Spectrum sharing security and attacks in CRNs: a review

Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges.

[1]  José Manuel Moya,et al.  Simulation framework for security threats in cognitive radio networks , 2012, IET Commun..

[2]  Marwan Krunz,et al.  Channel access protocols for multihop opportunistic networks: challenges and recent developments , 2009, IEEE Network.

[3]  Atul B. Kathole,et al.  Detecting Black and Gray Hole Attacks in Mobile Ad Hoc Network Using an Adaptive Method , 2012 .

[4]  A. Anpalagan,et al.  Throughput Analysis of Opportunistic Access Strategies in Hybrid Underlay—Overlay Cognitive Radio Networks , 2012, IEEE Transactions on Wireless Communications.

[5]  Chen Wei,et al.  A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[6]  Miguel Soriano,et al.  Securing cognitive radio networks , 2010, Int. J. Commun. Syst..

[7]  Kang G. Shin,et al.  Cognitive radios for dynamic spectrum access: from concept to reality , 2010, IEEE Wireless Communications.

[8]  K. P. Subbalakshmi,et al.  Digital Signatures for Centralized DSA Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[9]  Wanjiun Liao,et al.  DH-MAC: A Dynamic Channel Hopping MAC Protocol for Cognitive Radio Networks , 2010, 2010 IEEE International Conference on Communications.

[10]  Máire O'Neill,et al.  A novel common control channel security framework for cognitive radio networks , 2012, Int. J. Auton. Adapt. Commun. Syst..

[11]  Y. Thomas Hou,et al.  Cognitive radio communications and networks: principles and practice , 2012 .

[12]  Yuan Zhang,et al.  Security Threats in Cognitive Radio Networks , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[13]  R. M. A. P. Rajatheva,et al.  Overlay/Underlay Spectrum Sharing for Multi-Operator Environment in Cognitive Radio Networks , 2011, 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring).

[14]  Kaigui Bian,et al.  MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .

[15]  Li Zhu,et al.  Two Types of Attacks against  Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.

[16]  Yih-Chun Hu,et al.  Secure topology discovery through network-wide clock synchronization , 2010, 2010 International Conference on Signal Processing and Communications (SPCOM).

[17]  Santhanakrishnan Anand,et al.  Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks , 2012, IEEE Transactions on Communications.

[18]  Hai Liu,et al.  Jump-stay based channel-hopping algorithm with guaranteed rendezvous for cognitive radio networks , 2011, 2011 Proceedings IEEE INFOCOM.

[19]  Ajit Singh,et al.  A Literature Review of Security Attack in Mobile Ad-hoc Networks , 2010 .

[20]  Mohammed Elkoutbi,et al.  Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs , 2012, J. Information Security.

[21]  F. Richard Yu,et al.  Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks , 2010, Wirel. Networks.

[22]  Jiang Xie,et al.  ProSpect: A Proactive Spectrum Handoff Framework for Cognitive Radio Ad Hoc Networks without Common Control Channel , 2012, IEEE Transactions on Mobile Computing.

[23]  K. J. Ray Liu,et al.  Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[24]  Xiao-ming Chen,et al.  Cognitive Networks and Its Layered Cognitive Architecture , 2010, 2010 Fifth International Conference on Internet Computing for Science and Engineering.

[25]  Juebo Wu,et al.  Research and Analysis on Cognitive Radio Network Security , 2012 .

[26]  N.R. Prasad Secure Cognitive Networks , 2008, 2008 European Conference on Wireless Technology.

[27]  Li Zhu,et al.  Unified Layered Security Architecture for Cognitive Radio Networks , 2011, 2011 Asia-Pacific Power and Energy Engineering Conference.

[28]  Hongjian Sun,et al.  Collaborative Spectrum Sensing in Cognitive Radio Networks , 2011 .

[29]  Zhe Chen,et al.  Demonstration of real-time spectrum sensing for cognitive radio , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[30]  Ananthram Swami,et al.  A Survey of Dynamic Spectrum Access: Signal Processing and Networking Perspectives , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[31]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[32]  Ananthram Swami,et al.  Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework , 2007, IEEE Journal on Selected Areas in Communications.

