Security Challenges in Cognitive Radio Networks

Cognitive radio network (CRN) is an evolving concept aiming at more efficiently exploiting the available spectrum for opportunistic network usage. Deploying Cognitive Radio Networks raises several open issues and security concerns. CRNs suffer from both classical wireless networks vulnerabilities and threats, and new threats related to their inherent functionalities. In this paper, an overview of the cognitive radio networks and their security challenges will be provided. Both, the traditional and new security threats that emerged from these promising networks are addressed. The paper will also focus on the Primary User Emulation (PUE) attack as one of the main specific attacks targeting CRNs and analyze some proposed countermeasure. Furthermore, CRN security requirements are introduced.

[1]  C. Cordeiro,et al.  IEEE 802.22: the first worldwide wireless standard based on cognitive radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[2]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[3]  Apurva N. Mody,et al.  Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[4]  Máire O'Neill,et al.  Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[5]  Shamik Sengupta,et al.  Open research issues in multi-hop cognitive radio networks , 2013, IEEE Communications Magazine.

[6]  N. Prasad,et al.  Characterizing reliability in cognitive radio networks , 2008, 2008 First International Symposium on Applied Sciences on Biomedical and Communication Technologies.

[7]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[8]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[9]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[10]  E. Ahmed,et al.  Spectrum-aware dynamic channel assignment in cognitive radio networks , 2012, 2012 International Conference on Emerging Technologies.

[11]  Jack L. Burbank,et al.  Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[12]  Shamik Sengupta,et al.  Vulnerabilities in cognitive radio networks: A survey , 2013, Comput. Commun..

[13]  Li Zhu,et al.  An Investigation on Security of Cognitive Radio Networks , 2011, 2011 International Conference on Management and Service Science.

[14]  Özgür B. Akan,et al.  Cognitive radio sensor networks , 2009, IEEE Network.

[15]  Athanasios V. Vasilakos,et al.  Routing Metrics of Cognitive Radio Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[16]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[17]  Xiaohua Li,et al.  Anti-jamming performance of cognitive radio networks , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[18]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[19]  Chunsheng Xin,et al.  FMAC: A fair MAC protocol for coexisting cognitive radio networks , 2013, 2013 Proceedings IEEE INFOCOM.

[20]  Loukas Lazos,et al.  A Primary User authentication system for mobile cognitive radio networks , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).

[21]  Miao Pan,et al.  Joint routing and link scheduling for cognitive radio networks under uncertain spectrum supply , 2011, 2011 Proceedings IEEE INFOCOM.

[22]  Oluwatobi Olabiyi,et al.  Leader election algorithm for distributed ad-hoc cognitive radio networks , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).

[23]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.

[24]  Santhanakrishnan Anand,et al.  Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.