics for cognitive wireless networks , 2014 .

[35]  Mohsen Guizani,et al.  Survey of Security Issues in Cognitive Radio Networks , 2011 .

[36]  Kranthimanoj Nagothu,et al.  A Beamforming Approach to Smart Grid Systems Based on Cloud Cognitive Radio , 2014, IEEE Systems Journal.

[37]  Mainak Chatterjee,et al.  Collaborative jamming and collaborative defense in cognitive radio networks , 2013, Pervasive Mob. Comput..

[38]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[39]  Shuguang Cui,et al.  On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[40]  Miguel Soriano,et al.  Securing cognitive radio networks , 2010, Int. J. Commun. Syst..