[33]  Ossama Younis,et al.  Distance- and Traffic-Aware Channel Assignment in Cognitive Radio Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[34]  C. Cordeiro,et al.  IEEE 802.22: the first worldwide wireless standard based on cognitive radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[35]  Yue Wu,et al.  Cross-layer Detection for Black Hole Attack in Wireless Network ? , 2012 .

[36]  Wu Wei The research of cognitive communication networks , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[37]  Weifang Wang,et al.  Spectrum sensing in cognitive radio , 2016 .

[38]  Zhu Han,et al.  Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[39]  Dong In Kim,et al.  Game Theoretic Approaches for Multiple Access in Wireless Networks: A Survey , 2011, IEEE Communications Surveys & Tutorials.

[40]  G. Jakimoski,et al.  Denial-of-Service Attacks on Dynamic Spectrum Access Networks , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.

[41]  Rahim Tafazolli,et al.  A Comparison Between the Centralized and Distributed Approaches for Spectrum Management , 2011, IEEE Communications Surveys & Tutorials.

[42]  Shuai Li,et al.  Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.

[43]  Song Ci,et al.  A Cognitive Cross-Layer Architecture for Next-Generation Tactical Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[44]  Maria-Gabriella Di Benedetto,et al.  A Survey on MAC Strategies for Cognitive Radio Networks , 2012, IEEE Communications Surveys & Tutorials.

[45]  Zhu Han,et al.  Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[46]  Farookh Khadeer Hussain,et al.  Digital Signature-Based Secure Communication in Cognitive Radio Networks , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.

[47]  Zenon Chaczko,et al.  Security threats in Cognitive Radio applications , 2010, 2010 IEEE 14th International Conference on Intelligent Engineering Systems.

[48]  S. M. Kamruzzaman Dynamic TDMA Slot Reservation Protocol for QoS Provisioning in Cognitive Radio Ad Hoc Networks , 2010 .

[49]  Xiao Zhou,et al.  Encryption and displacement based scheme of defense against Primary User Emulation Attack , 2011 .

[50]  Li Zhu,et al.  An Efficient Authentication Mechanism for Cognitive Radio Networks , 2011, 2011 Asia-Pacific Power and Energy Engineering Conference.

[51]  Krishna Kant Agrawal,et al.  Efficient Content Authentication in AdHoc Networks Mitigating DDoS Attacks , 2011 .

[52]  Mohammed Elkoutbi,et al.  A Dynamic Timestamp Discrepancy against Replay Attacks in MANET , 2011 .

[53]  P. Bahl,et al.  DSAP: a protocol for coordinated spectrum access , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[54]  Xi Chen,et al.  Fake BTS Attacks of GSM System on Software Radio Platform , 2012, J. Networks.

[55]  Victor C. M. Leung,et al.  Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[56]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[57]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[58]  Feza Buzluca,et al.  Protection and fairness oriented cognitive radio MAC protocol for ad hoc networks (PROFCR) , 2010, 2010 European Wireless Conference (EW).

[59]  Li Zhu,et al.  Research on Authentication Mechanism of Cognitive Radio Networks Based on Certification Authority , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[60]  Feng Lin,et al.  Cognitive radio network as wireless sensor network (II): Security consideration , 2011, Proceedings of the 2011 IEEE National Aerospace and Electronics Conference (NAECON).

[61]  R. H. Jhaveri,et al.  A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[62]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[63]  K. J. Ray Liu,et al.  COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - Dynamic Spectrum Sharing: A Game Theoretical Overview , 2007, IEEE Communications Magazine.

[64]  Huseyin Arslan,et al.  Spectrum Sensing for Cognitive Radio Applications , 2007 .

[65]  An He,et al.  A Survey of Artificial Intelligence for Cognitive Radios , 2010, IEEE Transactions on Vehicular Technology.

[66]  Han Yu,et al.  Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.

