Security Issues of Cognitive Radio Network

Security is a critical issue in Cognitive Radio Networks CRN. And in order to implement appropriate security mechanisms, various possible attacks on (CRN) must be identified. This paper clarifies a literature review of different CRN surveys, security features of CRN, attacks on CRN and lastly attacks and their corresponding countermeasures are tabulated in order to identify researchers about the last updates in CRN's attacks and countermeasures.

[1]  Jaydip Sen,et al.  A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks , 2013, ArXiv.

[2]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[3]  Abbas Ali Sharifi,et al.  Defense Against SSDF Attack in Cognitive Radio Networks: Attack-Aware Collaborative Spectrum Sensing Approach , 2016, IEEE Communications Letters.

[4]  Karen A. Scarfone,et al.  Guide to Bluetooth Security , 2008 .

[5]  Shabnam Sodagari,et al.  An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks , 2011, GameSec.

[6]  Martin Johnston,et al.  Defeating SSDF Attacks With Trusted Nodes Assistance in Cognitive Radio Networks , 2017, IEEE Sensors Letters.

[7]  Leonardo Goratti,et al.  A single iteration belief propagation algorithm to minimize the effects of primary user emulation attacks , 2016, 2016 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).

[8]  Mainak Chatterjee,et al.  Trust based channel preference in cognitive radio networks under collaborative selfish attacks , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).

[9]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2011, IEEE Trans. Signal Process..

[10]  Qingqi Pei,et al.  Neighbor Detection-Based Spectrum Sensing Algorithm in Distributed Cognitive Radio Networks , 2017 .

[11]  Anjali Agarwal,et al.  A survey on security in Cognitive Radio networks , 2014, 2014 6th International Conference on Computer Science and Information Technology (CSIT).

[12]  Hongxing Wu,et al.  Malicious user detection for wide-band cognitive radio networks , 2016, 2016 Asia-Pacific Microwave Conference (APMC).

[13]  Li Zhu,et al.  Two Types of Attacks against  Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.

[14]  Mohsen Guizani,et al.  Survey of Security Issues in Cognitive Radio Networks , 2011 .

[15]  Ali Jamshidi,et al.  Defence against primary user emulation attack using statistical properties of the cognitive radio received power , 2017, IET Commun..

[16]  Qusay H. Mahmoud,et al.  Cognitive Networks: Towards Self-Aware Networks , 2007 .

[17]  Guoru Ding,et al.  Defending against Byzantine attack in cooperative spectrum sensing relying on a reliable reference , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).

[18]  Karen A. Scarfone,et al.  Guide to Bluetooth Security , 2008 .

[19]  Murat Dener,et al.  Security Analysis in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[20]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[21]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[22]  Sattar B. Sadkhan,et al.  Cognitive radio network security status and challenges , 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT).

[23]  Tongtong Li,et al.  Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.

[24]  Ting Peng,et al.  Improved soft fusion-based cooperative spectrum sensing defense against SSDF attacks , 2016, 2016 International Conference on Computer, Information and Telecommunication Systems (CITS).

[25]  Kaigui Bian,et al.  MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .

[26]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[27]  Liang Hu,et al.  The Security of Physical Layer in Cognitive Radio Networks , 2014 .

[28]  J. Morris Chang,et al.  A layered approach to cognitive radio network security: A survey , 2014, Comput. Networks.