Design considerations for a cognitive radio trust and security framework

In cognitive radio (CR) systems communication is not restricted to pre-assigned channels, but is rather able to opportunistically detect and use appropriate portions of spectrum. Although much research effort has been put into this new technology, the technical focus has been mainly directed towards pushing further the attainable spectral efficiency gains. Taking a step back, our work looks into the critical challenges with respect to reliability, robustness and security, which hinder operators from investing in this new technology. We propose a new conceptual framework for trust and security to be integrated with the performance architecture and protocols for CR networks (CRNs). Our target is increasing trustworthiness from users and operators perspective in support of their successful deployment.

[1]  Alireza Attar,et al.  Cognitive Radio Communications and Networks: Principles and Practice , 2010 .

[2]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[3]  Ananthram Swami,et al.  Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[4]  V. Tarokh,et al.  Cognitive radio networks , 2008, IEEE Signal Processing Magazine.

[5]  Christos V. Verikoukis,et al.  A Non-Parametric Statistical Approach for Malicious Users Detection in Cognitive Wireless Ad-Hoc Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[6]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[7]  Apurva N. Mody,et al.  Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[8]  Santhanakrishnan Anand,et al.  Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.

[9]  Zhu Han,et al.  Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[10]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[11]  Pramod K. Varshney,et al.  Countering byzantine attacks in cognitive radio networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[12]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[13]  Angel A. Juan,et al.  Adaptive Sensing User Selection Mechanism in Cognitive Wireless Networks , 2010, IEEE Communications Letters.

[14]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[15]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[16]  Henry Hexmoor,et al.  A theoretical inter-organizational trust-based security model , 2006, The Knowledge Engineering Review.

[17]  Jose F. Monserrat,et al.  Mobile and Wireless Communications for IMT-Advanced and Beyond , 2011 .

[18]  Y. Thomas Hou,et al.  Cognitive radio communications and networks: principles and practice , 2012 .

[19]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[20]  Ioannis G. Askoxylakis,et al.  Security and Resilience in Cognitive Radio Networks , 2011 .