[67]  Ning Liu,et al.  An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[68]  Cheng Li,et al.  The security in cognitive radio networks: a survey , 2009, IWCMC.

[69]  Li Zhu,et al.  An Investigation on Security of Cognitive Radio Networks , 2011, 2011 International Conference on Management and Service Science.

[70]  S.A. Khan,et al.  Augmented Security in IEEE 802.22 MAC Layer Protocol , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[71]  A. Umamaheswari,et al.  Survey on performance, reliability and future proposal of Cognitive Radio under wireless computing , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[72]  Li Li,et al.  Replay attacks and detection in tactical MANETs , 2011, Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.

[73]  Ben Y. Zhao,et al.  Multi-channel Jamming Attacks using Cognitive Radios , 2007, 2007 16th International Conference on Computer Communications and Networks.

[74]  Ian F. Akyildiz,et al.  CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.

[75]  Abhay Kumar Rai,et al.  Different Types of Attacks on Integrated MANET-Internet Communication , 2010 .

[76]  A. Ghasemi,et al.  Detecting black hole attack in wireless ad hoc networks based on learning automata , 2011, 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT).

[77]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[78]  Huayi Wu,et al.  An Improved Security Mechanism in Cognitive Radio Networks , 2011, 2011 International Conference on Internet Computing and Information Services.

[79]  Chadi Assi,et al.  Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc Networks , 2006, 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[80]  Gianmarco Baldini,et al.  Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.

[81]  S. Arkoulis,et al.  Cognitive Spectrum and Its Security Issues , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.

[82]  P. Agrawal,et al.  Cognitive Radio Network setup without a Common Control Channel , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[83]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[84]  Damla Turgut,et al.  An Effective Strategy for Greedy Behavior in Wireless Ad hoc Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[85]  Ian F. Akyildiz,et al.  A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.

[86]  Song Han,et al.  Trust based security for cognitive radio networks , 2010, iiWAS.

[87]  Lijun Qian,et al.  Anomalous spectrum usage attack detection in cognitive radio wireless networks , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).

[88]  Jack L. Burbank,et al.  Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[89]  Hyung Seok Kim,et al.  Fully Distributed Cooperative Spectrum Sensing for Cognitive Radio Ad Hoc Networks , 2011, 2011 Frontiers of Information Technology.

[90]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[91]  Alexander M. Wyglinski,et al.  A Spectrum Surveying Framework for Dynamic Spectrum Access Networks , 2009, IEEE Transactions on Vehicular Technology.

[92]  Luiz A. DaSilva,et al.  Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.

[93]  Haitao Zheng,et al.  Distributed Rule-Regulated Spectrum Sharing , 2008, IEEE Journal on Selected Areas in Communications.

[94]  P. Goyal,et al.  MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .

[95]  Song Han,et al.  Trust-Based Authentication for Secure Communication in Cognitive Radio Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[96]  Hui Wang,et al.  A Survey on MAC Protocols for Opportunistic Spectrum Access in Cognitive Radio Networks , 2008, 2008 International Conference on Computer Science and Software Engineering.

[97]  Jiannong Cao,et al.  Joint Optimization of Spectrum Handoff Scheduling and Routing in Multi-hop Multi-radio Cognitive Networks , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.

[98]  J. Sebastian Terence Secure route discovery against wormhole attacks in sensor networks using mobile agents , 2011, 3rd International Conference on Trendz in Information Sciences & Computing (TISC2011).

[99]  Xiaohua Li,et al.  Secure transmission power of cognitive radios for dynamic spectrum access applications , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[100]  Do-Hoon Kim,et al.  Selfish attacks and detection in cognitive radio Ad-Hoc networks , 2013, IEEE Network.

[101]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[102]  Chittabrata Ghosh,et al.  Secure Communication in Cognitive Radio Networks , 2022 .

[103]  L. Ma,et al.  Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[104]  Wajdi Alhakami,et al.  A secure MAC protocol for Cognitive Radio Networks (SMCRN) , 2013, 2013 Science and Information Conference.